Pub Date : 2020-05-01DOI: 10.5220/0009161606310642
T. Bauer
In order to avoid limitations for end users, run-time deviations from the pre-defined business process have to be allowed at process-aware information systems (PAIS). Predictable flexibility shall be pre-designed already at build-time. The advantage, compared to completely dynamic modifications at run-time, is that this significantly reduces the effort for the end users necessary to trigger a deviation. Fur-thermore, this increases process safety since, for instance, it can be pre-defined which users are allowed to perform which modifications. In this paper we present the corresponding requirements for the con-trol-flow perspective. Thereby, the main focus is to discuss which information has to be pre-designed at build-time in each case. Furthermore, examples from practice are presented in order to illustrate the ne-cessity of the requirements.
{"title":"Business Processes with Pre-designed Flexibility for the Control-flow","authors":"T. Bauer","doi":"10.5220/0009161606310642","DOIUrl":"https://doi.org/10.5220/0009161606310642","url":null,"abstract":"In order to avoid limitations for end users, run-time deviations from the pre-defined business process have to be allowed at process-aware information systems (PAIS). Predictable flexibility shall be pre-designed already at build-time. The advantage, compared to completely dynamic modifications at run-time, is that this significantly reduces the effort for the end users necessary to trigger a deviation. Fur-thermore, this increases process safety since, for instance, it can be pre-defined which users are allowed to perform which modifications. In this paper we present the corresponding requirements for the con-trol-flow perspective. Thereby, the main focus is to discuss which information has to be pre-designed at build-time in each case. Furthermore, examples from practice are presented in order to illustrate the ne-cessity of the requirements.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.5220/0009316907170727
Robert Ehrensperger, Clemens Sauerwein, R. Breu
The digital transformation influences business models, processes, and enterprise IT landscape as a whole. Therefore, business-IT alignment is becoming more important than ever before. Enterprise architecture management (EAM) is designed to support and improve this business-IT alignment. The success of EAM crucially depends on the information available about a company's enterprise architecture, such as infrastructure components, applications, and business processes. This paper discusses the results of a qualitative expert survey with 26 experts in the field of EAM. The goal of this survey was to highlight current practices in the information collection for EAM and identify relevant information from enterprise-external data sources. The results provide a comprehensive overview of collected and utilized information in the industry, including an assessment of the relevance of such information. Furthermore, the results highlight challenges in practice and point out investments that organizations plan in the field of EAM.
{"title":"Current Practices in the Information Collection for Enterprise Architecture Management","authors":"Robert Ehrensperger, Clemens Sauerwein, R. Breu","doi":"10.5220/0009316907170727","DOIUrl":"https://doi.org/10.5220/0009316907170727","url":null,"abstract":"The digital transformation influences business models, processes, and enterprise IT landscape as a whole. Therefore, business-IT alignment is becoming more important than ever before. Enterprise architecture management (EAM) is designed to support and improve this business-IT alignment. The success of EAM crucially depends on the information available about a company's enterprise architecture, such as infrastructure components, applications, and business processes. This paper discusses the results of a qualitative expert survey with 26 experts in the field of EAM. The goal of this survey was to highlight current practices in the information collection for EAM and identify relevant information from enterprise-external data sources. The results provide a comprehensive overview of collected and utilized information in the industry, including an assessment of the relevance of such information. Furthermore, the results highlight challenges in practice and point out investments that organizations plan in the field of EAM.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-19DOI: 10.5220/0009592102610268
Rateb Jabbar, M. Krichen, Noora Fetais, Kamel Barkaoui
The Electronic Health Records (EHR) sharing system is the modern tool for delivering efficient healthcare to patients. Its functions include tracking of therapies, monitoring of the treatment effectiveness, prediction of outcomes throughout the patient's lifespan, and detection of human errors. For all the stakeholders, integrity and interoperability of the care continuum are paramount. Yet, its implementation is challenging due to the heterogeneity of healthcare information systems, security threats, and the enormousness of EHR data. To overcome these challenges, this work proposes BiiMED: a Blockchain framework for Enhancing Data Interoperability and Integrity regarding EHR-sharing. This solution is innovative as it contains an access management system allowing the exchange of EHRs between different medical providers and a decentralized Trusted Third Party Auditor (TTPA) for ensuring data integrity. This paper also discusses two validation techniques for enhancing the quality and correctness of the proposed solution: Formal Verification and Model-Based Techniques. The first one checks the correctness of a mathematical model describing the behavior of the given system prior to the implementation. The second technique derives test suites from the adopted model, performs them, and assesses the correctness.
{"title":"Adopting Formal Verification and Model-Based Testing Techniques for Validating a Blockchain-based Healthcare Records Sharing System","authors":"Rateb Jabbar, M. Krichen, Noora Fetais, Kamel Barkaoui","doi":"10.5220/0009592102610268","DOIUrl":"https://doi.org/10.5220/0009592102610268","url":null,"abstract":"The Electronic Health Records (EHR) sharing system is the modern tool for delivering efficient healthcare to patients. Its functions include tracking of therapies, monitoring of the treatment effectiveness, prediction of outcomes throughout the patient's lifespan, and detection of human errors. For all the stakeholders, integrity and interoperability of the care continuum are paramount. Yet, its implementation is challenging due to the heterogeneity of healthcare information systems, security threats, and the enormousness of EHR data. To overcome these challenges, this work proposes BiiMED: a Blockchain framework for Enhancing Data Interoperability and Integrity regarding EHR-sharing. This solution is innovative as it contains an access management system allowing the exchange of EHRs between different medical providers and a decentralized Trusted Third Party Auditor (TTPA) for ensuring data integrity. This paper also discusses two validation techniques for enhancing the quality and correctness of the proposed solution: Formal Verification and Model-Based Techniques. The first one checks the correctness of a mathematical model describing the behavior of the given system prior to the implementation. The second technique derives test suites from the adopted model, performs them, and assesses the correctness.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-13DOI: 10.5220/0009575508330840
Malika Bendechache, N. Limaye, Rob Brennan
Data is becoming one of the world’s most valuable resources and it is suggested that those who own the data will own the future. However, despite data being an important asset, data owners struggle to assess its value. Some recent pioneer works have led to an increased awareness of the necessity for measuring data value. They have also put forward some simple but engaging survey-based methods to help with the first-level data assessment in an organisation. However, these methods are manual and they depend on the costly input of domain experts. In this paper, we propose to extend the manual survey-based approaches with additional metrics and dimensions derived from the evolving literature on data value dimensions and tailored specifically for our use case study. We also developed an automatic, metric-based data value assessment approach that (i) automatically quantifies the business value of data in Relational Databases (RDB), and (ii) provides a scoring method that facilitates the ranking and extraction of the most valuable RDB tables. We evaluate our proposed approach on a real-world RDB database from a small online retailer (MyVolts) and show in our experimental study that the data value assessments made by our automated system match those expressed by the domain expert approach.
{"title":"Towards an Automatic Data Value Analysis Method for Relational Databases","authors":"Malika Bendechache, N. Limaye, Rob Brennan","doi":"10.5220/0009575508330840","DOIUrl":"https://doi.org/10.5220/0009575508330840","url":null,"abstract":"Data is becoming one of the world’s most valuable resources and it is suggested that those who own the data will own the future. However, despite data being an important asset, data owners struggle to assess its value. Some recent pioneer works have led to an increased awareness of the necessity for measuring data value. They have also put forward some simple but engaging survey-based methods to help with the first-level data assessment in an organisation. However, these methods are manual and they depend on the costly input of domain experts. In this paper, we propose to extend the manual survey-based approaches with additional metrics and dimensions derived from the evolving literature on data value dimensions and tailored specifically for our use case study. We also developed an automatic, metric-based data value assessment approach that (i) automatically quantifies the business value of data in Relational Databases (RDB), and (ii) provides a scoring method that facilitates the ranking and extraction of the most valuable RDB tables. We evaluate our proposed approach on a real-world RDB database from a small online retailer (MyVolts) and show in our experimental study that the data value assessments made by our automated system match those expressed by the domain expert approach.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-19DOI: 10.5220/0007732904310437
P. Ferreira, André Vasconcelos
The developments in Natural Language Understanding (NLU) are enabling tasks that were typically performed interacting with humans to be now performed interacting with dialog systems, using the same natural language. Dialog systems can also be used in alternative to more traditional graphic user interface (GUI) applications. A review of the intrinsic differences and benefits of humans interacting with dialog systems in alternative to other humans or GUI applications is performed. It is also reviewed the types of use cases that are now being performed by chatbots. This paper aims to identify the factors that influence the selection of use cases suitable for conversational user interfaces, enabling organizations to make more informed decisions regarding chatbots implementations. The factors identified are grouped in three categories: (i) general factors, (ii) factors to be considered to implement a chatbot over a human operator; and (iii) factors that should be considered when implementing a chatbot over a traditional GUI application. Finally, an assessment to the scheduling a medical appointment use case is performed, using the defined factors. This use case is considered suitable to a conversational user interface according to the factors.
{"title":"Evaluating Use Cases Suitability for Conversational User Interfaces","authors":"P. Ferreira, André Vasconcelos","doi":"10.5220/0007732904310437","DOIUrl":"https://doi.org/10.5220/0007732904310437","url":null,"abstract":"The developments in Natural Language Understanding (NLU) are enabling tasks that were typically performed interacting with humans to be now performed interacting with dialog systems, using the same natural language. Dialog systems can also be used in alternative to more traditional graphic user interface (GUI) applications. A review of the intrinsic differences and benefits of humans interacting with dialog systems in alternative to other humans or GUI applications is performed. It is also reviewed the types of use cases that are now being performed by chatbots. This paper aims to identify the factors that influence the selection of use cases suitable for conversational user interfaces, enabling organizations to make more informed decisions regarding chatbots implementations. The factors identified are grouped in three categories: (i) general factors, (ii) factors to be considered to implement a chatbot over a human operator; and (iii) factors that should be considered when implementing a chatbot over a traditional GUI application. Finally, an assessment to the scheduling a medical appointment use case is performed, using the defined factors. This use case is considered suitable to a conversational user interface according to the factors.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-07DOI: 10.5220/0007763003610370
A. Smirnov, L. Sheremetov, N. Teslya
The paper describes an approach to dynamic formation of coalitions of independent robots based on the integration of fuzzy cooperative games and smart contracts. Each member of the coalition is represented in the form of an independent agent, negotiating at the stage of coalition formation for distribution of joint winnings. A cooperative game with fuzzy core is used to form a coalition allowing coordinating the actions of individual members to achieve a common goal, as well as to evaluate and distribute the overall benefit. To implement the negotiation process and store the responsibilities of individual participants, it is proposed to use the smart contract technology, which now become a part of the blockchain technology. Smart contracts are used as entity where the requirements and expected winnings of each participant are stored. The final agreement is also stored in form of smart contract that contains the distribution coefficients of the winnings given all the conditions of participation in the coalition. The availability of smart contracts to all coalition participants provides joint control over the fulfilment of the task assigned to the coalition. The paper describes a use case based on precision farming to illustrate the main concepts of the proposed approach.
{"title":"Fuzzy Cooperative Games Usage in Smart Contracts for Dynamic Robot Coalition Formation: Approach and Use Case Description","authors":"A. Smirnov, L. Sheremetov, N. Teslya","doi":"10.5220/0007763003610370","DOIUrl":"https://doi.org/10.5220/0007763003610370","url":null,"abstract":"The paper describes an approach to dynamic formation of coalitions of independent robots based on the integration of fuzzy cooperative games and smart contracts. Each member of the coalition is represented in the form of an independent agent, negotiating at the stage of coalition formation for distribution of joint winnings. A cooperative game with fuzzy core is used to form a coalition allowing coordinating the actions of individual members to achieve a common goal, as well as to evaluate and distribute the overall benefit. To implement the negotiation process and store the responsibilities of individual participants, it is proposed to use the smart contract technology, which now become a part of the blockchain technology. Smart contracts are used as entity where the requirements and expected winnings of each participant are stored. The final agreement is also stored in form of smart contract that contains the distribution coefficients of the winnings given all the conditions of participation in the coalition. The availability of smart contracts to all coalition participants provides joint control over the fulfilment of the task assigned to the coalition. The paper describes a use case based on precision farming to illustrate the main concepts of the proposed approach.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-16DOI: 10.5220/0007739204380445
P. Coelho, Jose F. M. Amaral, K. Guimarães, Matheus C. Bentes
{"title":"Layout of Routers in Mesh Networks with Evolutionary Techniques","authors":"P. Coelho, Jose F. M. Amaral, K. Guimarães, Matheus C. Bentes","doi":"10.5220/0007739204380445","DOIUrl":"https://doi.org/10.5220/0007739204380445","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129601303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-05DOI: 10.5220/0007713702130220
Guangming Li, R. Carvalho, Wil M.P. van der Aalst
As data analysis techniques progress, the focus shifts from simple tabular data to more complex data at the level of business objects. Therefore, the evaluation of such data analysis techniques is far from trivial. However, due to confidentiality, most researchers are facing problems collecting available real data to evaluate their techniques. One alternative approach is to use synthetic data instead of real data, which leads to unconvincing results. In this paper, we propose a framework to automatically operate information systems (supporting operational processes) to generate semi-real data (i.e., “operations related data” exclusive of images, sound, video, etc.). This data have the same structure as the real data and are more realistic than traditional simulated data. A plugin is implemented to realize the framework for automatic data generation.
{"title":"A Model-based Framework to Automatically Generate Semi-real Data for Evaluating Data Analysis Techniques","authors":"Guangming Li, R. Carvalho, Wil M.P. van der Aalst","doi":"10.5220/0007713702130220","DOIUrl":"https://doi.org/10.5220/0007713702130220","url":null,"abstract":"As data analysis techniques progress, the focus shifts from simple tabular data to more complex data at the level of business objects. Therefore, the evaluation of such data analysis techniques is far from trivial. However, due to confidentiality, most researchers are facing problems collecting available real data to evaluate their techniques. One alternative approach is to use synthetic data instead of real data, which leads to unconvincing results. In this paper, we propose a framework to automatically operate information systems (supporting operational processes) to generate semi-real data (i.e., “operations related data” exclusive of images, sound, video, etc.). This data have the same structure as the real data and are more realistic than traditional simulated data. A plugin is implemented to realize the framework for automatic data generation.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-04DOI: 10.5220/0007411901430154
Jan Merkus, R. Helms, R. Kusters
Chaos emerges with the ever growing amounts of data and information within organisations. But it is problematic to manage these valuable assets and also remain accountable and compliant for them because there is no agreement about even their definitions. Our objective is to propose a coherent set of definitions for data governance and information governance within and across organisations in relation with data and information as underlying concepts. As a research method, we explore elements from existing definitions in literature about the Data-Information-Knowledge-Wisdom pyramid and about data governance and information governance. Classification of these elements and coding them in concepts during discussions among peers resulted in a new vocabulary. This forms the basis for formulation and design of an original coherent set of definitions for data, information, meaning, data governance and information governance. This research is grounded, goal oriented and uses multiple accepted literature review methods. But it is limited to the literature found and the IS domain.
{"title":"Data Governance and Information Governance: Set of Definitions in Relation to Data and Information as Part of DIKW","authors":"Jan Merkus, R. Helms, R. Kusters","doi":"10.5220/0007411901430154","DOIUrl":"https://doi.org/10.5220/0007411901430154","url":null,"abstract":"Chaos emerges with the ever growing amounts of data and information within organisations. But it is problematic to manage these valuable assets and also remain accountable and compliant for them because there is no agreement about even their definitions. Our objective is to propose a coherent set of definitions for data governance and information governance within and across organisations in relation with data and information as underlying concepts. As a research method, we explore elements from existing definitions in literature about the Data-Information-Knowledge-Wisdom pyramid and about data governance and information governance. Classification of these elements and coding them in concepts during discussions among peers resulted in a new vocabulary. This forms the basis for formulation and design of an original coherent set of definitions for data, information, meaning, data governance and information governance. This research is grounded, goal oriented and uses multiple accepted literature review methods. But it is limited to the literature found and the IS domain.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0008346100050013
D. Menascé
Modern computer information systems are highly complex, networked, have numerous configuration knobs, and operate in environments that are highly dynamic and evolving. Therefore, one cannot expect that configurations established at design-time will meet QoS and other non-functional goals at run-time. For that reason, the design of complex systems needs to incorporate controllers for adapting the system at run time. In this talk I will describe the four properties of self-managed systems: self-configuring, self-optimizing, self-healing, and self-protecting. I will also describe how these properties are enforced by controllers I designed for a variety of domains including cloud computing, fog/cloud computing, internet datacenters, distributed software systems, and database systems.
{"title":"Taming Complexity with Self-managed Systems","authors":"D. Menascé","doi":"10.5220/0008346100050013","DOIUrl":"https://doi.org/10.5220/0008346100050013","url":null,"abstract":"Modern computer information systems are highly complex, networked, have numerous configuration knobs, and operate in environments that are highly dynamic and evolving. Therefore, one cannot expect that configurations established at design-time will meet QoS and other non-functional goals at run-time. For that reason, the design of complex systems needs to incorporate controllers for adapting the system at run time. In this talk I will describe the four properties of self-managed systems: self-configuring, self-optimizing, self-healing, and self-protecting. I will also describe how these properties are enforced by controllers I designed for a variety of domains including cloud computing, fog/cloud computing, internet datacenters, distributed software systems, and database systems.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}