03574nam 2200553 450 991079280120332120220524173619.03-95487-809-710.31819/9783954878093(CKB)3710000001056549(MiAaPQ)EBC5635337(DE-B1597)516715(OCoLC)1091681498(DE-B1597)9783954878093(MiAaPQ)EBC6320072(Au-PeEL)EBL6320072(OCoLC)1156771864(OCoLC)1128424797(FlNmELB)ELB37158(EXLCZ)99371000000105654920220524d2014 uy 0spaurcnu||||||||txtrdacontentcrdamediacrrdacarrierZoomaquias épica burlesca del siglo XVIII /estudio y edición crítica de Rafael Bonilla Cerezo y Ángel L. Luján AtienzaMadrid ;Frankfurt am Main :Iberoamericana :Vervuert,[2014]©20141 online resource (514 pages)Clásicos hispánicos. Nueva época ;Number 9Eight mock-heroic poems by Gabriel Alvarez de Toledo and seven other authors.84-8489-826-1 Includes bibliographical references and index.Front matter --Índice --NOTA --ESTUDIO INTRODUCTORIO --1. De ratones y ranas: origen y evolución de la épica burlesca --2. La Burromaquia de Gabriel Álvarez de Toledo --3. La Gatomiomaquia de Ignacio de Luzán --4. La Perromachia de Francisco Nieto Molina --5. El imperio del piojo recuperado de Gaspar de Molina y Zaldívar --6. La Perromachia de Juan Pisón y Vargas --7. El murciélago alevoso. Invectiva de fray Diego González --8. La Rani-ratiguerra de José March y Borrás --9. Grillomaquia --10. Criterios de edición --Bibliografía --ZOOMAQUIAS --1. Poema imperfecto de La Burromachia de Gabriel Álvarez de Toledo --2. La Gatomiomaquia de Ignacio de Luzán --3. La Perromachia de Francisco Nieto Molina --4. El imperio del piojo recuperado de Gaspar de Molina y Zaldívar --5. La Perromachia de Juan Pisón y Vargas --6. El murciélago alevoso. Invectiva de fray Diego González --7. La Rani-ratiguerra de José March y Borrás --8. Grillomaquia --Aparatos críticos --AgradecimientosEdición de un selecto corpus de épica burlesca: "La Burromaquia" de Álvarez de Toledo, "La Gatomiomaquia" de Luzán, "La Perromachia" de Nieto Molina, "El imperio del piojo recuperado" del marqués de Ureña, "La Perromachia" de Pisón y Vargas, "El murciélago alevoso" de Diego González, "La Rani-Ratiguerra" de March y Borras y la anónima "Grillomaquia". "Todo especialista en poesía dieciochesca debería acercarse a este esmerado volumen para leer su introducción y alguna de las piezas. Dudo mucho que un juguete cómico tan sabroso como La Gatomiomaquia pueda aburrir a alguien." MARTÍN ZULAICA LÓPEZ, en: Revista de Literatura, 2015, vol. LXXVII, n.o 15.Clásicos hispánicos (Instituto de Lengua, Literatura, y Antropología (Consejo Superior de Investigaciones Científicas (Spain))) ;Number 9.BurlesquesBurlesques.822.05230808Bonilla Cerezo RafaelLuján Atienza Angel Luis1970-MiAaPQMiAaPQMiAaPQBOOK9910792801203321Zoomaquias3805975UNINA12475nam 22007455 450 991091718980332120250807143250.09789819774234981977423310.1007/978-981-97-7423-4(MiAaPQ)EBC31815236(Au-PeEL)EBL31815236(CKB)36828096200041(OCoLC)1477225421(DE-He213)978-981-97-7423-4(EXLCZ)993682809620004120241205d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierProceedings of International Conference on Communication and Computational Technologies ICCCT 2024, Volume 1 /edited by Sandeep Kumar, Saroj Hiranwal, Ritu Garg, S. D. Purohit1st ed. 2024.Singapore :Springer Nature Singapore :Imprint: Springer,2024.1 online resource (528 pages)Lecture Notes in Networks and Systems,2367-3389 ;11219789819774227 9819774225 Intro -- Organization -- Preface -- Contents -- Editors and Contributors -- Economically Growth and Impact of Indian Regional Navigation Satellite System at International Level -- 1 Introduction -- 2 Applications of IRNSS System -- 3 Growth and Impact at International Level -- 4 Growth and Impact at Indian Economy -- 5 Conclusion -- References -- Predictive Tomato Leaf Disease Detection and Classification: A Hybrid Deep Learning Framework -- 1 Introduction -- 2 Dataset -- 2.1 Plant Village -- 2.2 Plantdoc -- 3 Object Detection Models -- 3.1 Faster R-CNN -- 3.2 YOLO -- 3.3 SSD -- 3.4 Mask R-CNN -- 4 Image Classification Models -- 4.1 Visual Geometry Group (VGG) -- 4.2 Residual Network (ResNet) -- 4.3 Inception (GoogLeNet) -- 4.4 MobileNet -- 4.5 Xception -- 5 Review on Tomato Plant Leaf Diseases Prediction -- 6 Proposed Methodology -- 7 Result and Discussion -- 8 Conclusion -- References -- Conceptual Framework for Risk Mitigation and Monitoring in Software Organizations Based on Artificial Immune System -- 1 Introduction -- 2 Background and Motivation -- 3 Findings -- 4 A New Conceptual Framework for Risk Mitigation and Monitoring Based on Immune Clonal Approach-The Design/Proposed -- 5 Conclusions and Future Scope -- References -- A Multilevel Home Fire Detection and Alert System Using Internet of Things (IoT) -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 System Model -- 3.2 System Requirements -- 3.3 Multilevel Fire Detection -- 3.4 Multilevel Fire Alerts -- 4 Experimental Prototype, Results, and Discussion -- 5 Conclusion -- References -- Smart Baby Warmer with Integrated Weight Sensing -- 1 Introduction -- 1.1 Internet of Things (IoT) -- 1.2 Global System for Mobile Communication (GSM) -- 2 Working Principle -- 2.1 Methodology -- 2.2 Block Diagram -- 2.3 Flow Chart -- 2.4 Working of LM35 Sensor.2.5 Working of Load Cell and HX711 -- 2.6 Sending SMS Using GSM -- 2.7 Circuit Connection -- 3 Results and Analysis -- 3.1 SMS Alert -- 3.2 Output -- 3.3 Heater on -- 3.4 Heater off -- 3.5 Analysis -- 4 Conclusion -- References -- A Robust Multi-head Self-attention-Based Framework for Melanoma Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Pre-processing and Patch Embedding -- 3.2 Multi-head Self-attention Model -- 3.3 Classification -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Data Augmentation -- 4.3 Simulation Results -- 4.4 Comparative Analysis -- 4.5 Discussion -- 5 Conclusion -- References -- Domain Knowledge Based Multi-CNN Approach for Dynamic and Personalized Video Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Input -- 3.2 Domain Activity Video Segmentation -- 3.3 Umpire Detection and Pose Recognition -- 3.4 Key Segments -- 3.5 Personalized and Dynamic Video Summarization -- 4 Result Analysis -- 5 Conclusion -- References -- Efficient Information Retrieval: AWS Textract in Action -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Input Documents -- 3.2 Analyzing Documents -- 3.3 Detecting Text -- 3.4 Confidence Scores -- 3.5 Deployment -- 4 Results and Discussion -- 4.1 Image as an Input -- 4.2 PDF as an Input -- 4.3 Table as an Input -- 5 Conclusion and Future Work -- References -- Text Summarization Techniques for Kannada Language -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Extractive Summarization Using TF-IDF Method -- 3.2 Abstractive Summarization Using the LSTM Method -- 4 Results and Discussions -- 5 Conclusion -- References -- Parkinson's Detection From Gait Time Series Classification Using LSTM Tuned by Modified RSA Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Long Short-Term Memory.2.2 Metaheuristics Optimization -- 3 Methods -- 3.1 The Original RSA -- 3.2 Genetically Inspired RSA -- 4 Experiments -- 4.1 Dataset -- 4.2 Simulation Setup -- 4.3 Metrics -- 4.4 Simulation Results -- 5 Conclusion -- References -- Human Action Recognition Using Depth Motion Images and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Algorithm for Displaying Depth Map Sequence -- 3.2 Algorithm for Depth Motion Images -- 3.3 Convolutional Neural Network Model -- 4 Results and Discussion -- 5 Conclusion -- References -- Maximizing Portfolio Returns in Stock Market Using Deep Reinforcement Techniques -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Methodology -- 4 Result Analysis -- 5 Backtest Results -- 6 Conclusion -- References -- Detecting AI Generated Content: A Study of Methods and Applications -- 1 Introduction -- 2 Background -- 2.1 Watermarking -- 2.2 Classification -- 2.3 Statistical Analysis -- 3 Generative Models -- 4 Detecting AI-Generated Content -- 4.1 Linguistic-Based Methods -- 4.2 Statistical-Based Methods -- 4.3 Learning-Based Methods -- 5 Challenges in AI Content Detection -- 6 Applications and Scenarios -- 7 Conclusion -- References -- A Systemic Review of Machine Learning Approaches for Malicious URL Detection -- 1 Introduction -- 2 Identifying URLs with Malicious Hidden Links -- 2.1 Traditional Approaches to Malicious URL Detection -- 2.2 Heuristic Based Methods -- 2.3 Machine Learning Approaches -- 2.4 List of features extracted from the URL: -- 3 Malicious URL Classification with Artificial Intelligence -- 3.1 Random Forest Algorithm -- 3.2 PhishAri: Automatic Real-Time Phishing Detection on Twitter -- 3.3 Support Vector Machine (SVM) -- 4 Deep Learning Methods -- 4.1 Models Based on Convolutional Neural Networks -- 4.2 Models Based on Recurrent Neural Networks.4.3 Models Based on a Combination of CNN and RNN -- 4.4 Models Based on Transformers -- 5 Conclusion -- References -- Digital Image Forgery Detection Based on Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 2.1 Block-Based Approach -- 2.2 Key Point-Based Approach -- 2.3 Machine Learning-Based Approach -- 3 The Proposed CNN Model -- 3.1 Image Preprocessing -- 3.2 Image Resizing -- 3.3 CNN Architecture -- 3.4 Classification -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 The Results -- 4.4 Discussion -- 4.5 Comparison with Other Works -- 5 Concluding Remarks -- References -- Banana Freshness Classification: A Deep Learning Approach with VGG16 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection and Dataset Composition -- 3.2 Data Preprocessing -- 3.3 Data Augmentation -- 4 Experimental Work -- 4.1 Model Architecture -- 4.2 Model Training -- 5 Results and Analysis -- 5.1 Model Performance -- 5.2 Confusion Matrix -- 5.3 Classification Report -- 6 Conclusions And Future Work -- References -- GreenHarvest: Data-Driven Crop Yield Prediction and Eco-Friendly Fertilizer Guidance for Sustainable Agriculture -- 1 Introduction -- 2 Literature Survey -- 3 Problem Definition -- 4 Objectives -- 5 Methodology -- 6 Results and Algorithms -- 7 Conclusion -- References -- Real-Time Deep Learning Based Image Compression Techniques: Review -- 1 Introduction -- 2 Image Compression -- 2.1 Lossy Compression -- 2.2 Lossless Compression -- 3 Deep Learning -- 3.1 Auto-Encoder -- 3.2 Recurrent Neural Network -- 3.3 Convolution Neural Network -- 4 Literature Review -- 5 Discussion -- 6 Conclusion -- References -- Fog-Cloud Enabled Human Falls Prediction System Using a Hybrid Feature Selection Approach -- 1 Introduction -- 2 Related Works -- 3 Proposed Human Fall Prediction System.4 Hybrid Feature Selection Approach -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- A 4-Input 8-Bit Comparator with Enhanced Binary Subtraction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Full Adder Logic -- 3.2 8-Bit Adder Logic -- 3.3 Comparator Logic -- 4 Novelty -- 5 Analysis -- 5.1 Register Transfer Level (RTL) Components Analysis -- 5.2 Power Analysis -- 5.3 Part Resource Analysis -- 6 Results -- 6.1 Input Scenario and Output -- 6.2 Circuit Justification -- 7 Conclusion and Future Scope -- References -- Multivalued Dependency in Neutrosophic Database System -- 1 Introduction -- 2 Basic Definitions -- 2.1 Neutrosophic Set -- 2.2 α-Equal of Neutrosophic Tuples -- 2.3 Neutrosophic Functional Dependency -- 3 A New Concept: Neutrosophic Multivalued Dependency (α-nmvd) -- 3.1 Multivalued Dependency -- 3.2 Neutrosophic Multivalued Dependency -- 3.3 Inference Rules for α-nmvd -- 4 Conclusion -- References -- Traffic Sign Recognition Framework Using Zero-Shot Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Analysis -- 4.1 Dataset -- 4.2 Result -- 5 Conclusion -- References -- Machine Learning Techniques to Categorize the Sentiment Analysis of Amazon Customer Reviews -- 1 Introduction -- 2 Related Work -- 3 Data Preprocessing -- 4 Methodology -- 4.1 Data Source and Data Set -- 5 Experiment and Result -- 6 Conclusion -- References -- Alzheimer's Disease Diagnosis Using Machine Learning and Deep Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Datasets -- 4 Experimental Results -- 5 Conclusion -- References -- Sentinel Eyes Violence Detection System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Openpose -- 3.2 Yolov8 -- 3.3 Cnn-Lstm -- 4 Result -- 4.1 Object Detection Models -- 4.2 Architectures -- 5 Conclusion -- References.Detection of Alzheimer's Disease from Brain MRI Images Using Convolutional Neural Network.This book gathers selected papers presented at 6th International Conference on Communication and Computational Technologies (ICCCT 2024), jointly organized by Soft Computing Research Society (SCRS) and Rajasthan Institute of Engineering & Technology (RIET), Jaipur, during January 8–9, 2024. The book is a collection of state-of-the art research work in the cutting-edge technologies related to the communication and intelligent systems. The topics covered are algorithms and applications of intelligent systems, informatics and applications, and communication and control systems.Lecture Notes in Networks and Systems,2367-3389 ;1121Computational intelligenceSignal processingTelecommunicationArtificial intelligenceComputational IntelligenceSignal, Speech and Image ProcessingCommunications Engineering, NetworksArtificial IntelligenceComputational intelligence.Signal processing.Telecommunication.Artificial intelligence.Computational Intelligence.Signal, Speech and Image Processing.Communications Engineering, Networks.Artificial Intelligence.621.382Kumar Sandeep860947Hiranwal Saroj1779616Garg Ritu1779617Purohit S. D1779618MiAaPQMiAaPQMiAaPQBOOK9910917189803321Proceedings of International Conference on Communication and Computational Technologies4303193UNINA