<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Anomaly Detection Using a Fuzzy K-Means Algorithm</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Avadh</forename><forename type="middle">Naresh</forename><surname>Kushwaha</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Delhi Technological University</orgName>
								<address>
									<addrLine>Shahbad Daulatpur, Main Bawana</addrLine>
									<region>Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Anomaly Detection Using a Fuzzy K-Means Algorithm</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">3C6267E076113895977244326CF43EA7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:18+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>K-means Algorithm</term>
					<term>Anomaly Detection Clustering Analysis</term>
					<term>Intrusion detection</term>
					<term>Cluster</term>
					<term>Outlier Detection</term>
					<term>Waveform</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Anomaly detection uncovers any abnormal action in the given data set for a different activity. It is an activity to finding patterns that do not conform to expected behavior. Several activities, such as the hourly temperature of a place or the number of users who visit a website per minute, have a regular pattern or waveform that depicts normal behavior. Any deviation from this normal or common pattern means that there is something unusual happening.</p><p>Several methods have been used to detect anomalies/abnormal behavior, such as clustering through finding the underlying patterns or structures within a collection of data to form different clusters. This article describes an anomaly as a particular wave shape that has never been seen before. A library of normal waveforms is created and later used to reconstruct a waveform that is being tested. The "normal" waveforms are determined using the K-means clustering algorithm to group/cluster the similar waveforms. The experiments resulted in a reconstruction error of 23.8%, which indicated there was something abnormal.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Anomaly detection is a method used to recognize abnormal patterns that do not match expected behavior, called outliers. Nowadays, a massive amount of data and software available on social platforms are available to ensure service. This will be required to systematically monitor the data to detect an abnormal event such as Detection of abnormal health conditions, intrusion detection, and fraud detection.</p><p>Numerous types of algorithms have been developed for anomaly detection for twin academic research, commercial interest, and the use of all this to protect such a specific application or device.</p><p>In most kinds of records such as temperature, visits on a website, etc. there is usually a normal accepted behavior indicating that everything is working fine. It might be hard to determine an anomaly based on an instantaneous value of a waveform in some cases. Instead, it's better to consider the shape of the waveform as discussed in this paper.</p><p>A library of different waveforms is created, and with the use of k-means clustering, we can develop what constitutes the normal shape of a waveform. The dataset used is plotted to form a wave of a particular shape. The waveform using the waveform library is reconstructed. If there is any poor reconstruction, then the wave is certainly containing some abnormalities.</p><p>WCNC-2021: Workshop on Computer Networks &amp; Communications, May 01, 2021, Chennai, India. EMAIL: avadhnareshkushwaha_2k19swe03@dtu.ac.in (Avadh Naresh Kushwaha) ORCID: 0000-0002-2346-484X (Avadh Naresh Kushwaha)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Jianliang, Haikun, and Ling <ref type="bibr" target="#b0">[1]</ref> performed Intrusion detection on networks using K-Means. The authors' evaluated their proposed model using "the KDD Cup 1992 data". The data provided a wide variation of instructions which were simulated over a military network. From the "100,000 labeled data items", 1,000 of them contained attack samples, while the other 99.999 were the normal samples free from attacks.</p><p>They perform data processing for more extensive features in two ways; first, they calculate the mean absolute deviation <ref type="bibr" target="#b9">[10]</ref> and then calculate the standardized measurement <ref type="bibr" target="#b0">[1]</ref>. New training datasets are then created based on the formulas above, and then the proposed algorithm is applied. The experiments performed showed that the K-means algorithm was the most suitable method for intrusion detection. <ref type="bibr" target="#b0">[1]</ref>.</p><p>Xinlong and Weishi <ref type="bibr" target="#b9">[10]</ref> used an improved k-means clustering technique to perform anomaly detection on cloud computing. The method proposed by the authors finds the known attacks and anomaly attacks in the cloud computing environment. They use a distributed intrusion model of cloud computing to perform the detections <ref type="bibr" target="#b9">[10]</ref>. The authors also made quantitative comparisons of the different intrusion detection methods used before based on their advantages and disadvantages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">K-Means Algorithm</head><p>Clustering is "the process that groups objects into subclasses so that those subclasses are entirely related or have some similarities and the different clusters are altogether dissimilar from each other" <ref type="bibr" target="#b0">[1]</ref>. The clustering algorithm is divided into four different groups, i.e., Partitioning Clustering, hierarchical Algorithm, Density-based and Grid-based.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Partitioning Clustering</head><p>Partitioning clustering <ref type="bibr" target="#b5">[6]</ref>, the data objects are directly divided into clusters of a pre-defined number. "The checking for all possible clusters is computationally impractical; certain greedy heuristics are used in the form of iterative optimization of a cluster. The partitioning clustering consists of several approaches such as K-means Clustering, K-medoid Clustering, Relocation Algorithms, and Probabilistic Clustering." <ref type="bibr" target="#b3">[4]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Hierarchical Algorithm</head><p>A hierarchical clustering <ref type="bibr" target="#b4">[5]</ref> "creates a hierarchical decomposition of the given set of data objects. It builds a cluster hierarchy, known as a dendrogram. Disjoint groups of clusters are obtained by cutting the tree at the desired level. Hierarchical clustering is used to find data on different levels of dissimilarity." <ref type="bibr" target="#b3">[4]</ref> 3.3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Density-Based</head><p>Density-based algorithm <ref type="bibr" target="#b7">[8]</ref> "can find a cluster of random shapes unexpectedly. To group objects, it uses the density objective function.in these method clusters will increase until the number of the article in the nearby growing some limitation." <ref type="bibr" target="#b3">[4]</ref> 3.4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Grid-Based</head><p>Grid-based clustering <ref type="bibr" target="#b7">[8]</ref> "quantizes the object space into a finite number of cells that form a grid structure. After calculating density grid-based clustering, sort the cells according to their densities. Cluster centers are identified, and all neighbor cells are traversed." <ref type="bibr" target="#b3">[4]</ref> Partitioning is done to divide a group of data into k-cluster <ref type="bibr" target="#b0">[1]</ref>. K-mean constitutes a proper clustering technique by ambitious training</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">The Objective of Algorithm</head><p>Considering the d-dimension data set {𝑥 |𝑥 ∈ 𝑅 , 𝑖 = 1,2, … 𝑁} , the method to follow easy steps to classify given dataset, number of clusters 𝑤 , 𝑤 , … . 𝑤 to define K centroid 𝑐 = 𝑐 , 𝑐 , … . 𝑐 , one for each group,</p><formula xml:id="formula_0">𝑐 = ∑ 𝑥 ∈</formula><p>Where 𝑛 Are several datasets in the cluster?</p><p>Select all points closest to a considering dataset and relate them to the nearest centroid. When a topic does not stand out, the first steps compete <ref type="bibr" target="#b0">[1]</ref>. We need to the recalculated centroid of the cluster resulting from the previous actions.</p><p>A new obligate done between the current dataset and closest new centroid, an iterative loop has been generated due to this loop centroid change their location slowly until no change is done .lastly algorithm minimizing an objective function.</p><p>The objective function 𝐽 = ∑ ∑ 𝑑 𝑥 , 𝑐 where 𝑑 𝑥 , 𝑐 Distance between the data point 𝑥 and cluster center 𝑐 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.6.</head><p>Step</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>by Step Algorithm</head><p>Step1: (initialize) randomly choose K occurrence 𝑐 , 𝑐 , … . 𝑐 From the data set X and start cluster center of the clustering space.</p><p>Step2: (allotment) provide each occurrence to the nearest center: 𝑑 𝑋 , 𝐶 &lt; 𝑑 (𝑋 , 𝐶 ) i.e., </p><formula xml:id="formula_1">𝑗</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.7.">Advantage(s):</head><p>K-mean algorithm is essential for a considerable large dataset <ref type="bibr" target="#b0">[1]</ref>, and its time complexity O (tkn), where t is the number of loops, k is the number of clusters, and n is the data point in the dataset</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.8.">Disadvantage(s):</head><p>With the k-mean algorithm, the cluster number is required first, yet the number of clusters is usually determined later. It is sensitive to outliers <ref type="bibr" target="#b0">[1]</ref>  <ref type="bibr" target="#b1">[2]</ref>.</p><p>It is not easy to predict k-value, the k-mean algorithm with global cluster does not work well, and it does not perform well with a different group and size</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Proposed Methodology</head><p>In our approach, we define an anomaly as a shape of the waveform that has not been experienced or seen last. The algorithm will build a normal shape library and reconstruct the waveform and determine its shape. The waveform is said to have an abnormal behavior if the reconstruction of the waveform by the library is inadequate.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Dataset</head><p>In this paper, the data used for the experiments is the EKG dataset publicly available at PhysioNet. This version of the data provides a regular waveform which provides a reasonable basis for exploring the proposed algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Clustering</head><p>To fully ascertain what constitutes a waveform's normal shape, we use k-means clustering to form different clusters to determine a normal cluster group. The clusters can be in separate n-dimensional space that's defined by n-features. In our case, the clusters are determined programmatically using the clustering algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Waveform Space</head><p>We shall consider a 32-dimensional waveform space to perform anomaly detection such that for every point within the space, it potentially represents a waveform segment. We cluster the segments that are similar to each other. "The middle of each cluster (the centroid) will measure the prototypical waveform pattern that all those segments are specific instances of". Still, where necessary, from all the waveforms, the average of them within a cluster will be considered as the centroid.</p><p>Since the center of the cluster is also a point that is part of the waveform space, this makes it also "waveform". This therefore means that, the centroids of the clusters will constitute a set of "normal waveform segments". Now using these normal segments, we try to reconstruct the dataset being tested. The reconstruction will be considered as good if the data is similar to the original. However, suppose there is some abnormal shape in the data. In that case, it won't be possible to reconstruct the waveform using the "normal" waveform library, which then results into a reconstruction error. This therefore indicates that there is some anomaly.</p><p>The algorithm is divided into two parts;  -An abnormal shape is obtained if there is any reconstruction error on any segment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5.">Step by Step Algorithm</head><p>Step 1: Import the data Let FN be the filename of the data set. Let DS be the variable that holds the data after reading it using the ekg_data primitive function.</p><p>Step 2: Plot the data Using matplotlib.pyplot function and sample size of 300, plot the data. Label the x and y axes, then show the plotted graph.</p><p>Step 3: Split data into segments Let seg_len be the segment length of value 32, slide_len of value two, and an array named segments to store them. Loop through the DS dataset to split it into waveform segments.</p><p>Step 4: Cluster the segments Perform clustering of the segments in a 32-dimensional space using the k-means algorithm provided in python's library scikit-learn.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The different clusters created at this point then constitutes the normal waveform shapes of the library</head><p>Step 5: Reconstruct the waveform Try to reconstruct the data or the waveform, which will be tested using the learned library. The reconstruction process consists of four sub-steps which include; -First, the data is split into segments that are overlapping.</p><p>-Secondly, we determine the segment's cluster centroid by using the samples' average in a cluster. -Using the centroid from the above step, we reconstruct the segment.</p><p>-Finally, we join all the segments to form the waveform.</p><p>Step 6: Conclude on the anomaly We decide whether there is an anomaly or not based on the reconstruction error obtained. If there is a very high reconstruction error, then we conclude that there is an anomaly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Result and Analysis</head><p>Using the EKG dataset, we performed clustering on the data and also try to reconstruct to find the error between the original plotted data and the newly revamped data.</p><p>The new shape formed indicates an anomaly detected after reconstruction of the data since there is a substantial visible error. The reconstruction error obtained was 23.8%.</p><p>The figure below shows the original data's waveform, the reconstructed information, and the error after reconstruction. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>Anomaly detection is essential in everyday lives, and therefore it's vital to expand on the research continuously.</p><p>Every different kind of data consists of a regular pattern that depicts normal behavior. When the data are plotted to form a waveform, it can also be hard to determine an anomaly of a waveform based on its instantaneous value but by its shape.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>= 1,2 … . . 𝑘 &amp; 𝑖 = 1,2 … … 𝑛 𝑗 ≠ 𝑚 , 𝑚 = 1,2 … . . 𝑘 and then allocate 𝑥 𝑡𝑜 𝑐 Step3: (updating) Recalculate the centroid of the cluster𝑐 * , 𝑐 * , … … . . 𝑐 * ; Step4: (loop) if 𝑖 = {1 … . . 𝑘} 𝑐 * = 𝑐 then stop the algorithm and initial 𝑐 * , 𝑐 * , … … . . 𝑐 * represent the end group, or else allocate 𝑐 = 𝑐 * &amp; perform step 2 and 3 until there isn't any more modification</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>-</head><label></label><figDesc>Divide the waveform data into segments of say n samples.-Create a space of n dimensions with each of the segments considered as one point.-Cluster the segment point and also determine the centroids of the clusters.-Cluster centroids provide a library of normal waveform shapes.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>4. 4</head><label>4</label><figDesc>.1. Testing -Using the cluster centroids in the training phase, we try to reconstruct the waveform data.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The waveform of original data, reconstructed data, and the error between them</figDesc><graphic coords="6,181.20,377.04,249.36,186.84" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper sees how K-means clustering performs a key role in identifying normal waveform shapes in time series data to form trained library waveforms. Based on the data's reconstruction, we determine the shape of the waveform after reconstruction tested by the library created. The error obtained signifies that there is an anomaly since the shape of the waveform has not been seen before.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Acknowledgements</head><p>Special Appreciation to the Department of Software Engineering, Delhi Technological University, for supporting this work.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The Application on Intrusion Detection Based on Kmeans Cluster Algorithm</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jianliang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haikun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ling</surname></persName>
		</author>
		<idno type="DOI">10.1109/IFITA.2009.34</idno>
	</analytic>
	<monogr>
		<title level="m">International Forum on Information Technology and Applications</title>
				<meeting><address><addrLine>Chengdu, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="page" from="150" to="152" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Cluster Phenomenon to Determine Anomaly detection on Flight Riute</title>
		<author>
			<persName><forename type="first">M</forename><surname>Yazdi Pausadan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jaka</forename><surname>Lianto Buliali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Raden</forename><surname>Venantivs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hari</forename><surname>Ginardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the fifth Information System International Conference</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">An Improved K-Means Using in Anomaly Detection</title>
		<author>
			<persName><forename type="first">C</forename><surname>Yin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.1109/CCITSA.2015.11</idno>
	</analytic>
	<monogr>
		<title level="m">First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA)</title>
				<meeting><address><addrLine>Ilan, Taiwan</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="129" to="132" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Improvement of data object&apos;s membership by using Fuzzy K-Means clustering approach</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">T</forename><surname>Baviskar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Patil</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCPEIC.2016.7557238</idno>
	</analytic>
	<monogr>
		<title level="m">2016 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)</title>
				<meeting><address><addrLine>Melmaruvathur, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="139" to="147" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Survey on different clustering algorithm in data mining technique</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Dk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Modern Engineering Research (IJMER)</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="267" to="274" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Introduction to partitioning based clustering methods with a robust example</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ayramo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Karkkainen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Reports of the Department of Mathematical Information Technology Series C. Software and Computational Engineering</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Frbc: a fuzzy rule-based clustering algorithm</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">G</forename><surname>Mansoori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="960" to="971" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>Fuzzy Systems</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Data mining: concepts and techniques</title>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kamber</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Morgan Kauff Mann Publishers</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Data Clustering: Algorithms and Applications</title>
		<ptr target="http://www.CharuAggarwal.netlclusterbook.pdf" />
		<editor>C. C. Aggarwal and C. K. Reddy</editor>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>CRC Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">An Anomay Intrusion Detection Method Based on Improved K-Means of Cloud Computing</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Zhang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
