LEADER 01138nam2-2200361---450- 001 990005800480203316 005 20130125093238.0 010 $a978-1-4073-0914-9 035 $a000580048 035 $aUSA01000580048 035 $a(ALEPH)000580048USA01 035 $a000580048 100 $a20130125d2012----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa---||||001yy 200 1 $aAurignacian clay hearths from Klissoura cave 1$ean experimental approach$fMa?gorzata Kot 210 $aOxford$cArcheopress$d2012 215 $a65 p.$cill.$d30 cm 225 2 $aBAR International series$v2331 410 0$1001000018484$12001$aBAR International series$v, 2331 606 1 $aPopoli primitivi$2BNCF 676 $a306 700 1$aKOT,$bMa?gorzata$0616332 801 0$aIT$bsalbc$gISBD 912 $a990005800480203316 951 $aXI.5. Coll. 12/ 1092$b235701 L.M.$cXI.5. Coll.$d00313230 959 $aBK 969 $aUMA 979 $aPASSARO$b90$c20130125$lUSA01$h0930 979 $aPASSARO$b90$c20130125$lUSA01$h0932 996 $aAurignacian clay hearths from Klissoura cave 1$91080634 997 $aUNISA LEADER 00803nam a2200241 i 4500 001 991003939579707536 005 20020506111225.0 008 010104s1946 uk ||| | eng 035 $ab10576770-39ule_inst 035 $aEXGIL129540$9ExL 040 $aBiblioteca Interfacoltà$bita 082 0 $a823.8 100 1 $aStevenson, Robert Louis$07383 245 10$aPoems /$cRobert Louis Stevenson 260 $aLondon :$bDent,$c1946 300 $aXII, 259 p. ;$c17 cm. 490 0 $aEveryman's library ;$v768 907 $a.b10576770$b23-02-17$c27-06-02 912 $a991003939579707536 945 $aLE002 In. II N 10$g1$i2002000920270$lle002$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10660318$z27-06-02 996 $aPoems$972204 997 $aUNISALENTO 998 $ale002$b01-01-01$cm$da $e-$feng$guk $h0$i1 LEADER 12349nam 22007095 450 001 9910878065203321 005 20240727125234.0 010 $a9789819735914$b(electronic bk.) 010 $z9789819735907 024 7 $a10.1007/978-981-97-3591-4 035 $a(MiAaPQ)EBC31569901 035 $a(Au-PeEL)EBL31569901 035 $a(CKB)33468919700041 035 $a(DE-He213)978-981-97-3591-4 035 $a(EXLCZ)9933468919700041 100 $a20240727d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Computing and Communications $eProceedings of ICICC 2024, Volume 2 /$fedited by Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal, Prabhat Kumar 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (662 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1021 311 08$aPrint version: Hassanien, Aboul Ella Innovative Computing and Communications Singapore : Springer,c2024 9789819735907 327 $aIntro -- Preface -- Steering Committee -- Contents -- Editors and Contributors -- Bangladeshi CF Guard: Unveiling Bangladeshi Counterfeit Currency Through Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Security Features' Analysis -- 3.2 Data Collection -- 3.3 System Architecture -- 4 Result and Discussion -- 4.1 Experimental Outcomes -- 4.2 Discussion -- 5 Conclusion -- 5.1 Conclusion -- 5.2 Limitations and Future Work -- References -- Recognition of Sign Language Using Hybrid CNN-RNN Model -- 1 Introduction -- 2 Literature -- 3 Proposed Method -- 3.1 Preprocessing -- 3.2 Classification and Recognition -- 3.3 Proposed Work -- 4 Evaluation Strategies -- 4.1 Dataset -- 5 Experiment and Result -- 5.1 Dataset I -- 5.2 Dataset II -- 6 Conclusion and Future Direction -- References -- Nanotech Drones: An Investigation of Air Quality Index in Environment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 3 Discussions and Results -- 3.1 Air Quality Index -- 3.2 Working of Nanotech Drone -- 4 Conclusion -- References -- Systematic Vulnerability Assessment: Mapping Architecture Flow and Ranking Components for Vulnerability in Connected Automated Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Architectural Flow -- 4 Scoring Criterion -- 5 Score Analysis -- 6 Results and Discussions -- 7 Conclusions -- References -- AI and Blockchain in Food and Beverage: Marketing 5.0 Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Starbucks Advanced Advertising -- 2.2 Digital Promotion -- 2.3 Marketing 5.0 -- 2.4 Applications of Blockchain Technology in F& -- B Industry -- 3 Methodological Framework -- 3.1 Exploring Knowledge Through Group Discussions -- 3.2 Quantitative and Qualitative Analysis of Content -- 3.3 The Analytical Cognizance of Content Scrutiny -- 4 Results. 327 $a5 Conclusion and Recommendations for Further Research -- References -- A Deep Learning-Based Cervical Tumor Classification System for Telehealthcare Monitoring -- 1 Introduction -- 2 Literature-Related Works -- 3 Stages of Prior Cervical Cancer -- 4 Class Activation Map (CAM) -- 5 System Methodology -- 5.1 Analyzing Prior Tumor Infiltration Evidence -- 5.2 DCNN Based on Prior Evidence -- 6 Experimental Findings -- 6.1 Improvement of Prediction Based on Prior Evidence -- 6.2 Staging Methods for Cervical Cancer Compared to Others -- 7 Conclusion -- References -- Big Data-Driven Intelligence Healthcare Framework for Smart Citizen -- 1 Introduction -- 1.1 The Importance of Big Data -- 1.2 Intelligent System for Healthcare -- 2 Background and Related Work -- 2.1 Digitization of Healthcare and Big Data -- 2.2 Technologically Advanced Urban Areas (Modern City) -- 2.3 Optimal Health -- 3 Dimensional Framework Paradigm -- 3.1 Advanced Healthcare Technologies -- 4 Proposed Intelligent Healthcare System -- 5 Pros, Cons, and Application -- 6 Conclusion -- References -- Smart Device with Arduino Controller for Home Inverter -- 1 Introduction -- 2 Design of Proposed System -- 2.1 Mathematical Analysis of Proposed System -- 2.2 Mathematical Calculations of Proposed System -- 2.3 Algorithm and Flowchart -- 3 Hardware Results and Discussions -- 4 Conclusion -- References -- Feature Selection with Particle Swarm for Improved Classification on High-Dimensional Datasets -- 1 Introduction -- 2 Literature Survey -- 2.1 PSO-Based Approaches -- 2.2 ACO-Based Approaches -- 2.3 FA-Based Approaches -- 2.4 GWO-Based Approaches -- 2.5 SSO-Based Approaches -- 3 Proposed Methodology -- 3.1 PSO-Based Feature Selection -- 3.2 PSO Pseudocode -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Comparative Analysis -- 4.3 Statistical Analysis -- 4.4 Runtime Computation (min:sec:milli_sec). 327 $a5 Conclusion -- References -- Breast Cancer Prediction Using Hybridization of Machine Learning and Optimization Technique -- 1 Introduction -- 2 Literature Survey -- 2.1 Previous Work Done Using Machine Learning Classifiers -- 2.2 Previous Work Done Using Deep Learning -- 2.3 Previous Work Done Using Optimization Techniques -- 2.4 Previous Work Done Using Genetic Algorithm -- 3 Methodology -- 3.1 Classifiers Used -- 3.2 Dataset Used -- 3.3 Optimization Technique Used -- 3.4 Parameters Setting -- 3.5 Implementation -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Securing Pictorial Data Transfer Through a Novel Digital Image Encryption Method -- 1 Introduction -- 2 Proposed Work -- 3 Structure of Encryption -- 4 Concept of Decryption -- 5 Pictorial Representation -- 6 Comparison with Visual Cryptography -- 7 Conclusion -- Appendix -- The idea of rotating matrices -- References -- IoT Routing Reimagined: Dynamic Phantom Routing with ACO for Efficient Source Location Privacy -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 4.1 Network Condition-Based Dynamic Phantom Node Selection (NCDPNS) -- 4.2 Bio-inspired Algorithm-Aided Multi-path Selection-Based Routing (BAMSR) -- 5 Results -- 6 Conclusion and Future Work -- References -- Deep Learning-Based Evaluation of ICU Requirements in COVID-19 Cases -- 1 Introduction -- 2 Related Works -- 3 Overview the Proposed System -- 4 Methodology -- 5 Experimental Results -- 6 Discussion -- 7 Conclusion -- References -- Deep Learning-Based Tea Fermentation Grading -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 4 Evaluation -- 5 Results -- 6 Comparison -- 7 Conclusion -- 7.1 Statements and Declarations -- References. 327 $aAn Exploratory Study of the Relationship Between Students' Positive Attitudes Toward Artificial Intelligence and Computational Thinking Needed in the 6G Communications' Era -- 1 Introduction -- 2 Methodology -- 2.1 Survey Procedure and Survey Participants -- 2.2 Questionnaire Items -- 2.3 Analysis Procedure -- 3 Results -- 3.1 Preliminary Analysis -- 3.2 Descriptive Statistics of Positive Awareness of AI and Computational Thinking -- 3.3 Results of Logistic Regression Analysis -- 4 Discussions -- 4.1 Implications for Educational Program Development -- 5 Conclusion -- References -- Optimization of Double-Tuned Mass Dampers via Jaya Algorithm -- 1 Introduction -- 2 Methodology -- 3 The Numerical Example -- 4 Conclusion -- References -- Application of Wavelet Packet Transform for Detecting Bearing Issues -- 1 Introduction -- 2 History of Motor Vibration Data -- 3 Time-Frequency Domain Analysis -- 3.1 Analysis Based on DWT -- 3.2 Analysis Based on WPT -- 4 Results and Discussion -- 4.1 DWT-Based Frequency Range Determination of Outer Race Defect -- 4.2 WPT Based on Frequency Range Determination of Outer Race Fault -- 5 Conclusion and Future Scope -- References -- Detection of Potholes in Roads Using Siamese Neural Network for Safe Transportation -- 1 Introduction -- 2 Literature Survey -- 3 Methods and Technology Used -- 3.1 Dataset -- 3.2 Siamese Neural Network -- 3.3 Contrastive Loss Function -- 3.4 Training & -- Testing Set -- 3.5 Proposed Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contribution -- 2 The Scheme Presented by Sun et al. -- 2.1 System Model -- 2.2 Algorithms -- 2.3 Detailed Scheme -- 3 Cryptanalysis of the Scheme -- 3.1 Violating Receiver Privacy -- 3.2 Violating Sender Privacy -- 4 Conclusion. 327 $aReferences -- Analyzing the Financial Performance of Corporate Social Responsibility Using Machine Learning-Enabled Financial Enterprise Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Method: Machine Learning Using a Financial Enterprise Model -- 4 Result and Discussion -- 5 Conclusion -- References -- A Survey on Driver Monitoring System Using Computer Vision Techniques -- 1 Introduction -- 2 Motivation -- 3 Literature Review -- 4 The Proposed System -- 4.1 Drowsiness Detection -- 4.2 Gaze Detection -- 4.3 Activity Recognition -- 4.4 Emotion Recognition -- 5 Conclusion -- References -- ICT-Based Smart Cities Planning: A Case Study of Rashid Camp -- 1 Introduction -- 2 Smart City: A Contemporary Revolution for Urban Space Management -- 3 The Geographic Information System (GIS) and Remote Sensing (RS): Smart Planning Support Tool -- 4 Description of the Case Study Al-Rashid Camp -- 5 Methodology and Approach -- 6 Results and Discussion -- 7 Conclusion -- References -- Detection of Hate Speech Using Ensemble Models -- 1 Introduction -- 2 Related Works -- 3 Experimental Setup and Proposed Methodology -- 3.1 Datasets -- 3.2 Data Collection and Preprocessing -- 3.3 Models -- 3.4 Classifier Evaluation -- 4 Result and Discussion -- 4.1 Model Training and Evaluation Metrics -- 5 Result and Discussion -- 6 Conclusion -- References -- Development of Dermatological Lesion Detection System Using EfficientNet with Fairness Evaluation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Methodology Flowchart -- 3.2 Algorithm Used -- 3.3 Proposed Model's Pseudocode -- 3.4 Steps Followed -- 4 Experimental Results and Discussion -- 4.1 Dataset Used -- 4.2 Performance Assessment -- 4.3 Performance Comparative Analysis -- 5 Conclusion -- References -- Quantum Computing's Path to Supremacy: Progress in the NISQ Epoch -- 1 Introduction. 327 $a2 The History of Quantum Computing. 330 $aThis book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16?17 February 2024. Introducing the innovative works of scientists, professors, research scholars, students, and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1021 606 $aTelecommunication 606 $aInternet of things 606 $aMachine learning 606 $aArtificial intelligence 606 $aCommunications Engineering, Networks 606 $aInternet of Things 606 $aMachine Learning 606 $aArtificial Intelligence 615 0$aTelecommunication. 615 0$aInternet of things. 615 0$aMachine learning. 615 0$aArtificial intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aInternet of Things. 615 24$aMachine Learning. 615 24$aArtificial Intelligence. 676 $a621.382 700 $aHassanien$b Aboul Ella$0846730 701 $aAnand$b Sameer$01379088 701 $aJaiswal$b Ajay$01379089 701 $aKumar$b Prabhat$01758603 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910878065203321 996 $aInnovative Computing and Communications$94196819 997 $aUNINA LEADER 03356oam 22008534 450 001 9910165037203321 005 20250426110111.0 010 $a9781475572452 010 $a147557245X 010 $a9781475572513 010 $a1475572514 035 $a(CKB)3710000001064737 035 $a(MiAaPQ)EBC4807087 035 $a(IMF)WPIEA2017011 035 $aWPIEA2017011 035 $a(EXLCZ)993710000001064737 100 $a20020129d2017 uf 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe Relative Effectiveness of Spot and Derivatives Based Intervention : $eThe Case of Brazil /$fMilan Nedeljkovic, Christian Saborowski 210 1$aWashington, D.C. :$cInternational Monetary Fund,$d2017. 215 $a1 online resource (36 pages) $ccolor illustrations, tables, graphs 225 1 $aIMF Working Papers 311 08$a9781475571035 311 08$a1475571038 320 $aIncludes bibliographical references. 330 3 $aThis paper studies the relative effectiveness of foreign exchange intervention in spot and derivatives markets. We make use of Brazilian data where spot and non-deliverable futures based intervention have been used in tandem for more than a decade. The analysis finds evidence in favor of a significant link between both modes of intervention and the first two moments of the real/dollar exchange rate. As predicted by theory for the case of negligible convertibility risk, the impact of spot market intervention in our baseline sample is strikingly similar to that achieved through futures based intervention worth an equivalent amount in notional principal. 410 0$aIMF Working Papers; Working Paper ;$vNo. 2017/011 606 $aMonetary policy$zBrazil 606 $aForeign exchange rates$zBrazil 606 $aForeign Exchange$2imf 606 $aInvestments: Futures$2imf 606 $aPension Funds$2imf 606 $aNon-bank Financial Institutions$2imf 606 $aFinancial Instruments$2imf 606 $aInstitutional Investors$2imf 606 $aCurrency$2imf 606 $aForeign exchange$2imf 606 $aFinance$2imf 606 $aFutures$2imf 606 $aExchange rates$2imf 606 $aCurrency swaps$2imf 606 $aExchange rate adjustments$2imf 606 $aFinancial institutions$2imf 606 $aDerivative securities$2imf 607 $aBrazil$2imf 615 0$aMonetary policy 615 0$aForeign exchange rates 615 7$aForeign Exchange 615 7$aInvestments: Futures 615 7$aPension Funds 615 7$aNon-bank Financial Institutions 615 7$aFinancial Instruments 615 7$aInstitutional Investors 615 7$aCurrency 615 7$aForeign exchange 615 7$aFinance 615 7$aFutures 615 7$aExchange rates 615 7$aCurrency swaps 615 7$aExchange rate adjustments 615 7$aFinancial institutions 615 7$aDerivative securities 676 $a339.53098109049 700 $aNedeljkovic$b Milan$01217433 701 $aSaborowski$b Christian$01205326 801 0$bDcWaIMF 906 $aBOOK 912 $a9910165037203321 996 $aThe Relative Effectiveness of Spot and Derivatives Based Intervention$93653308 997 $aUNINA