Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482172
J. Xiahou, Mengfei Xiao, Xiaojing He, Xu Cui
With the improvement of information system of the insurance industry, the insurance company has accumulated a large number of vehicle insurance data. How to use these vast amounts of data resources more efficiently has become an urgent problem for the insurance industry to be solved, and data mining technology can solve the above problems. In this paper, decision tree algorithm is used for auto insurance business data mining and analysis, build a customer risk analysis model, which effectively reduces the risk of underwriting insurance companies.
{"title":"Research on the Applications of Data Mining in the Analysis of Vehicle Insurance Industry","authors":"J. Xiahou, Mengfei Xiao, Xiaojing He, Xu Cui","doi":"10.1109/IMCEC51613.2021.9482172","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482172","url":null,"abstract":"With the improvement of information system of the insurance industry, the insurance company has accumulated a large number of vehicle insurance data. How to use these vast amounts of data resources more efficiently has become an urgent problem for the insurance industry to be solved, and data mining technology can solve the above problems. In this paper, decision tree algorithm is used for auto insurance business data mining and analysis, build a customer risk analysis model, which effectively reduces the risk of underwriting insurance companies.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115632781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Object detection has a great significance to remote sensing image recognition. Conventional object detection methods by using horizontal bounding box have shown good performance in general images. However, because of looking down perspective of remote sensing images, rotation bounding box is more suitable and precise for object detection. Although rotation bounding box has been researched by some works for remote sensing images, most of them are still two stages. In this paper, by improvement of YOLO architecture, we propose an one-stage object detection method to predict rotation bounding box for remote sensing images. Firstly, in the data preprocessing stage, an image cropping operation is utilized instead of zooming operation to generate suitable input data for network. Meanwhile, in order to avoid an object from being divided, an overlapping band is set during cropping. Secondly, a novel rotation bounding box representation method is introduced, and a corresponding loss function is designed in training process. Experiments on the Dota dataset demonstrate that our method outperforms state-of-the-art rotation objects detection methods, in terms of mAP, our method achieves 73.50%mAP, which is higher than methods based on rotation bounding box by 2.0%.
{"title":"An Improved YOLO Algorithm for Rotated Object Detection in Remote Sensing Images","authors":"Shenmin Zhang, Xu Wang, Ping Li, Long Wang, Mingdong Zhu, Haisu Zhang, Zhaowen Zeng","doi":"10.1109/IMCEC51613.2021.9482265","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482265","url":null,"abstract":"Object detection has a great significance to remote sensing image recognition. Conventional object detection methods by using horizontal bounding box have shown good performance in general images. However, because of looking down perspective of remote sensing images, rotation bounding box is more suitable and precise for object detection. Although rotation bounding box has been researched by some works for remote sensing images, most of them are still two stages. In this paper, by improvement of YOLO architecture, we propose an one-stage object detection method to predict rotation bounding box for remote sensing images. Firstly, in the data preprocessing stage, an image cropping operation is utilized instead of zooming operation to generate suitable input data for network. Meanwhile, in order to avoid an object from being divided, an overlapping band is set during cropping. Secondly, a novel rotation bounding box representation method is introduced, and a corresponding loss function is designed in training process. Experiments on the Dota dataset demonstrate that our method outperforms state-of-the-art rotation objects detection methods, in terms of mAP, our method achieves 73.50%mAP, which is higher than methods based on rotation bounding box by 2.0%.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116714952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482296
Ruifeng Huang, Jing Lian, Caixia Zhang
In order to solve the problem that pulse coupled neural network (PCNN) has low image segmentation accuracy and high computational complexity for image segmentation aspect, this paper proposes a multi-step medical image processing method that combines saliency detection and a modified PCNN model. First, an improved pulse coupled neural network model (MFC-MSPCNN) is proposed based on the FC-MSPCNN model. This method simplifies the related setting parameters, sets a new connection matrix, and improves the attenuation factor α according to the MFC-MSPCNN characteristics. The achieved steps of the method firstly use a GBVS algorithm based on the saliency detection mechanism to obtain the saliency region map of the mass, and then use it as an external input of the MFC-MSPCNN model to accurately segment the breast mass region. The experiments show that our proposed method can accurately segment breast masses and has low computational complexity than other prevalent methods.
{"title":"Multi-step breast mass image segmentation method based on MFC-PCNN","authors":"Ruifeng Huang, Jing Lian, Caixia Zhang","doi":"10.1109/IMCEC51613.2021.9482296","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482296","url":null,"abstract":"In order to solve the problem that pulse coupled neural network (PCNN) has low image segmentation accuracy and high computational complexity for image segmentation aspect, this paper proposes a multi-step medical image processing method that combines saliency detection and a modified PCNN model. First, an improved pulse coupled neural network model (MFC-MSPCNN) is proposed based on the FC-MSPCNN model. This method simplifies the related setting parameters, sets a new connection matrix, and improves the attenuation factor α according to the MFC-MSPCNN characteristics. The achieved steps of the method firstly use a GBVS algorithm based on the saliency detection mechanism to obtain the saliency region map of the mass, and then use it as an external input of the MFC-MSPCNN model to accurately segment the breast mass region. The experiments show that our proposed method can accurately segment breast masses and has low computational complexity than other prevalent methods.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117172129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9481989
Shuli Dong
In the objective evaluation of speech communication interference effect, a single objective evaluation method has the problem of poor scene adaptability. In some communication scenarios, the correlation is good, while in other communication scenarios, the correlation is poor. To solve this problem, this paper uses multivariate adaptive regression splines method to composite PESQ, MFCC and other objective evaluation methods. Based on complementary design, the objective evaluation methods of improving the scene adaptability is achieved. The experimental data shows that the MARS-based composition evaluation method has better performance than a single objective evaluation method.
{"title":"Objective Evaluation of Speech Communication Jamming Effect based on Composite Evaluation","authors":"Shuli Dong","doi":"10.1109/IMCEC51613.2021.9481989","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9481989","url":null,"abstract":"In the objective evaluation of speech communication interference effect, a single objective evaluation method has the problem of poor scene adaptability. In some communication scenarios, the correlation is good, while in other communication scenarios, the correlation is poor. To solve this problem, this paper uses multivariate adaptive regression splines method to composite PESQ, MFCC and other objective evaluation methods. Based on complementary design, the objective evaluation methods of improving the scene adaptability is achieved. The experimental data shows that the MARS-based composition evaluation method has better performance than a single objective evaluation method.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482101
Juanzhi Lu, Feng Wang, Jun Ma, Zhiqiang Yan, Lin Liu
Due to the limitation of structure, weight and other factors, one rotating missile cannot be controlled by double channels of four pieces of steering wings, and the control effect with the single channel of two pieces of steering wings is dissatisfactory at low speed. In this case, a control method with three pieces of steering wings is proposed. In this paper, the mounting position of the steering wings and the polarity of the angle are defined under the quasi-body system, the control principle of three pieces of steering wings, the control command distribution, the calculation of control force and moment are described in detail. the rationality and validity of the method has been verified by mathematical simulation.
{"title":"The control method for rotating missile with three pieces of steering wings","authors":"Juanzhi Lu, Feng Wang, Jun Ma, Zhiqiang Yan, Lin Liu","doi":"10.1109/IMCEC51613.2021.9482101","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482101","url":null,"abstract":"Due to the limitation of structure, weight and other factors, one rotating missile cannot be controlled by double channels of four pieces of steering wings, and the control effect with the single channel of two pieces of steering wings is dissatisfactory at low speed. In this case, a control method with three pieces of steering wings is proposed. In this paper, the mounting position of the steering wings and the polarity of the angle are defined under the quasi-body system, the control principle of three pieces of steering wings, the control command distribution, the calculation of control force and moment are described in detail. the rationality and validity of the method has been verified by mathematical simulation.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482051
Xinwen Zhang
In this paper, we discuss the stability of impulsive neutral stochastic differential dynamic systems with Markovian switching. Some new sufficient conditions proving the stability in mean square of this impulsive neutral stochastic dynamic systems are derived by using of the Banach fixed point technique. Some well-known results are generalized and improved.
{"title":"Fixed Point and Stability of a Class of Stochastic Dynamic Systems with Markovian Switching","authors":"Xinwen Zhang","doi":"10.1109/IMCEC51613.2021.9482051","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482051","url":null,"abstract":"In this paper, we discuss the stability of impulsive neutral stochastic differential dynamic systems with Markovian switching. Some new sufficient conditions proving the stability in mean square of this impulsive neutral stochastic dynamic systems are derived by using of the Banach fixed point technique. Some well-known results are generalized and improved.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482350
Wang Yanna
In this paper, three kinds of time-frequency feature fusion methods based on dynamic gesture sensor are analyzed. First, the time-domain feature of sensor data is extracted; second, the cepstrum feature, the power spectrum feature of Fourier Transform (FT) and the wavelet transform (WT) feature of gesture data are extracted and trained using SVM classifier model. The influence of feature extraction methods based on the fusion of time-domain features and three frequency-domain features on dynamic gesture authentication is compared, the experimental results show that the fusion of time domain features and frequency domain features of wavelet transform with fewer feature points has the best effect, which improves the accuracy of gesture authentication, So the method is worth promoting.
{"title":"Research on Time-frequency Feature Fusion Method based on Dynamic Gesture Identity Authentication","authors":"Wang Yanna","doi":"10.1109/IMCEC51613.2021.9482350","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482350","url":null,"abstract":"In this paper, three kinds of time-frequency feature fusion methods based on dynamic gesture sensor are analyzed. First, the time-domain feature of sensor data is extracted; second, the cepstrum feature, the power spectrum feature of Fourier Transform (FT) and the wavelet transform (WT) feature of gesture data are extracted and trained using SVM classifier model. The influence of feature extraction methods based on the fusion of time-domain features and three frequency-domain features on dynamic gesture authentication is compared, the experimental results show that the fusion of time domain features and frequency domain features of wavelet transform with fewer feature points has the best effect, which improves the accuracy of gesture authentication, So the method is worth promoting.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115090696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482240
Fei Yu, Qiang Wei, Yangyang Geng, Yunchao Wang
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deployment determine that it could only defend against known attacks but could not deal with unknown APT threats, which leads to the breakthrough of one defense line is equivalent to the breakthrough of all defense lines and may bring challenges to industrial production safety. This paper proposes a mimic defense model of industrial isolation gateway based on endogenous security. With the dynamic scheduling mechanism to transform the attack surface, the gateway selects multiple heterogeneous filter executors to process the same packet simultaneously. By comparing the processing results of each executor, anomaly detection is carried out to realize the dynamic defense of the industrial isolation gateway. The experimental results show that the industrial isolation gateway based on mimic architecture can significantly increase the difficulty of backdoor utilization, such as paralysis, rule tampering, and information theft, and effectively defend the industrial control system from the threats caused by the backdoors and vulnerabilities of the isolation gateway while exerting the normal boundary protection function.
{"title":"Research on Key Technology of Industrial Network Boundary Protection based on Endogenous Security","authors":"Fei Yu, Qiang Wei, Yangyang Geng, Yunchao Wang","doi":"10.1109/IMCEC51613.2021.9482240","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482240","url":null,"abstract":"Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deployment determine that it could only defend against known attacks but could not deal with unknown APT threats, which leads to the breakthrough of one defense line is equivalent to the breakthrough of all defense lines and may bring challenges to industrial production safety. This paper proposes a mimic defense model of industrial isolation gateway based on endogenous security. With the dynamic scheduling mechanism to transform the attack surface, the gateway selects multiple heterogeneous filter executors to process the same packet simultaneously. By comparing the processing results of each executor, anomaly detection is carried out to realize the dynamic defense of the industrial isolation gateway. The experimental results show that the industrial isolation gateway based on mimic architecture can significantly increase the difficulty of backdoor utilization, such as paralysis, rule tampering, and information theft, and effectively defend the industrial control system from the threats caused by the backdoors and vulnerabilities of the isolation gateway while exerting the normal boundary protection function.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115249963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482066
Lei Zhang, Wenqiang Li, Bo Xu
Intelligent analysis and decision software is a computer software system established by using artificial intelligence, especially the principle and technology of expert system. According to the particularity of intelligent analysis and decision software, the evaluation technology system of intelligent analysis and decision software is constructed to provide reference for the evaluation project of intelligent analysis and decision software. Intelligent analysis and decision software evaluation technology system includes: test purpose, quality model, test content, test method and technology, test strategy, test environment, test personnel, test process, test document, etc. The system covers all the factors involved in the quality evaluation of intelligent analysis and decision software, and makes contributions to ensure the quality of intelligent analysis and decision software.
{"title":"Research and Construction of the Evaluation Technology System of Intelligent Analysis and Decision Software","authors":"Lei Zhang, Wenqiang Li, Bo Xu","doi":"10.1109/IMCEC51613.2021.9482066","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482066","url":null,"abstract":"Intelligent analysis and decision software is a computer software system established by using artificial intelligence, especially the principle and technology of expert system. According to the particularity of intelligent analysis and decision software, the evaluation technology system of intelligent analysis and decision software is constructed to provide reference for the evaluation project of intelligent analysis and decision software. Intelligent analysis and decision software evaluation technology system includes: test purpose, quality model, test content, test method and technology, test strategy, test environment, test personnel, test process, test document, etc. The system covers all the factors involved in the quality evaluation of intelligent analysis and decision software, and makes contributions to ensure the quality of intelligent analysis and decision software.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482058
Rong Yu, Zhenqi Wang, Conghui Zhang, Shaopeng Guan
In the housing rental market, some intermediaries often publish malicious rental prices or provide false housing information, taking advantage of the asymmetry and opacity of the rental market, to harm the interests of tenants. Blockchain has the characteristics of decentralization, immutability, and trustworthiness, which can well address the problems faced in the housing rental market. In this paper, we establish a secure transaction platform for housing rental based on blockchain. First of all, we replace the trusted third party in the traditional house rental platform using the blockchain technology to reduce the trust cost of the platform. Then, we adopt an identity access mechanism based on zero-knowledge proof to ensure the identity legality of users in the housing rental platform. Finally, homomorphic encryption algorithms are employed to protect the private information of users in the process of housing transactions. The evaluation results show that the proposed scheme can well solve the drawbacks of the traditional housing rental platform and ensure the safety of transactions between the rental parties on the platform.
{"title":"A secure blockchain-based housing rental platform","authors":"Rong Yu, Zhenqi Wang, Conghui Zhang, Shaopeng Guan","doi":"10.1109/IMCEC51613.2021.9482058","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482058","url":null,"abstract":"In the housing rental market, some intermediaries often publish malicious rental prices or provide false housing information, taking advantage of the asymmetry and opacity of the rental market, to harm the interests of tenants. Blockchain has the characteristics of decentralization, immutability, and trustworthiness, which can well address the problems faced in the housing rental market. In this paper, we establish a secure transaction platform for housing rental based on blockchain. First of all, we replace the trusted third party in the traditional house rental platform using the blockchain technology to reduce the trust cost of the platform. Then, we adopt an identity access mechanism based on zero-knowledge proof to ensure the identity legality of users in the housing rental platform. Finally, homomorphic encryption algorithms are employed to protect the private information of users in the process of housing transactions. The evaluation results show that the proposed scheme can well solve the drawbacks of the traditional housing rental platform and ensure the safety of transactions between the rental parties on the platform.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}