Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Machine learning

Turkish Journal of Electrical Engineering and Computer Sciences

Articles 31 - 59 of 59

Full-Text Articles in Physical Sciences and Mathematics

Satire Identification In Turkish News Articles Based On Ensemble Of Classifiers, Aytuğ Onan, Mansur Alp Toçoğlu Jan 2020

Satire Identification In Turkish News Articles Based On Ensemble Of Classifiers, Aytuğ Onan, Mansur Alp Toçoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Social media and microblogging platforms generally contain elements of figurative and nonliteral language, including satire. The identification of figurative language is a fundamental task for sentiment analysis. It will not be possible to obtain sentiment analysis methods with high classification accuracy if elements of figurative language have not been properly identified. Satirical text is a kind of figurative language, in which irony and humor have been utilized to ridicule or criticize an event or entity. Satirical news is a pervasive issue on social media platforms, which can be deceptive and harmful. This paper presents an ensemble scheme for satirical news …


Deep Neural Network Based M-Learning Model For Predicting Mobile Learners'performance, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq, Arsalan Ali Jan 2020

Deep Neural Network Based M-Learning Model For Predicting Mobile Learners'performance, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq, Arsalan Ali

Turkish Journal of Electrical Engineering and Computer Sciences

The use of deep learning (DL) techniques for mobile learning is an emerging field aimed at developing methods for finding mobile learners' learning behavior and exploring important learning features. The learning features (learning time, learning location, repetition rate, content types, learning performance, learning time duration, and so on) act as fuel to DL algorithms based on which DL algorithms can classify mobile learners into different learning groups. In this study, a powerful and efficient m-learning model is proposed based on DL techniques to model the learning process of m-learners. The proposed m-learning model determines the impact of independent learning features …


Comparative Analysis Of Classification Techniques For Network Fault Management, Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah Jan 2020

Comparative Analysis Of Classification Techniques For Network Fault Management, Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah

Turkish Journal of Electrical Engineering and Computer Sciences

Network troubleshooting is a significant process. Many studies were conducted about it. The first step in the troubleshooting procedures is represented in collecting information. It's collected in order to identify the problems. Syslog messages which are sent by almost all network devices include a massive amount of data that concern the network problems. Based on several studies, it was found that analyzing syslog data (which) can be a guideline for network problems and their causes. The detection of network problems can become more efficient if the detected problems have been classified based on the network layers. Classifying syslog data requires …


Revised Polyhedral Conic Functions Algorithm For Supervised Classification, Gürhan Ceylan, Gürkan Öztürk Jan 2020

Revised Polyhedral Conic Functions Algorithm For Supervised Classification, Gürhan Ceylan, Gürkan Öztürk

Turkish Journal of Electrical Engineering and Computer Sciences

In supervised classification, obtaining nonlinear separating functions from an algorithm is crucial for prediction accuracy. This paper analyzes the polyhedral conic functions (PCF) algorithm that generates nonlinear separating functions by only solving simple subproblems. Then, a revised version of the algorithm is developed that achieves better generalization and fast training while maintaining the simplicity and high prediction accuracy of the original PCF algorithm. This is accomplished by making the following modifications to the subproblem: extension of the objective function with a regularization term, relaxation of a hard constraint set and introduction of a new error term. Experimental results show that …


Exploring The Parameter Space Of Human Activity Recognition With Mobile Devices, Berrenur Saylam, Muhammad Shoaib, Özlem Durmaz İncel Jan 2020

Exploring The Parameter Space Of Human Activity Recognition With Mobile Devices, Berrenur Saylam, Muhammad Shoaib, Özlem Durmaz İncel

Turkish Journal of Electrical Engineering and Computer Sciences

Motion sensors available on smart phones make it possible to recognize human activities. Accelerometer, gyroscope, magnetometer, and their various combinations are used to classify, particularly, locomotion activities, ranging from walking to biking. In most of the studies, the focus is on the collection of data and on the analysis of the impact of different parameters on the recognition performance. The parameter space includes the types of sensors used, features, classification algorithms, and position/orientation of the mobile device. In most of the studies, the impact of some of these parameters is partially analyzed; however, in this work, we investigate the parameter …


Lung Cancer Subtype Differentiation From Positron Emission Tomography Images, Oğuzhan Ayyildiz, Zafer Aydin, Bülent Yilmaz, Seyhan Karaçavuş, Kübra Şenkaya, Semra İçer, Erdem Arzu Taşdemi̇r, Eser Kaya Jan 2020

Lung Cancer Subtype Differentiation From Positron Emission Tomography Images, Oğuzhan Ayyildiz, Zafer Aydin, Bülent Yilmaz, Seyhan Karaçavuş, Kübra Şenkaya, Semra İçer, Erdem Arzu Taşdemi̇r, Eser Kaya

Turkish Journal of Electrical Engineering and Computer Sciences

Lung cancer is one of the deadly cancer types, and almost 85 % of lung cancers are nonsmall cell lung cancer (NSCLC). In the present study we investigated classification and feature selection methods for the differentiation of two subtypes of NSCLC, namely adenocarcinoma (ADC) and squamous cell carcinoma (SqCC). The major advances in understanding the effects of therapy agents suggest that future targeted therapies will be increasingly subtype specific. We obtained positron emission tomography (PET) images of 93 patients with NSCLC, 39 of which had ADC while the rest had SqCC. Random walk segmentation was applied to delineate three-dimensional tumor …


Fast Texture Classification Of Denoised Sar Image Patches Using Glcm On Spark, Caner Özcan, Kadri̇ Okan Ersoy, İskender Ülgen Oğul Jan 2020

Fast Texture Classification Of Denoised Sar Image Patches Using Glcm On Spark, Caner Özcan, Kadri̇ Okan Ersoy, İskender Ülgen Oğul

Turkish Journal of Electrical Engineering and Computer Sciences

Classification of a synthetic aperture radar (SAR) image is an essential process for SAR image analysis and interpretation. Recent advances in imaging technologies have allowed data sizes to grow, and a large number of applications in many areas have been generated. However, analysis of high-resolution SAR images, such as classification, is a time-consuming process and high-speed algorithms are needed. In this study, classification of high-speed denoised SAR image patches by using Apache Spark clustering framework is presented. Spark is preferred due to its powerful open-source cluster-computing framework with fast, easy-to-use, and in-memory analytics. Classification of SAR images is realized on …


Sketic: A Machine Learning-Based Digital Circuit Recognition Platform, Mohamamd Abdel Majeed, Tasneem Almousa, Maysaa Alsalman, Abeer Yosef Jan 2020

Sketic: A Machine Learning-Based Digital Circuit Recognition Platform, Mohamamd Abdel Majeed, Tasneem Almousa, Maysaa Alsalman, Abeer Yosef

Turkish Journal of Electrical Engineering and Computer Sciences

In digital system design, digital logic circuit diagrams are built using interconnects and symbolic representations of the basic logic gates. Constructing such diagrams using free sketches is the first step in the design process. After that the circuit schematic or code has to be generated before being able to simulate the design. While most of the mentioned steps are automated using design automation tools, drafting the schematic circuit and then converting it into a valid format that can be simulated are still done manually due to the lack of robust tools that can recognize the free sketches and incorporate them …


Mlcocoa: A Machine Learning-Based Congestion Control For Coap, Alper Kami̇l Demi̇r, Fati̇h Abut Jan 2020

Mlcocoa: A Machine Learning-Based Congestion Control For Coap, Alper Kami̇l Demi̇r, Fati̇h Abut

Turkish Journal of Electrical Engineering and Computer Sciences

Internet of Things (IoT) is a technological invention that has the potential to impact on how we live and how we work by connecting any device to the Internet. Consequently, a vast amount of novel applications will enhance our lives. Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) to accommodate the application layer and network congestion needs of such IoT networks. CoAP is designed to be very simple where it employs a genuine congestion control (CC) mechanism, named as default CoAP CC leveraging basic binary exponential backoff. Yet efficient, default CoAP CC does not always utilize the …


Improving Anomaly Detection In Bgp Time-Series Data By New Guide Features And Moderated Feature Selection Algorithm, Mahmoud Hashem, Ahmed Bashandy, Samir Shaheen Jan 2019

Improving Anomaly Detection In Bgp Time-Series Data By New Guide Features And Moderated Feature Selection Algorithm, Mahmoud Hashem, Ahmed Bashandy, Samir Shaheen

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet infrastructure relies on the Border Gateway Protocol (BGP) to provide essential routing information where abnormal routing behavior impairs global Internet connectivity and stability. Hence, employing anomaly detection algorithms is important for improving the performance of BGP routing protocol. In this paper, we propose two algorithms; the first is the guide feature generator (GFG), which generates guide features from traditional features in BGP time-series data using moving regression in combination with smoothed moving average. The second is a modified random forest feature selection algorithm which is employed to automatically select the most dominant features (ASMDF). Our mechanism shows that …


Performance Tuning For Machine Learning-Based Software Development Effort Prediction Models, Egemen Ertuğrul, Zaki̇r Baytar, Çağatay Çatal, Ömer Can Muratli Jan 2019

Performance Tuning For Machine Learning-Based Software Development Effort Prediction Models, Egemen Ertuğrul, Zaki̇r Baytar, Çağatay Çatal, Ömer Can Muratli

Turkish Journal of Electrical Engineering and Computer Sciences

Software development effort estimation is a critical activity of the project management process. In this study, machine learning algorithms were investigated in conjunction with feature transformation, feature selection, and parameter tuning techniques to estimate the development effort accurately and a new model was proposed as part of an expert system. We preferred the most general-purpose algorithms, applied parameter optimization technique (GridSearch), feature transformation techniques (binning and one-hot-encoding), and feature selection algorithm (principal component analysis). All the models were trained on the ISBSG datasets and implemented by using the scikit-learn package in the Python language. The proposed model uses a multilayer …


Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq Jan 2019

Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq

Turkish Journal of Electrical Engineering and Computer Sciences

It is a knotty task to amicably identify the sporadically changing real-world context information of a learner during M-learning processes. Contextual information varies greatly during the learning process. Contextual information that affects the learner during a learning process includes background knowledge, learning time, learning location, and environmental situation. The computer programming skills of learners improve rapidly if they are encouraged to solve real-world programming problems. It is important to guide learners based on their contextual information in order to maximize their learning performance. In this paper, we proposed a cloud-supported machine learning system (CSMLS), which assists learners in learning practical …


Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ Jan 2019

Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ

Turkish Journal of Electrical Engineering and Computer Sciences

Blood pressure is the pressure by the blood to the vein wall. High blood pressure, which is called silent death, is the cause of nearly 13 % of mortality all over the world. Blood pressure is not only measured in the medical environment, but the blood pressure measurement is also a need for people in their daily life. Blood pressure estimation systems with low error rates have been developed besides the new technologies and algorithms. Blood pressure measurements are differentiated as invasive blood pressure (IBP) measurement and noninvasive blood pressure (NIBP) measurement methods. Although IBP measurement provides the most accurate …


A Hybrid Feature-Selection Approach For Finding The Digital Evidence Of Web Application Attacks, Mohammed Babiker, Eni̇s Karaarslan, Yaşar Hoşcan Jan 2019

A Hybrid Feature-Selection Approach For Finding The Digital Evidence Of Web Application Attacks, Mohammed Babiker, Eni̇s Karaarslan, Yaşar Hoşcan

Turkish Journal of Electrical Engineering and Computer Sciences

The most critical challenge of web attack forensic investigations is the sheer amount of data and level of complexity. Machine learning technology might be an efficient solution for web attack analysis and investigation. Consequently, machine learning applications have been applied in various areas of information security and digital forensics, and have improved over time. Moreover, feature selection is a crucial step in machine learning; in fact, selecting an optimal feature subset could enhance the accuracy and performance of the predictive model. To date, there has not been an adequate approach to select optimal features for the evidence of web attack. …


Energy Saving Scheduling In A Fog-Based Iot Application By Bayesian Task Classification Approach, Gholamreza Heydari, Dadmehr Rahbari, Mohsen Nickray Jan 2019

Energy Saving Scheduling In A Fog-Based Iot Application By Bayesian Task Classification Approach, Gholamreza Heydari, Dadmehr Rahbari, Mohsen Nickray

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things increases information volume in computer networks and the concept of fog will help us to control this volume more efficiently. Scheduling resources in such an environment would be an NP-Hard problem. This article has studied the concept of scheduling in fog with Bayesian classification which could be applied to gain the task requirements like the processing ones. After classification, virtual machines will be created in accordance with the predicted requirements. The ifogsim simulator has been applied to study our fog-based Bayesian classification scheduling (FBCS) method performance in an EEG tractor application. Algorithms have been evaluated on …


Identifying Criminal Organizations From Their Social Network Structures, Muhammet Serkan Çi̇nar, Burkay Genç, Hayri̇ Sever Jan 2019

Identifying Criminal Organizations From Their Social Network Structures, Muhammet Serkan Çi̇nar, Burkay Genç, Hayri̇ Sever

Turkish Journal of Electrical Engineering and Computer Sciences

Identification of criminal structures within very large social networks is an essential security feat. By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act. We evaluate the effectiveness of three different methods for classifying an unknown network as terrorist, cocaine, or noncriminal. We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis. The empirical results show that these three methods can provide significant improvements in distinguishing all three network types. We show that these …


An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N Jan 2019

An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N

Turkish Journal of Electrical Engineering and Computer Sciences

Researchers train and build specific models to classify the presence and absence of a disease and the accuracy of such classification models is continuously improved. The process of building a model and training depends on the medical data utilized. Various machine learning techniques and tools are used to handle different data with respect to disease types and their clinical conditions. Classification is the most widely used technique to classify disease and the accuracy of the classifier largely depends on the attributes. The choice of the attribute largely affects the diagnosis and performance of the classifier. Due to growing large volumes …


Dop: Discover Objects And Paths, A Model For Automated Navigation Andselection In Virtual Environments, Muhammad Raees, Sehat Ullah Jan 2019

Dop: Discover Objects And Paths, A Model For Automated Navigation Andselection In Virtual Environments, Muhammad Raees, Sehat Ullah

Turkish Journal of Electrical Engineering and Computer Sciences

Navigation and selection are the two interaction tasks often needed for the manipulation of an object in a synthetic world. An interface that supports automatic navigation and selection may increase the realism of a virtual reality (VR) system. Such an engrossing interface of a VR system is possible by incorporating machine learning (ML) into the realm of the virtual environment (VE). The use of intelligence in VR systems, however, is a milestone yet to be achieved to make seamless realism in a VE possible. To improve the believability of an intelligent virtual agent (IVA), this research work presents DOP (Discover …


Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman Jan 2019

Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman

Turkish Journal of Electrical Engineering and Computer Sciences

The heart is an important organ in the human body, and acute myocardial infarction (AMI) is the leading cause of death in most countries. Researchers are doing a lot of data analysis work to assist doctors in predicting the heart problem. An analysis of the data related to different health problems and its functions can help in predicting the wellness of this organ with a degree of certainty. Our research reported in this paper consists of two main parts. In the first part of the paper, we compare different predictive models of hospital mortality for patients with AMI. All results …


Modified Stacking Ensemble Approach To Detect Network Intrusion, Necati̇ Demi̇r, Gökhan Dalkiliç Jan 2018

Modified Stacking Ensemble Approach To Detect Network Intrusion, Necati̇ Demi̇r, Gökhan Dalkiliç

Turkish Journal of Electrical Engineering and Computer Sciences

Detecting intrusions in a network traffic has remained an issue for researchers over the years. Advances in the area of machine learning provide opportunities to researchers to detect network intrusion without using a signature database. We studied and analyzed the performance of a stacking technique, which is an ensemble method that is used to combine different classification models to create a better classifier, on the KDD'99 dataset. In this study, the stacking method is improved by modifying the model generation and selection techniques and by using different classifications algorithms as a combiner method. Model generation is performed using subsets of …


An Adaptive Machine Learning-Based Qoe Approach In Sdn Context For Video-Streaming Services, Asma Ben Letaifa Jan 2018

An Adaptive Machine Learning-Based Qoe Approach In Sdn Context For Video-Streaming Services, Asma Ben Letaifa

Turkish Journal of Electrical Engineering and Computer Sciences

In data service applications over the Internet, user perception and satisfaction can be assessed by quality of experience (QoE) metrics. QoE depends both on the users' perception and the used service, which together form end-to-end metrics. While network optimization has traditionally focused on optimizing network properties such as QoS, we focus in this work on optimizing end-to-end QoE metrics with the aim to deliver to the client a good QoE that can be monitored in real time. We argue that end-user QoE is a relevant measurement for network operators and service providers. In this paper, we present a machine learning …


A Comparison Of Feature Extraction Techniques For Malware Analysis, Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir Jan 2017

A Comparison Of Feature Extraction Techniques For Malware Analysis, Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir

Turkish Journal of Electrical Engineering and Computer Sciences

The manifold growth of malware in recent years has resulted in extensive research being conducted in the domain of malware analysis and detection, and theories from a wide variety of scientific knowledge domains have been applied to solve this problem. The algorithms from the machine learning paradigm have been particularly explored, and many feature extraction methods have been proposed in the literature for representing malware as feature vectors to be used in machine learning algorithms. In this paper we present a comparison of several feature extraction techniques by first applying them on system call logs of real malware, and then …


Late Fusion Of Facial Dynamics For Automatic Expression Recognition, Alessandra Bandrabur, Laura Florea, Cornel Florea, Matei Mancas Jan 2017

Late Fusion Of Facial Dynamics For Automatic Expression Recognition, Alessandra Bandrabur, Laura Florea, Cornel Florea, Matei Mancas

Turkish Journal of Electrical Engineering and Computer Sciences

Installment of a facial expression is associated with contractions and extensions of specific facial muscles. Noting that expression is about changes, we present a model for expression classification based on facial landmarks dynamics. Our model isolates the trajectory of facial fiducial points by wrapping them up in relevant features and discriminating among various alternatives with a machine learning classification system. The used features are geometric and temporal-based and the classification system is represented by a late fusion framework that combines several neural networks with binary responses. The proposed method is robust, being able to handle complex expression classes.


Feature Selection For Movie Recommendation, Zehra Çataltepe, Mahi̇ye Uluyağmur, Esengül Tayfur Jan 2016

Feature Selection For Movie Recommendation, Zehra Çataltepe, Mahi̇ye Uluyağmur, Esengül Tayfur

Turkish Journal of Electrical Engineering and Computer Sciences

TV users have an abundance of different movies they could choose from, and with the quantity and quality of data available both on user behavior and content, better recommenders are possible. In this paper, we evaluate and combine different content-based and collaborative recommendation methods for a Turkish movie recommendation system. Our recommendation methods can make use of user behavior, different types of content features, and other users' behavior to predict movie ratings. We gather different types of data on movies, such as the description, actors, directors, year, and genre. We use natural language processing methods to convert the Turkish movie …


A Mapreduce-Based Distributed Svm Algorithm For Binary Classification, Ferhat Özgür Çatak, Mehmet Erdal Balaban Jan 2016

A Mapreduce-Based Distributed Svm Algorithm For Binary Classification, Ferhat Özgür Çatak, Mehmet Erdal Balaban

Turkish Journal of Electrical Engineering and Computer Sciences

Although the support vector machine (SVM) algorithm has a high generalization property for classifying unseen examples after the training phase~and a small loss value, the algorithm is not suitable for real-life classification and regression problems. SVMs cannot solve hundreds of thousands of examples in a training dataset. In previous studies on distributed machine-learning algorithms, the SVM was trained in a costly and preconfigured computer environment. In this research, we present a MapReduce-based distributed parallel SVM training algorithm for binary classification problems. This work shows how to distribute optimization problems over cloud computing systems with the MapReduce technique. In the second …


Removal Of Impulse Noise In Digital Images With Na\"Ive Bayes Classifier Method, Cafer Budak, Mustafa Türk, Abdullah Toprak Jan 2016

Removal Of Impulse Noise In Digital Images With Na\"Ive Bayes Classifier Method, Cafer Budak, Mustafa Türk, Abdullah Toprak

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


An Urgent Precaution System To Detect Students At Risk Of Substance Abuse Through Classification Algorithms, Faruk Bulut, İhsan Ömür Bucak Jan 2014

An Urgent Precaution System To Detect Students At Risk Of Substance Abuse Through Classification Algorithms, Faruk Bulut, İhsan Ömür Bucak

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the use of addictive drugs and substances has turned out to be a challenging social problem worldwide. The illicit use of these types of drugs and substances appears to be increasing among elementary and high school students. After becoming addicted to drugs, life becomes unbearable and gets even worse for their users. Scientific studies show that it becomes extremely difficult for an individual to break this habit after being a user. Hence, preventing teenagers from addiction becomes an important issue. This study focuses on an urgent precaution system that helps families and educators prevent teenagers from developing …


An Automated Prognosis System For Estrogen Hormone Status Assessment In Breast Cancer Tissue Samples, Fati̇h Sarikoç, Adem Kalinli, Hülya Akgün, Fi̇gen Öztürk Jan 2013

An Automated Prognosis System For Estrogen Hormone Status Assessment In Breast Cancer Tissue Samples, Fati̇h Sarikoç, Adem Kalinli, Hülya Akgün, Fi̇gen Öztürk

Turkish Journal of Electrical Engineering and Computer Sciences

Estrogen receptor (ER) status evaluation is a widely applied method in the prognosis of breast cancer. However, testing for the existence of the ER biomarker in a patient's tumor sample mainly depends on the subjective decisions of the doctors. The aim of this paper is to introduce the usage of a machine learning tool, functional trees (FTs), to attain an ER prognosis of the disease via an objective decision model. For this aim, 27 image files, each of which came from a biopsy sample of an invasive ductal carcinoma patient, were scanned and captured by a light microscope. From these …


Anticipating The Friction Coefficient Of Friction Materials Used In Automobiles By Means Of Machine Learning Without Using A Test Instrument, Mustafa Ti̇mur, Fati̇h Aydin Jan 2013

Anticipating The Friction Coefficient Of Friction Materials Used In Automobiles By Means Of Machine Learning Without Using A Test Instrument, Mustafa Ti̇mur, Fati̇h Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

The most important factor for designs in which friction materials are used is the coefficient of friction. The coefficient of friction has been determined taking such variants as velocity, temperature, and pressure into account, which arise from various factors in friction materials, and by analyzing the effects of these variants on friction materials. Many test instruments have been produced in order to determine the coefficient of friction. In this article, a study about the use of machine learning algorithms instead of test instruments in order to determine the coefficient of friction is presented. Isotonic regression was selected as the machine …