Academic literature on the topic 'Intelligence service – history'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intelligence service – history.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intelligence service – history"

1

Friedman, William F. "A BRIEF HISTORY OF THE SIGNAL INTELLIGENCE SERVICE." Cryptologia 15, no. 3 (1991): 263–72. http://dx.doi.org/10.1080/0161-119191865939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

ALDRICH, RICHARD J. "Britain's Secret Intelligence Service in Asia During the Second World War." Modern Asian Studies 32, no. 1 (1998): 179–217. http://dx.doi.org/10.1017/s0026749x9800290x.

Full text
Abstract:
The past twenty years have seen the rapid growth of a new branch of international history, the serious academic study of secret services or ‘intelligence history’ with its attendant specialist conferences and journals. Two main causes for this development can be identified. The first was conceptual, namely the increasing recognition that the study of international history was greatly impoverished by the reluctance of academic historians to address a subject which appeared capable of shedding considerable light upon the conduct of international affairs. Two leading historians underlined this du
APA, Harvard, Vancouver, ISO, and other styles
3

Yudko, Ludmyla. "Concept TOLERANCE OF INTELLIGENCE SERVICE in psycholinguistic dimension." PSYCHOLINGUISTICS 25, no. 2 (2019): 371–89. http://dx.doi.org/10.31470/2309-1797-2019-25-2-371-389.

Full text
Abstract:
The article concentrates on the role of the concepts TOLERANCE OF INTELLIGENCE SERVICE, DIE TOLERANZ DES SICHERHEITSDIENSTES, ТОЛЕРАНТНОСТЬ СПЕЦСЛУЖБЫ, ТОЛЕРАНТНІСТЬ СПЕЦСЛУЖБИ in institutional discourse practice, which is a testimony of positive strategies and forms of behavior to avoid conflict situations in communication; it also gives analysis and systematization of modern scientific approaches and methods of research of concepts at the intersection of Linguistics and other humanities (Linguoculturology, Linguophilosophy, Linguopragmatics, Linguocognitology, Psycholinguistic); the effectiv
APA, Harvard, Vancouver, ISO, and other styles
4

Zamir, Meir. "MI6: The History of the Secret Intelligence Service, 1909–1949." Middle Eastern Studies 48, no. 4 (2012): 681–83. http://dx.doi.org/10.1080/00263206.2012.691743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Warburg, Gabriel. "A History of the Egyptian Intelligence Service, A History of the Mukhabarat, 1910–2009." Middle Eastern Studies 48, no. 2 (2012): 311–13. http://dx.doi.org/10.1080/00263206.2011.648872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shaffer, Ryan. "A history of the Egyptian intelligence service: a history of the Mukhabarat, 1910–2009." Journal of Intelligence History 18, no. 1 (2018): 112–14. http://dx.doi.org/10.1080/16161262.2018.1537034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Browder, George C., David Childs, and Richard Popplewell. "The Stasi: The East German Intelligence Security Service." American Historical Review 103, no. 3 (1998): 923. http://dx.doi.org/10.2307/2650658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zaichenko, Olga. "“Russian Spy” Schweitzer: An Attempt at Biography Reconstruction. Agent of the High Military Secret Police in Warsaw (1819–1831)." Novaia i noveishaia istoriia, no. 1 (2023): 33. http://dx.doi.org/10.31857/s013038640020835-6.

Full text
Abstract:
In the early 1830s, in order to wage a political and information war on Polish emigrants and the European opposition, the formation of Russian foreign intelligence as a unified state service with an extensive network of agents on the basis of the Third Section began. The head of the Russian residence in Germany from 1833 to 1839, Baron Karl Ferdinandovich von Schweitzer, was one of its founders. The structure he created, as well as the forms and methods of intelligence work he put in place, had a major impact on the subsequent development of the security services in Russia. However, little is
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Bohan. "Artificial Intelligence in Marketing." Transactions on Social Science, Education and Humanities Research 9 (July 8, 2024): 181–87. http://dx.doi.org/10.62051/s4y73e41.

Full text
Abstract:
This thesis explores the application of artificial intelligence in marketing and the trends, challenges and opportunities of digital transformation. Firstly, it introduces the definition, development history and main technology and application areas of artificial intelligence. Then, it analyses the overview of the application of AI in the business field, including personalised recommendation, intelligent customer service and other aspects. Subsequently, how AI has changed marketing strategies and practices is explored and compared with traditional approaches. In terms of specific applications,
APA, Harvard, Vancouver, ISO, and other styles
10

Osmond, J. "Book Review: The Stasi: The East German Intelligence and Security Service." German History 19, no. 3 (2001): 491–92. http://dx.doi.org/10.1177/026635540101900336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Intelligence service – history"

1

Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979." Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Skaarup, H. A. "An intelligence advantage, collective security benefits gained by Canada through the sharing of military intelligence with the United States of America." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq22780.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O'Connell, Barry John. "British intelligence during the war against Napoleon, 1807-1815." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jakub, Joseph F. "Spies and saboteurs : Anglo-American collaboration and rivalry in human intelligence collection and special operations, 1940-1945." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.670255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gioe, David Vincent. "The Anglo-American special intelligence relationship : wartime causes and Cold War consequences, 1940-63." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jenkins, Danny R. "Winning trench warfare battlefield intelligence in the Canadian Corps, 1914-1918 /." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0018/NQ57601.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Collins, Steven Morris. "Intelligence and the Uprising in East Germany 1953: An Example of Political Intelligence." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1011823/.

Full text
Abstract:
In 1950, the leader of the German Democratic Republic (East Germany), Walter Ulbricht, began a policy of connecting foreign threats with domestic policy failures as if the two were the same, and as if he was not responsible for either. This absolved him of blame for those failures and allowed Ulbricht to define his internal enemies as agents of the western powers. He used the state's secret police force, known as the Stasi, to provide the information that supported his claims of western obstructionism and to intimidate his adversaries. This resulted in a politicization of intelligence whereby
APA, Harvard, Vancouver, ISO, and other styles
8

Rezk, Dina. "Anglo-American political and intelligence assessments of Egypt and the Middle East from 1957-1977." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.608033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shackelford, Philip Clayton. "Fighting for Air: Cold War Reorganization and the U.S. Air Force Security Service, 1945-1952." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461432022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War." Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Intelligence service – history"

1

Richard, Deacon. A history of British Secret Service. Grafton, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeffreys-Jones, Rhodri. Cloak and dollar: A history of American secret intelligence. 2nd ed. Yale University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jeffreys-Jones, Rhodri. Cloak and dollar: A history of American secret intelligence. Yale University Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ameringer, Charles D. U.S. foreign intelligence: The secret side of American history. Lexington Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lowenthal, Mark M. U.S. intelligence: Evolutionand anatomy. 2nd ed. Praeger, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jones, R. V. Reflections on intelligence. Heinemann, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

V, Jones R. Reflections on intelligence. Mandarin, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Faligot, Roger. The Chinese secret service. Headline, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

M, Lowenthal Mark. US intelligence: Evolution and anatomy. 2nd ed. Praeger, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Faligot, Roger. The Chinese secret service. Headline, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Intelligence service – history"

1

Altenhöner, Florian. "Selective Transparency. Non-state intelligence services in Germany, 1918/ 1933." In History of Transparency in Politics and Society. V&R unipress, 2020. http://dx.doi.org/10.14220/9783737011556.89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jang, Daeil, Taeeun Kim, and Hwankuk Kim. "History Management for Network Information of IoT Devices." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sumikawa, Yasunobu, and Adam Jatowt. "HistoChatbot: Educating History by Generating Quizzes in Social Network Services." In Leveraging Generative Intelligence in Digital Libraries: Towards Human-Machine Collaboration. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8085-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fonte, Alexandre, José Martins, Marilia Curado, and Edmundo Monteiro. "Stabilizing Intelligent Route Control: Randomized Path Monitoring, Randomized Path Switching or History-Aware Path Switching?" In Management of Converged Multimedia Networks and Services. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-87359-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elicegui, Ignacio, Juan Carrasco, Carmen Perea Escribano, Jose Gato, Andrea Becerra, and Andreas Politis. "Usage-Based Automotive Insurance." In Big Data and Artificial Intelligence in Digital Finance. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94590-9_17.

Full text
Abstract:
AbstractNowadays, pricing strategies for insured clients are supported on general statistics and driver personnel conditions (historic driver activity, age, gender, and address). Cutting-edge technologies such as IoT, AI, and big data have converted current vehicles on a plethora of available real-world and real-time data, leading to novel alternatives of car insurance policies and services such as personalized enhanced products based on their driving profile and evolved services related to the insured context, driver profile, environment, etc. like fraud detection and accident resolution.
APA, Harvard, Vancouver, ISO, and other styles
6

Felfernig, Alexander, Andreas Falkner, and David Benavides. "Introduction." In Feature Models. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-61874-1_1.

Full text
Abstract:
AbstractFeature models (FMs) are an established means for representing variability and commonality properties of software product lines and beyond (e.g., financial services and configurable products such as furniture, cars, and cyber-physical systems). Artificial Intelligence (AI) plays an increasingly important role in supporting feature modelling tasks, FM analysis, and FM configuration. In this chapter, we explain our major motivation for writing this book. We provide a short overview of the history of feature modelling specifically focusing on the relationship between feature modelling rel
APA, Harvard, Vancouver, ISO, and other styles
7

Engen, Robert C. "When the Teeth Eat the Tail: Defence AI in Canada." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_3.

Full text
Abstract:
AbstractCanada is in trouble when it comes to defence artificial intelligence (AI) and is positioned to become a cautionary tale of the early AI years. Although Canada is well-placed globally for AI research, development, funding, and implementation, the country’s defence force is badly positioned to embrace digital transformation. This is a consequence of the organization’s structure, history, and culture, rather than of technical shortcomings. Without remedy, Canada’s AI systems will be small-scale projects, spread throughout siloes within the military complex, with almost no cross-pollinati
APA, Harvard, Vancouver, ISO, and other styles
8

Lai Tsai-Ya and Tarng Jenn-Hwan. "Telehealthcare Development & Effectiveness in Taiwan." In Ambient Intelligence and Smart Environments. IOS Press, 2012. https://doi.org/10.3233/978-1-60750-837-3-67.

Full text
Abstract:
This article is introducing the current development of telehealthcare and reviewing the past history and effect in Taiwan. Since 2006, the government has deployed several projects to facilitate the development of telehealthcare, which including U-Care (2006), 10 year projecton long term care (2007), Taiwan 12 construction project (2008), and six emerging industries (2009). The currently running project, Telehealthcare Service Development Program, started in 2007. This project is targeting Diabetes Mellitus and the population with Hypertension and also developing two models of service delivery,
APA, Harvard, Vancouver, ISO, and other styles
9

Rajalakshmi, K., C. Hemachandran, and K. Guru. "Enhancing Kiosk Efficiency With Artificial Intelligence." In Practical Applications of Self-Service Technologies Across Industries. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-4667-0.ch004.

Full text
Abstract:
This paper explores the integration of Artificial Intelligence (AI) in self-service kiosks, focusing on how customer profiling techniques enhance their efficiency and effectiveness. AI-powered kiosks use algorithms to analyze user behavior, preferences, and demographics, delivering personalized experiences. Methods include purchase history analysis, Wishlist integration, behavioral analytics, and demographic insights, allowing kiosks to recommend tailored products. Sentiment analysis from social media and predictive analytics anticipate customer needs, while context-aware personalization adapt
APA, Harvard, Vancouver, ISO, and other styles
10

Chang Yao-Wen, Sheu Ruey-Kai, Jhu Syuan-Ru, and Chang Yue-Shan. "Design and Implementation of a RESTful Notification Service." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2015. https://doi.org/10.3233/978-1-61499-484-8-1375.

Full text
Abstract:
Scalability was not an important issue in the history of Internet when there were fewer users, so standalone applications performed well for the most part. With the rapid growth of mobile applications or web services, most users are using the same application or service at the same time which leads to the need to scale applications. To enlarge the capability of handling concurrent requests, the server-side push technologies were then introduced in recent years. There are two famous protocols or frameworks used today, and they are the Pub/Sub protocol, and Ajax Push Model. These two mechanisms
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intelligence service – history"

1

Gunaltun, Y. M., D. Supriyatman, and J. Achmad. "Top of Line Corrosion in Multiphase Gas Lines. a Case History." In CORROSION 1999. NACE International, 1999. https://doi.org/10.5006/c1999-99036.

Full text
Abstract:
Abstract Multiphase wet gas flowlines of Tunu field cross the Mahakam River at several locations. Even though the corrosion monitoring systems have shown negligible internal corrosion rates, inspection by intelligent pigging, after six years of service, of two of these flowlines indicated severe internal top of line corrosion (TLC). Corrosion occurred in three locations in one line and at two locations in the other one. The lengths of the corroded pipe sections vary between 10 and 100 meters. Further investigations showed that corrosion took place at locations where the pipes were in direct co
APA, Harvard, Vancouver, ISO, and other styles
2

Smets, Hilde M. G., and Walter El. Bogaerts. "Deriving Corrosion Knowledge from Case Histories: the Neural Network Approach." In CORROSION 1992. NACE International, 1992. https://doi.org/10.5006/c1992-92259.

Full text
Abstract:
Abstract In the corrosion domain, lots of case histories describing different failure situations of several materials under a variety of environmental conditions exist. Athough, perhaps every case history in itself, doesn't provide so much valuable information, knowledge is certainly present when considering the whole of case histories. This source of information is, however, virtually untouched, mainly because suitable technologies for the processing of this kind of information have only recently evolved. In this paper, it will be shown how valuable information can be extracted from case hist
APA, Harvard, Vancouver, ISO, and other styles
3

Ciaraldi, Stephen W., and Phillip Chinching. "Experiences Pigging and Inspecting Mature Subsea Oil Pipelines." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04159.

Full text
Abstract:
Abstract Oil and gas have been produced off the east coast of Trinidad for over 30 years. Production from the authors’ affiliated operations currently originates from eight main fields and is transported between satellite/complex platforms and to onshore terminals through about 50 individual pipelines. Despite excellent service history, the operator recently committed itself to implementing a major work program to clearly demonstrate functional integrity of the main oil and gas lines. This program is a formidable challenge because pigging of pipelines was rarely performed over the years, and i
APA, Harvard, Vancouver, ISO, and other styles
4

Kang, Mun-suk, Soonchul Jung, Jae-dong Lee, Dae-woo Choi, and Jinsoo sohn. "The Service Personalization system for service Bundling based on service usage history." In 2009 13th International Conference on Intelligence in Next Generation Networks (ICIN): "Beyond the Bit Pipes". IEEE, 2009. http://dx.doi.org/10.1109/icin.2009.5357093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

HYSA, Xhimi, and Shefqet SUPARAKU. "Management roots back to the city walls. History, present, and future." In ISSUES OF HOUSING, PLANNING, AND RESILIENT DEVELOPMENT OF THE TERRITORY Towards Euro-Mediterranean Perspectives. POLIS PRESS, 2023. http://dx.doi.org/10.37199/c41000105.

Full text
Abstract:
The terms “manager” and “management” are frequently used in the daily communication. Given the universality trait of management, then every type of organization needs managers and man- agement. Principles of management have remained solid over time, and over all organization- al types. Fundamentals are fundamentals; what changes is the organizational mission, strategy, structure, and culture. The latter make the specific vocabulary of a defined organization. Thus, if principles have remained unchanged, what has changed is how managers respond to environ- mental dynamics and complexity in face
APA, Harvard, Vancouver, ISO, and other styles
6

De Silva, Clarence. "Intelligent Robotics—Misconceptions, Current Trends and Opportunities." In The SLIIT International Conference on Engineering and Technology 2022. Faculty of Engineering, SLIIT, 2022. http://dx.doi.org/10.54389/jxkf1936.

Full text
Abstract:
The concepts of “Robots” have been of interest to humans from the historical times, initially with the desire to create “artificial slaves.” Since the technology was not developing to keep up with the “dreams,” initially Robotics was primarily of entertainment value, relegated to plays, movies, stories, and so on. The practical applications started in the late 1950s and the 1960s with the development of programmable devices for factories and assembly lines, as flexible automation. However, since the expectations were not adequately realized, the general enthusiasm and funding for Robotics subs
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Zhongqing, and Yue Zhang. "DDoS Event Forecasting using Twitter Data." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/580.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks have been significant threats to the Internet. Traditional research in cyber security focuses on detecting emerging DDoS attacks by tracing network package flow. A characteristic of DDoS defense is that rescue time is limited since the launch of attack. More resilient detection and defence models are typically more costly. We aim at predicting the likelihood of DDoS attacks by monitoring relevant text streams in social media, so that the level of defense can be adjusted dynamically for maximizing cost-effect. To our knowledge, this is a novel and ch
APA, Harvard, Vancouver, ISO, and other styles
8

Cernei, Maria, and Andrei Dorogan. "Smart Lift – Intelligent lift service system." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/ce.08.

Full text
Abstract:
The paper presents the results of the development of an intelligent lift service software system that allows the detection of people and their numbers on each floor, the recognition of persons by assigning a conventional identity, the prediction of the destination floor for each user using facial detection applications and data forecasting based on the history of lift usage statistics.
APA, Harvard, Vancouver, ISO, and other styles
9

Pachankis, Yang. "Mass Surveillance, Behavioural Control, And Psychological Coercion the Moral Ethical Risks in Commercial Devices." In 12th International Conference on Computer Science and Information Technology (CCSIT 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121313.

Full text
Abstract:
The research observed, in parallel and comparatively, a surveillance state’s use of communication & cyber networks with satellite applications for power political & realpolitik purposes, in contrast to the outer space security & legit scientific purpose driven cybernetics. The research adopted a psychoanalytic & psychosocial method of observation in the organizational behaviors of the surveillance state, and a theoretical physics, astrochemical, & cosmological feedback method in the contrast group of cybernetics. Military sociology and multilateral movements were adopted in
APA, Harvard, Vancouver, ISO, and other styles
10

Togawa, Satoshi, Akiko Kondo, and Kazuhide Kanenishi. "Design of Learning History Retention Framework using Blockchain Infrastructure to Ensure Reliability of Learning Logs." In Intelligent Human Systems Integration (IHSI 2024) Integrating People and Intelligent Systems. AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004489.

Full text
Abstract:
Learning analytics has been actively pursued in the field of learning assistance field. The spread of LMSs such as Moodle and Canvas LMS has realized the acquisition of a large amount of learning history. Furthermore, an educational assistance system does not consist of only a single LMS. Multiple educational assistance services generate their own learning histories.A Learning Record Store (LRS) exists to collect and analyze these learning logs in an integrated manner. OpenLRW and Learning Locker exist as LRS implementations. In order to avoid losing the large number of learning records genera
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!