|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2015 | Vol. 72 No.2 |
Title: |
SECRET DATA HIDING BY OPTIMIZING GENERAL SMOOTHNESS DIFFERENCE EXPANSION-BASED
METHOD |
Author: |
MUHAMMAD HOLIL, TOHARI AHMAD |
Abstract: |
Computer network has made it easy to exchange data; however, there is a security
challenge raising from it. This is because the transmitting data can be
intercepted by an attacker. Steganography can be used to prevent an attacker
from exploring the information in the intercepted data. There are three common
problems in the steganography, those are: obtaining both secret data and cover
data from stego data, capacity of the secret data and the quality of the stego
data. In this paper we propose a method which works on those problems based on
the smoothness difference expansion. The experimental result shows that the
proposed method is able to extract both secret and cover data, to increase both
capacity and quality of the stego data. |
Keywords: |
Difference Expansion, Block Smoothness, Steganography, Data Hiding, Data
Security |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
MULTIPLE-HYBRID CASE-BASED REASONING APPROACH FOR UNIVERSITY COURSE TIMETABLING
PROBLEM |
Author: |
HONG SIAW THENG, ABU BAKAR BIN MD SULTAN, NORHAYATI MOHD ALI |
Abstract: |
The University Time Tabling problem (UCTP) is an allocation process to schedule
courses with available time slots for suitable lecture halls, classes or rooms
in every semester. The academic time tables design has become a very complex
issue and difficult task as such it is classified as NP-hard problem. The
objectives of this paper is to achieve higher accuracy for time tabling plotting
as well as improve the effectiveness while generating academic courses time
tables. With the aim to improve timetabling solution, we investigate into a new
algorithm which is based on Case-based Reasoning (CBR) retrieval function. The
idea proposed is known as Human Preference Adaptable Retrieval Approach – HPARA
and is separated in three parts, with the combination of different
functionality: Prioritized Attributes, Frequency Grouping, and Value Difference
Measurement. The CBR retrieval is a strategy to retrieve similar cases from
previous time tabling for generating new time tables. Retrieved cases will then
filtered with the according functionality: Prioritized Attributes, Frequency
Grouping, and Value Difference Measurement too seek for the most suitable
components. The proposed CBR algorithm is tested with the database of Faculty of
Computer Science and Information Technology for the past five years compared
with Genetic Algorithm (GA). Experimental results show promising improvement for
both accuracy and effectiveness with the proposed CBR algorithm to generate UCTP. |
Keywords: |
Timetabling, Case-based reasoning, Case-based retrieval, Multiple-hybrid, HPARA |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
DEVELOPING AND EFFECTIVENESS OF THE COMPUTER ASSISTED INSTRUCTION IN PROGRAMMING
LANGUAGES BASE ON ANDROID TABLETS DEVICES. |
Author: |
SATIEN JANPLA |
Abstract: |
The Objective of this research was to develop and study the effectiveness of the
computer assisted instruction in programming languages base on android tablets
devices. The example of this research is first year students in computer science
department, faculty of Science and Technology, Suan Sunandha Rajabhat
University. The research methodology is experimental research by using One-Group
Pretest-Posttest Design. The results of this research showed that the computer
assisted instruction in programming languages has an efficiency, the students
had Posttest scores higher than Pretest scores in significance at .05 and the
computer assisted instruction on programming languages subject has the highest
satisfaction towards the use of instruction. |
Keywords: |
Computer assisted instruction, Programming Languages, Tablets Devices |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
MODEL OF WIRELESS TRANSMISSION OF BIOMEDICAL PARAMETERS FOR THE MONITORING OF
PATIENTS IN INTENSIVE CARE UNITS |
Author: |
K. ROJAS, P. ROMERO, C. ROMERO |
Abstract: |
The present study aimed to design a model for monitoring and transmission of
biomedical parameters based on wireless technology. This responds to a latent
need in terms of improving the efficiency of the operation of the intensive care
units (ICU), so progress in wireless transmissions, provides an emerging
alternative to the medical-care personnel can monitor the condition of a patient
in that unit. The methodology corresponds to a Feasible Project, developed
through five stages: a) analysis of the situation under study, b)
characterization of biomedical signals, c) establishing requirements and
transmission monitoring system, d) design model and, e) model evaluation. As a
result the model monitoring and transmission of biomedical parameters based on
wireless technology is presented. In addition, the study failed to prove its
feasibility by simulation in MatLab Software, establishing in a virtual
environment system transmitter performance, through the calculated parameters. |
Keywords: |
System; Monitoring; Wireless; Biomedical Signals |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
IMPLEMENTING PROCESS MINING TO IMPROVE COBIT 5 ASSESSMENT PROGRAM FOR MANAGING
OPERATIONS (CASE STUDY: A UNIVERSITY BLOG) |
Author: |
KURNIATI, IMELDA ATASTINA |
Abstract: |
ISACA’s COBIT is widely used to assess the maturity of process capability in
many enterprises. It’s last version is COBIT 5, which proposes a process
assessment as a part of a process improvement initiative or as part of a
capability determination approach. Two important steps of the COBIT 5 assessment
process are data collection and data validation. This paper proposes process
mining as a method to improve the traditional data collection and validation. An
internal blog of a private university in Indonesia is analyzed as a case study
to implement the model being proposed. The result shows that this model is
proven as implementable in a real case of managing operations of a university
blog. The resulted findings of the process mining can be combined with the
findings of other assessment methods to enhance the result of the assessment
program.ANGELINA PRIMA |
Keywords: |
Process Mining, COBIT 5, Assessment Program, Data Collection, Log Data |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
CRUDE OIL PREDICTION USING A HYBRID RADIAL BASIS FUNCTION NETWORK |
Author: |
Dr S. KUMAR CHANDAR , Dr. M. SUMATHI , Dr S. N. SIVANANDAM |
Abstract: |
In the recent years, the crude oil is one of the most important commodities
worldwide. This paper discusses the prediction of crude oil using artificial
neural networks techniques. The research data used in this study is from 1st Jan
2000- 31st April 2014. Normally, Crude oil is related with other commodities.
Hence, in this study, the commodities like historical data’s of gold prices,
Standard & Poor’s 500 stock index (S & P 500) index and foreign exchange rate
are considered as inputs for the network. A radial basis function is better than
the back propagation network in terms of classification and learning speed. When
creating a radial basis functions, the factors like number of radial basis
neurons, radial layer’s spread constant are taken into an account. The spread
constant is determined using a bio inspired particle swarm optimization
algorithm. A hybrid Radial Basis Function is proposed for forecasting the crude
oil prices. The accuracy measures like Mean Square Error, Mean Absolute Error,
Sum Square Error and Root Mean Square Error are used to access the performance.
From the results, it is clear that hybrid radial basis function outperforms the
other models. |
Keywords: |
Crude oil prices, Standard & Poor’s 500 Stock Index, hybrid radial basis
function, Particle Swarm Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
VIDEO OBJECT SEGMENTATION APPLYING SPECTRAL ANALYSIS AND BACKGROUND SUBTRACTION |
Author: |
RURI SUKO BASUKI, MOCH. ARIEF SOELEMAN, RICARDUS ANGGI PRAMUNENDAR, AURIA
FARANTIKA YOGANANTI, CATUR SUPRIYANTO |
Abstract: |
This study proposes an approach to segment video object semi-automatically. The
issue of this study is the lack of semantic information on video object
segmentation. Manual segmentation by human is not effective if the video has a
large size. For initialization, we use scribble-based technique to differentiate
between foreground and background. After the separation object from the
background, the subtraction operation between the current and subsequent frame
was performed by applying a background subtraction algorithm. Spectral analysis
and background subtraction for video object segmentation becomes effective. The
evaluation of this study is measured by Mean Square Error. Experiment results
demonstrate the high precision of object segmentation. |
Keywords: |
Segmentation, Alpha Matting, Background Subtraction |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
HOTELLING’S T^2 CHARTS USING WINSORIZED MODIFIED ONE STEP M-ESTIMATOR FOR
INDIVIDUAL NON NORMAL DATA |
Author: |
F. S. HADDAD, J. L. ALFARO, MUTASEM K. ALSMADI |
Abstract: |
Hotelling T2 control chart is one of the most important chart used to
statistical quality control in the manufacture processes. However, this chart is
sensitive to the non normal data and therefore, must be modified to improve its
behavior with this kind of data. In this paper, we propose two new alternatives
charts based on change the usual mean and covariance estimator by robust
location and scale matrix. Thus, we use the winsorized mean and winsorized
covariance matrix, respectively. Concretely, the robust scale estimators with
highest breakdown points namely MADn and Sn are used to suit the criterion in
the modified one step M-estimator (MOM). The control limits for these robust
charts are calculated based on simulated data and the assessment of these new
alternatives charts is based on the false alarm and the probability of detection
out of control observation with non normal data. The results show in general
that the performance of the alternatives robust Hotelling’s T^2charts are better
than the performance of the traditional Hotelling’s〖 T〗^2chart. |
Keywords: |
Non Normal Data (NND); Winsorized MOM (WM); Robust Estimators (RE); Hotelling’s〖
T〗^2 Control Chart (HCC). |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
REQUIREMENTS AND CHALLENGES IN BODY SENSOR NETWORKS: A SURVEY |
Author: |
VAHID AYATOLLAHITAFTI, MD ASRI NGADI, AND JOHAN BIN MOHAMAD SHARIF |
Abstract: |
Recent advances in wireless sensor networks have provided many opportunities for
researchers on wireless networks around the body such as Body Area Network (BAN)
or Body Sensor Network (BSN). A BSN allows health monitoring of patients whereby
caregivers receive feedback from them without disrupting their normal
activities. This monitoring requires the employment of the low-power sensor
nodes implanted in or worn on the human body. This paper presents a discussion
of BSNs, communication standards and their characteristics. Energy, quality of
service and routing are among the crucial requirements and challenges facing
BSNs which are studied. The paper also provides an investigation of many
existing solutions and technologies for the challenges and requirements at
physical, MAC, network, transport, and application layers. Finally, some open
research issues and challenges for each layer are discussed to be addressed in
further research. |
Keywords: |
BSN, energy, QoS, routing. |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
CAT SWARM OPTIMIZATION TO SOLVE FLOW SHOP SCHEDULING PROBLEM |
Author: |
ABDELHAMID BOUZIDI, MOHAMMED ESSAID RIFFI |
Abstract: |
Flow shop problem is a NP-hard combinatorial optimization problem. Its
application appears in logistic, industrial and other fields. It aims to find
the minimal total time execution called makespan. This research paper propose a
novel adaptation never used before to solve this problem, by using computational
intelligence based on cats behavior, called Cat Swarm Optimization, which is
based on two sub modes, the seeking mode when the cat is at rest, and the
tracing mode when the cat is at hunt. These two modes are combined by the
mixture ratio. The operations, operators will be defined and adapted to solve
this problem. To prove the performance of this adaptation, some real instances
of OR-Library are used. The obtained results are compared with the best-known
solution found by others methods. |
Keywords: |
Flow Shop, Scheduling, Makespan, Computational Intelligent, Cat Swarm
Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
A CLUSTERING ALGORITHM BASED ON NODES TRUST |
Author: |
MOHAMED DYABI , ABDELMAJID HAJAMI , HAKIM ALLALI |
Abstract: |
A mobile ad hoc network (MANET) is a wireless network without the support of any
fixed infrastructure. Security is one of the main challenges in ad hoc network
due to dynamic topology and mobility of nodes. Clustering is one of the main
techniques that are used to increase the scalability of MANETs, but without any
security considerations clustering is prone to various security attacks. Some
cryptographic-based schemes have been proposed to secure the clustering process,
but they are unable to handle the internal attacks. To defend against insider
malicious nodes, trust and reputation management systems should be used. This
work proposes a trust based clustering algorithm which forms a cluster around
the trustworthy nodes. The Criteria used to select the CH is the trust value of
a node. Our algorithm gives major improvements regarding the number and the
trust value of elected cluster heads. Analysis and simulation results are used
to show the performance of our algorithm, compared with other clustering
algorithms in literature. |
Keywords: |
Ad Hoc , Trust, Clustering, Olsr |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
RELIABILITY AND VALIDITY OF A QUESTIONNAIRE TO EVALUATE DIABETIC PATIENTS'
INTENTION TO ADOPT HEALTH INFORMATION TECHNOLOGY: A PILOT STUDY |
Author: |
BARROON ISMA'EEL AHMAD, ABD RAHMAN AHLAN |
Abstract: |
All the efforts put in developing questionnaire by a researcher are in vain if
it measures what is not intended to measure. A questionnaire can only be useful
if it produces meaningful and trustworthy data. The aim of this study was to
develop and assess the validity and reliability of an instrument to measure the
perception and attitude of diabetic patients toward acceptance of Health
Information Technology (HIT). An extended Technology Acceptance Model (TAM)
based questionnaire was distributed to a sample of 80 diabetic patients. The
content validity was assessed by experts, while Exploratory Factor Analysis (EFA)
was used to measure the construct validity. Cronbach's alpha was used to measure
the internal consistency of the questionnaire. The response rate of the
questionnaire was 93%. In the exploratory factor analysis, seven factors that
correspond with the constructs were extracted using principal component
analysis. The factors examined using varimax rotations explained 72.15%, 74.21%,
72.67%, 80.84%, 72.72%, 74.22% and 74.84% variance in the respective constructs.
Construct validity was measured using convergent and discriminant validity. Most
of the variables load in the range of 0.60 - 0.98, which shows a good convergent
validity, and the significant loading of the variables on one factor without
cross-loadings is an evidence of the discriminant validity. Similarly, the
average Cronbach's alpha coefficient of the seven extracted components was 0.822
indicating a good internal consistency or reliability. This study presents the
result of reliability and validity of the extended TAM based instrument for
assessing the perception and attitude of diabetic patients toward acceptance of
HIT. The findings of this study showed the feasibility of using the
questionnaire, since it has high reliability and validity. |
Keywords: |
Health Information Technology (HIT), Technology Acceptance Model (TAM),
Developing Countries, Diabetic Patients, Questionnaire |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN EFFECTIVE APPROACH OF IMAGE RETRIEVAL USING SCALABLE IMAGE ENCRYPTION |
Author: |
K.SRILATHA |
Abstract: |
The encryption has a comprehensive scheme for providing confidentiality of
security such as privacy, reliability and authentication of information. This
paper proposes a unique scheme of scalable coding of transmitting and receiving
images in an extreme protected way using Absolute Moment block truncation coding
(AMBTC). The gray level pixel of image has compressed by AMBTC then encrypted
image is acquired by adding compressed AMBTC pixel value that has masked by a
modulo-256 addition with PRNG (Pseudo Random Number Generator) that has derived
from a secret key Subsequently encrypted image data into a down sampled sub
image and some data groups using a multiple-resolution creation, an encoder
gives the quantized sub image and the Harr coefficients of all data set to
reduce the data. Then, the data of quantized sub image and coefficients are held
as a set of bit streams transmitted. At the receiver side, although a sub image
is decrypted to give the rough information of the original image, the quantized
coefficients are used to reconstruct the original image with an iterative
procedure. Due to the hierarchical mechanism, the original image with higher
resolution reconstructed by decompressing the decrypted pixel value using AMBTC. |
Keywords: |
Scalable Coding, Harr Transform, Image Compression, Image Encryption/Decryption,
Absolute Moment Block Truncation Coding (AMBTC) |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
MODIFICATION OF STRAPDOWN INERTIAL NAVIGATION SYSTEM ALGORITHM FOR ROCKET FLIGHT
TEST |
Author: |
ROMI WIRYADINATA, OYAS WAHYUNGGORO, WAHYU WIDADA, SUNARNO, M. IMAN SANTOSO |
Abstract: |
Specification, type, and IMU utilization on the INS algorithm influences rocket
performance. Improvement could be done by hardware errors minimization that
optimize algorithm and matrix transformation on the processor. Pitch angle (θ)
on the Euler transform matrix have singularity on 90 degree. This paper modifies
INS algorithm to solve that singularity. A novel control of rocket flight test
with a modified algorithm which combines INS Euler and Quaternion method has
been conducted. The modifications of INS algorithm proves that the proposed
method can be used for flight test rocket that has a high-speed and rapid data
alteration. |
Keywords: |
INS Algorithm, Strapdown IMU, Euler, Guided Rocket |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
EVALUATE DYNAMIC KMEANS ALGORITHM FOR AUTOMATICALLY SEGMENTED DIFFERENT BREAST
REGIONS IN MAMMOGRAM BASED ON DENSITY BY USING SEED REGION GROWING TECHNIQUE |
Author: |
ABDELALI ELMOUFIDI, KHALID EL FAHSSI, SAID JAI ANDALOUSSI, ABDERRAHIM SEKKAKI |
Abstract: |
This paper presents a method for segment and detects the boundary of different
breast tissue regions in mammograms by using dynamic Kmeans clustering algorithm
after evaluate it by using Seed Based Region Growing (SBRG) techniques. Firstly,
the K-means clustering is applied for dynamically and automatically divides
mammogram into homogeneous regions according to the intensity of the pixel. From
where automatically selected of seeds point and determined the threshold value
for each region. Secondly, the region growing algorithm is applied with
previously generated seeds point and threshold values as input parameter of SBRG.
The main goal of this study is to evaluate the dynamic k-means clustering
algorithm in the detection and segmentation of different breast tissue regions,
which correspond to the density in mammograms. Segmentation of the mammogram
into different mammographic densities is useful for risk assessment and
qualitative or/and quantitative evaluation of density changes. In order to
evaluate our proposed method, we used the well-known Mammographic Image Analysis
Society (MIAS) database. The obtained qualitative and quantitative results
demonstrate the efficiency of this method and confirm the possibility of its use
in improving the computer-aided detection / diagnosis. |
Keywords: |
Breast Density; Breast Segmentation; Medical Image Processing; Kmeans Clustering
Algorithm; Region Growing Technique |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
ARTIFICIAL DNA HYBRIDIZATION TO PULSE-WIDTH MODULATION |
Author: |
JUAN C. HERRERA-LOZADA, RODRIGO CADENA-MARTINEZ, JESUS A. ALVAREZ-CEDILLO,
MAURICIO OLGUIN-CARBAJAL, MIGUEL HERNANDEZ-BOLAÑOS, ISRAEL RIVERA-ZARATE, JACOBO
SANDOVAL-GUTIERREZ |
Abstract: |
The analysis and design of a Pulse-width modulation (PWM) embedded unit as an
alternative to convert digital signals to analog signals is presented herein,
extrapolating the biological principle of DNA hybridization. The biological
hybridization process is a binding event between two complementary DNA single
strands that leads to the formation of a double-stranded helix. The proposed
technique to detect the hybridization is based on direct comparison of data,
allowing a high degree of parallelism in the Bio-inspired Architecture, it was
specially designed to regulate the light intensity of LED lamps as a home
automation application. |
Keywords: |
Five Pulse-widht Modulation, Artificial DNA Hybridization, LED Lamp,
Bio-inspired Architecture, Digital- Analogic Converter |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
DESIGNING A DISTRIBUTION NETWORK USING A TWO LEVEL CAPACITY LOCATION
ALLOCATION PROBLEM: FORMULATION AND EFFICIENT GENETIC ALGORITHM RESOLUTION WITH
AN APPLICATION TO A MOROCCAN RETAIL COMPANY |
Author: |
M.HLYAL, A.AIT BASSOU, A.SOULHI, J. EL ALAMI, N. EL ALAMI |
Abstract: |
Distribution network design as a strategic decision has long-term effect on
tactical and operational supply chain management. In this research, a supply
chain design problem based on a two level capacity location allocation problem (TLCLAP)
is presented. A product must be transported from a set of seaport to meet stores
demands, passing out by intermediate warehouses. The objective is to locate the
warehouses, allocate warehouse to seaport in the first distribution network
level and allocate stores to warehouse for in the second one. The finality is to
minimize the global cost of the underlying two-level costs thereby satisfying
store demand and warehouse capacity constraints. In this study, a new
mathematical model for the two-level capacitated facility location allocation,
with restrictions in the real-world environments of logistics distribution is
given. In order to solve the model, an efficient Genetic Algorithm (GA) for
TLCLAP in distribution logistic network has been developed for optimal
distribution network design. |
Keywords: |
Distribution network, Genetic Algorithm, Location-allocation decisions,
Logistics network, Mathematical modeling. |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
Title: |
USING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC |
Author: |
AHLAM MAQQOR, AKRAM HALLI, KHALID SATORI, HAMID TAIRI |
Abstract: |
In this paper, we propose an analytical approach for an off-line Arabic
handwritten recognition system. The system is based on combining methods of
decision fusion approach. The proposed approach introduces a methodology using
the HMM-Toolkit (HTK) for a rapid implementation of our designed recognition
system. First, a pre-processing phase is done toprepare the image of the
introduced text (eliminate or reduce noise, thresholding, screening, detection
of the inclination angle and the segmentation of the image of the text line).
The obtained images are then used for features extraction with Sliding window
technique. These features are modeled separately using Hidden Markov Models
classifiers. The combination of the multiple HMMs classifiers was applied by
using the different methods of decision fusion approach. The proposed system is
evaluated using the IFN/ENIT database. |
Keywords: |
Hmms, Sliding Window Technique, Hough Transform, Horizontal Projection, Decision
Fusion Approach, HMM Toolkit (HTK), VH2D. |
Source: |
Journal of Theoretical and Applied Information Technology
20th February 2015 -- Vol. 72. No. 2 -- 2015 |
Full
Text |
|
|
|