When castings become complicated and the demands for precision of numerical simulation become higher,the numerical data of casting numerical simulation become more massive.On a general personal computer,these massive ...When castings become complicated and the demands for precision of numerical simulation become higher,the numerical data of casting numerical simulation become more massive.On a general personal computer,these massive numerical data may probably exceed the capacity of available memory,resulting in failure of rendering.Based on the out-of-core technique,this paper proposes a method to effectively utilize external storage and reduce memory usage dramatically,so as to solve the problem of insufficient memory for massive data rendering on general personal computers.Based on this method,a new postprocessor is developed.It is capable to illustrate filling and solidification processes of casting,as well as thermal stess.The new post-processor also provides fast interaction to simulation results.Theoretical analysis as well as several practical examples prove that the memory usage and loading time of the post-processor are independent of the size of the relevant files,but the proportion of the number of cells on surface.Meanwhile,the speed of rendering and fetching of value from the mouse is appreciable,and the demands of real-time and interaction are satisfied.展开更多
After setting the ground of the quantum innovation potential of biosourced entities and outlining the inventive spectrum of adjacent technologies that can derive from those, the current review highlights, with the sup...After setting the ground of the quantum innovation potential of biosourced entities and outlining the inventive spectrum of adjacent technologies that can derive from those, the current review highlights, with the support of Bigger Data approaches, and a fairly large number of articles, more than 250 and 10,000 patents, the following. It covers an overview of biosourced chemicals and materials, mainly biomonomers, biooligomers and biopolymers;these are produced today in a way that allows reducing the fossil resources depletion and dependency, and obtaining environmentally-friendlier goods in a leaner energy consuming society. A process with a realistic productivity is underlined thanks to the implementation of recent and specifically effective processes where engineered microorganisms are capable to convert natural non-fossil goods, at industrial scale, into fuels and useful high-value chemicals in good yield. Those processes, further detailed, integrate: metabolic engineering involving 1) system biology, 2) synthetic biology and 3) evolutionary engineering. They enable acceptable production yield and productivity, meet the targeted chemical profiles, minimize the consumption of inputs, reduce the production of by-products and further diminish the overall operation costs. As generally admitted the properties of most natural occurring biopolymers (e.g., starch, poly (lactic acid), PHAs.) are often inferior to those of the polymers derived from petroleum;blends and composites, exhibiting improved properties, are now successfully produced. Specific attention is paid to these aspects. Then further evidence is provided to support the important potential and role of products deriving from the biomass in general. The need to enter into the era of Bigger Data, to grow and increase the awareness and multidimensional role and opportunity of biosourcing serves as a conclusion and future prospects. Although providing a large reference database, this review is largely initiatory, therefore not mimicking previous classic reviews but putting them in a multiplying synergistic prospective.展开更多
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ...Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company.展开更多
The gap between SDA(Spatial Data Analysis)and GIS(Geographical Information Systems )existed for a long time.Presently this problem still remains in spite of a lot of theore tical and practical studies which tr y to fi...The gap between SDA(Spatial Data Analysis)and GIS(Geographical Information Systems )existed for a long time.Presently this problem still remains in spite of a lot of theore tical and practical studies which tr y to find the solu-tion for it.The research background and current situation about how to in tegrate SDA and GIS are introduced at first.The main idea of this article is to make su re what is the best scheme to bridge th e gap between SDA and GIS and how to design it.There are a lot of factors to influ ence the standards to assess such a sc heme,for instance,the attitude of users and GIS developers,the framework and related functions of current available GI S software in the market and so on.But the two most important ones of them are effic iency and flexibility of the scheme i tself.Efficiency can be measured by the conve-nient extent and temporal length when it is used for carrying out SDA.Flex ibility means users can define their own SDA methods.The best integration schem e should satisfy the two standards at the same time.A group of functions,which can be combined to implement any SDA meth od,are defined in order to design such an integration scheme.The functio ns are divided into five classes according to their properties.展开更多
Full electronic automation in stock exchanges has recently become popular,generat-ing high-frequency intraday data and motivating the development of near real-time price forecasting methods.Machine learning algorithms...Full electronic automation in stock exchanges has recently become popular,generat-ing high-frequency intraday data and motivating the development of near real-time price forecasting methods.Machine learning algorithms are widely applied to mid-price stock predictions.Processing raw data as inputs for prediction models(e.g.,data thinning and feature engineering)can primarily affect the performance of the prediction methods.However,researchers rarely discuss this topic.This motivated us to propose three novel modelling strategies for processing raw data.We illustrate how our novel modelling strategies improve forecasting performance by analyzing high-frequency data of the Dow Jones 30 component stocks.In these experiments,our strategies often lead to statistically significant improvement in predictions.The three strategies improve the F1 scores of the SVM models by 0.056,0.087,and 0.016,respectively.展开更多
Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals ...Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals as well as directly communicate with one or several peer nodes. One important issue to be considered in wireless Mesh networks is how to secure reliable data transmission in multi-hop links. To solve the problem, the 3GPP system architecture proposes two functionalities: ARQ and HARQ. This paper presents two HARQ schemes, namely hop-by-hop and edge-to-edge, and three ARQ schemes: hop-by-hop, edge-to-edge, and last-hop. Moreover, it proposes three solutions for WMNs from the perspective of protocol stock design: layered cooperative mechanism, relay ARQ mechanism and multi-hop mechanism.展开更多
An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The metho...An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The method first discovers the routes between the data sensors and the sink node.Several factors are considered for each sensor node along the route,including energy,number of neighbours,previous transmissions,and energy depletion ratio.Considering all these variables,the Sink Reachable Support Measure and the Secure Communication Support Measure,the method evaluates two distinct measures.The method calculates the data carrier support value using these two metrics.A single route is chosen to collect data based on the value of data carrier support.It has contributed to the design of Secure Communication Support(SCS)Estimation.This has been measured according to the strategy of each hop of the route.The suggested method improves the security and efficacy of data collection in wireless sensor networks.The second stage uses the two-fish approach to build a trust model for secure data transfer.A sim-ulation exercise was conducted to evaluate the effectiveness of the suggested framework.Metrics,including PDR,end-to-end latency,and average residual energy,were assessed for the proposed model.The efficiency of the suggested route design serves as evidence for the average residual energy for the proposed framework.展开更多
The incidence of cybercrime in Zambia is rising, with perpetrators exhibiting a growing tendency to focus on corporate entities and private citizens. The Zambian government has tried to resolve the issue of network pr...The incidence of cybercrime in Zambia is rising, with perpetrators exhibiting a growing tendency to focus on corporate entities and private citizens. The Zambian government has tried to resolve the issue of network protection dangers through the execution of different approaches and procedures. Notwithstanding, the adequacy of these actions has been restricted. The present research investigates Zambia’s extant cybersecurity policies and strategies and delineates several domains where enhancements can be made. The research provides several suggestions on how the Zambian government can enhance its efforts to address cybercrime. This research employs a qualitative approach to investigate the extent of cybersecurity policies and strategies in Zambia by analyzing secondary data. The study seeks to offer valuable insights into the efficacy of Zambia’s cybersecurity framework in addressing the escalating menace of cybercrime by scrutinizing pertinent literature, government reports, and academic articles. The results of this study provide valuable insights into the difficulties encountered by the nation and propose suggestions for improving current policies and strategies.展开更多
Hainan is a major tourist province.It is urgent to promote the transformation and upgrading of Hainan’s tourism industry from a traditional service industry to a modern service industry by means of informatization.Sm...Hainan is a major tourist province.It is urgent to promote the transformation and upgrading of Hainan’s tourism industry from a traditional service industry to a modern service industry by means of informatization.Smart tourism is a brand-new tourism form and operation mode of tourism transformation and upgrading.Integrating big data technology will make smart tourism more accurate in three aspects:tourism management,tourism service,and tourism marketing,and further enhance the satisfaction of the tourism experience.This paper studies the development status of smart tourism in Hainan,deeply summarizes its existing problems and causes,and puts forward the development strategy of smart tourism in Hainan to promote the healthy development of the tourism industry in Hainan.展开更多
In the 21st century,with the development of the Internet,mobile devices,and information technology,society has entered a new era:the era of big data.With the help of big data technology,enterprises can obtain massive ...In the 21st century,with the development of the Internet,mobile devices,and information technology,society has entered a new era:the era of big data.With the help of big data technology,enterprises can obtain massive market and consumer data,realize in-depth analysis of business and market,and enable enterprises to have a deeper understanding of consumer needs,preferences,and behaviors.At the same time,big data technology can also help enterprises carry out human resource management innovation and improve the performance and competitiveness of enterprises.Of course,from another perspective,enterprises in this era are also facing severe challenges.In the face of massive data processing and analysis,it requires superb data processing and analysis capabilities.Secondly,enterprises need to reconstruct their management system to adapt to the changes in the era of big data.Enterprises must treat data as assets and establish a perfect data management system.In addition,enterprises also need to pay attention to protecting customer privacy and data security to avoid data leakage and abuse.In this context,this paper will explore the thinking of enterprise human resource management innovation in the era of big data,and put forward some suggestions on enterprise human resource management innovation.展开更多
With the rapid development and widespread application of Big Data technology, the supply chain management of agricultural products enterprises is facing unprecedented reform and challenges. This study takes the perspe...With the rapid development and widespread application of Big Data technology, the supply chain management of agricultural products enterprises is facing unprecedented reform and challenges. This study takes the perspective of Big Data technology and collects relevant information on the application of supply chain management in 100 agricultural product enterprises through a survey questionnaire. The study found that the use of Big Data can effectively improve the accuracy of demand forecasting, inventory management efficiency, optimize logistics costs, improve supplier management efficiency, enhance the overall level of supply chain management of enterprises, and propose innovative strategies for supply chain management of agricultural products enterprises based on this. Big Data technology brings a new solution for agricultural products enterprises to enhance their supply chain management level, making the supply chain smarter and more efficient.展开更多
With advancements in information technology and the increasing demand for data-driven governance,the openness of public data has become essential for global governance and social innovation.However,legal risks related...With advancements in information technology and the increasing demand for data-driven governance,the openness of public data has become essential for global governance and social innovation.However,legal risks related to privacy protection,data security,intellectual property,liability allocation,and legal adaptability pose significant challenges to data governance in China.This paper analyzes these risks and proposes three strategies:enhancing the legal framework through clear data classification and accountability mechanisms,establishing regulatory bodies to monitor data usage,and promoting public education on data privacy.These strategies aim to address gaps in legal discourse and guide effective data governance,contributing to the secure development of open data initiatives in China and beyond.展开更多
This study explores the integration of predictive analytics in strategic corporate communications, with a specific focus on stakeholder engagement and crisis management. Our mixed-methods approach, which combines a co...This study explores the integration of predictive analytics in strategic corporate communications, with a specific focus on stakeholder engagement and crisis management. Our mixed-methods approach, which combines a comprehensive literature review with case studies of five multinational corporations, allows us to investigate the applications, challenges, and ethical implications of leveraging predictive models in communication strategies. While our findings reveal significant potential for enhancing personalized content delivery, real-time sentiment analysis, and proactive crisis management, we stress the need for careful consideration of challenges such as data privacy concerns and algorithmic bias. This emphasis on ethical implementation is crucial in navigating the complex landscape of predictive analytics in corporate communications. To address these issues, we propose a framework that prioritizes ethical considerations. Furthermore, we identify key areas for future research, thereby contributing to the evolving field of data-driven communication management.展开更多
基金supported by the New Century Excellent Talents in University(NCET-09-0396)the National Science&Technology Key Projects of Numerical Control(2012ZX04014-031)+1 种基金the Natural Science Foundation of Hubei Province(2011CDB279)the Foundation for Innovative Research Groups of the Natural Science Foundation of Hubei Province,China(2010CDA067)
文摘When castings become complicated and the demands for precision of numerical simulation become higher,the numerical data of casting numerical simulation become more massive.On a general personal computer,these massive numerical data may probably exceed the capacity of available memory,resulting in failure of rendering.Based on the out-of-core technique,this paper proposes a method to effectively utilize external storage and reduce memory usage dramatically,so as to solve the problem of insufficient memory for massive data rendering on general personal computers.Based on this method,a new postprocessor is developed.It is capable to illustrate filling and solidification processes of casting,as well as thermal stess.The new post-processor also provides fast interaction to simulation results.Theoretical analysis as well as several practical examples prove that the memory usage and loading time of the post-processor are independent of the size of the relevant files,but the proportion of the number of cells on surface.Meanwhile,the speed of rendering and fetching of value from the mouse is appreciable,and the demands of real-time and interaction are satisfied.
文摘After setting the ground of the quantum innovation potential of biosourced entities and outlining the inventive spectrum of adjacent technologies that can derive from those, the current review highlights, with the support of Bigger Data approaches, and a fairly large number of articles, more than 250 and 10,000 patents, the following. It covers an overview of biosourced chemicals and materials, mainly biomonomers, biooligomers and biopolymers;these are produced today in a way that allows reducing the fossil resources depletion and dependency, and obtaining environmentally-friendlier goods in a leaner energy consuming society. A process with a realistic productivity is underlined thanks to the implementation of recent and specifically effective processes where engineered microorganisms are capable to convert natural non-fossil goods, at industrial scale, into fuels and useful high-value chemicals in good yield. Those processes, further detailed, integrate: metabolic engineering involving 1) system biology, 2) synthetic biology and 3) evolutionary engineering. They enable acceptable production yield and productivity, meet the targeted chemical profiles, minimize the consumption of inputs, reduce the production of by-products and further diminish the overall operation costs. As generally admitted the properties of most natural occurring biopolymers (e.g., starch, poly (lactic acid), PHAs.) are often inferior to those of the polymers derived from petroleum;blends and composites, exhibiting improved properties, are now successfully produced. Specific attention is paid to these aspects. Then further evidence is provided to support the important potential and role of products deriving from the biomass in general. The need to enter into the era of Bigger Data, to grow and increase the awareness and multidimensional role and opportunity of biosourcing serves as a conclusion and future prospects. Although providing a large reference database, this review is largely initiatory, therefore not mimicking previous classic reviews but putting them in a multiplying synergistic prospective.
文摘Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company.
文摘The gap between SDA(Spatial Data Analysis)and GIS(Geographical Information Systems )existed for a long time.Presently this problem still remains in spite of a lot of theore tical and practical studies which tr y to find the solu-tion for it.The research background and current situation about how to in tegrate SDA and GIS are introduced at first.The main idea of this article is to make su re what is the best scheme to bridge th e gap between SDA and GIS and how to design it.There are a lot of factors to influ ence the standards to assess such a sc heme,for instance,the attitude of users and GIS developers,the framework and related functions of current available GI S software in the market and so on.But the two most important ones of them are effic iency and flexibility of the scheme i tself.Efficiency can be measured by the conve-nient extent and temporal length when it is used for carrying out SDA.Flex ibility means users can define their own SDA methods.The best integration schem e should satisfy the two standards at the same time.A group of functions,which can be combined to implement any SDA meth od,are defined in order to design such an integration scheme.The functio ns are divided into five classes according to their properties.
基金Canada Research Chair(950231363,XZ),Natural Sciences and Engineering Research Council of Canada(NSERC)Discovery Grants(RGPIN-20203530,LX)the Social Sciences and Humanities Research Council of Canada(SSHRC)Insight Development Grants(430-2018-00557,KX).
文摘Full electronic automation in stock exchanges has recently become popular,generat-ing high-frequency intraday data and motivating the development of near real-time price forecasting methods.Machine learning algorithms are widely applied to mid-price stock predictions.Processing raw data as inputs for prediction models(e.g.,data thinning and feature engineering)can primarily affect the performance of the prediction methods.However,researchers rarely discuss this topic.This motivated us to propose three novel modelling strategies for processing raw data.We illustrate how our novel modelling strategies improve forecasting performance by analyzing high-frequency data of the Dow Jones 30 component stocks.In these experiments,our strategies often lead to statistically significant improvement in predictions.The three strategies improve the F1 scores of the SVM models by 0.056,0.087,and 0.016,respectively.
文摘Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals as well as directly communicate with one or several peer nodes. One important issue to be considered in wireless Mesh networks is how to secure reliable data transmission in multi-hop links. To solve the problem, the 3GPP system architecture proposes two functionalities: ARQ and HARQ. This paper presents two HARQ schemes, namely hop-by-hop and edge-to-edge, and three ARQ schemes: hop-by-hop, edge-to-edge, and last-hop. Moreover, it proposes three solutions for WMNs from the perspective of protocol stock design: layered cooperative mechanism, relay ARQ mechanism and multi-hop mechanism.
文摘An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The method first discovers the routes between the data sensors and the sink node.Several factors are considered for each sensor node along the route,including energy,number of neighbours,previous transmissions,and energy depletion ratio.Considering all these variables,the Sink Reachable Support Measure and the Secure Communication Support Measure,the method evaluates two distinct measures.The method calculates the data carrier support value using these two metrics.A single route is chosen to collect data based on the value of data carrier support.It has contributed to the design of Secure Communication Support(SCS)Estimation.This has been measured according to the strategy of each hop of the route.The suggested method improves the security and efficacy of data collection in wireless sensor networks.The second stage uses the two-fish approach to build a trust model for secure data transfer.A sim-ulation exercise was conducted to evaluate the effectiveness of the suggested framework.Metrics,including PDR,end-to-end latency,and average residual energy,were assessed for the proposed model.The efficiency of the suggested route design serves as evidence for the average residual energy for the proposed framework.
文摘The incidence of cybercrime in Zambia is rising, with perpetrators exhibiting a growing tendency to focus on corporate entities and private citizens. The Zambian government has tried to resolve the issue of network protection dangers through the execution of different approaches and procedures. Notwithstanding, the adequacy of these actions has been restricted. The present research investigates Zambia’s extant cybersecurity policies and strategies and delineates several domains where enhancements can be made. The research provides several suggestions on how the Zambian government can enhance its efforts to address cybercrime. This research employs a qualitative approach to investigate the extent of cybersecurity policies and strategies in Zambia by analyzing secondary data. The study seeks to offer valuable insights into the efficacy of Zambia’s cybersecurity framework in addressing the escalating menace of cybercrime by scrutinizing pertinent literature, government reports, and academic articles. The results of this study provide valuable insights into the difficulties encountered by the nation and propose suggestions for improving current policies and strategies.
文摘Hainan is a major tourist province.It is urgent to promote the transformation and upgrading of Hainan’s tourism industry from a traditional service industry to a modern service industry by means of informatization.Smart tourism is a brand-new tourism form and operation mode of tourism transformation and upgrading.Integrating big data technology will make smart tourism more accurate in three aspects:tourism management,tourism service,and tourism marketing,and further enhance the satisfaction of the tourism experience.This paper studies the development status of smart tourism in Hainan,deeply summarizes its existing problems and causes,and puts forward the development strategy of smart tourism in Hainan to promote the healthy development of the tourism industry in Hainan.
文摘In the 21st century,with the development of the Internet,mobile devices,and information technology,society has entered a new era:the era of big data.With the help of big data technology,enterprises can obtain massive market and consumer data,realize in-depth analysis of business and market,and enable enterprises to have a deeper understanding of consumer needs,preferences,and behaviors.At the same time,big data technology can also help enterprises carry out human resource management innovation and improve the performance and competitiveness of enterprises.Of course,from another perspective,enterprises in this era are also facing severe challenges.In the face of massive data processing and analysis,it requires superb data processing and analysis capabilities.Secondly,enterprises need to reconstruct their management system to adapt to the changes in the era of big data.Enterprises must treat data as assets and establish a perfect data management system.In addition,enterprises also need to pay attention to protecting customer privacy and data security to avoid data leakage and abuse.In this context,this paper will explore the thinking of enterprise human resource management innovation in the era of big data,and put forward some suggestions on enterprise human resource management innovation.
文摘With the rapid development and widespread application of Big Data technology, the supply chain management of agricultural products enterprises is facing unprecedented reform and challenges. This study takes the perspective of Big Data technology and collects relevant information on the application of supply chain management in 100 agricultural product enterprises through a survey questionnaire. The study found that the use of Big Data can effectively improve the accuracy of demand forecasting, inventory management efficiency, optimize logistics costs, improve supplier management efficiency, enhance the overall level of supply chain management of enterprises, and propose innovative strategies for supply chain management of agricultural products enterprises based on this. Big Data technology brings a new solution for agricultural products enterprises to enhance their supply chain management level, making the supply chain smarter and more efficient.
基金Tianjin Education Commission Research Program in Humanities and Social Sciences(Project No.2022SK064)。
文摘With advancements in information technology and the increasing demand for data-driven governance,the openness of public data has become essential for global governance and social innovation.However,legal risks related to privacy protection,data security,intellectual property,liability allocation,and legal adaptability pose significant challenges to data governance in China.This paper analyzes these risks and proposes three strategies:enhancing the legal framework through clear data classification and accountability mechanisms,establishing regulatory bodies to monitor data usage,and promoting public education on data privacy.These strategies aim to address gaps in legal discourse and guide effective data governance,contributing to the secure development of open data initiatives in China and beyond.
文摘This study explores the integration of predictive analytics in strategic corporate communications, with a specific focus on stakeholder engagement and crisis management. Our mixed-methods approach, which combines a comprehensive literature review with case studies of five multinational corporations, allows us to investigate the applications, challenges, and ethical implications of leveraging predictive models in communication strategies. While our findings reveal significant potential for enhancing personalized content delivery, real-time sentiment analysis, and proactive crisis management, we stress the need for careful consideration of challenges such as data privacy concerns and algorithmic bias. This emphasis on ethical implementation is crucial in navigating the complex landscape of predictive analytics in corporate communications. To address these issues, we propose a framework that prioritizes ethical considerations. Furthermore, we identify key areas for future research, thereby contributing to the evolving field of data-driven communication management.