LEADER 01198nam a22002891i 4500 001 991001609889707536 005 20031204095658.0 008 040407s1971 fr a||||||||||||||||fre 035 $ab12796438-39ule_inst 035 $aARCHE-077606$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a916 100 1 $aDenis, Jacques$0390431 245 12$aL'Afrique centrale et orientale /$cpar Jacques Denis, Pierre Vennetier, Jules Wilmet 260 $aParis :$bPresses universitaires de France,$c1971 300 $a294 p., [4] c. di tav. :$bill. ;$c19 cm 440 0$aMagellan : la géographie et ses problèmes ;$v22 651 4$aAfrica centrale$xGeografia 651 4$aAfrica orientale$xGeografia 700 1 $aWilmet, Jules 700 1 $aVennetier, Pierre$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0130461 907 $a.b12796438$b02-04-14$c16-04-04 912 $a991001609889707536 945 $aLE009 GEOG.16-98$g1$i2009000156784$lle009$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13342162$z16-04-04 996 $aAfrique centrale et orientale$91447958 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$ffre$gfr $h2$i1 LEADER 10704nam 22006255 450 001 9910254359203321 005 20251113193214.0 010 $a981-10-1678-X 024 7 $a10.1007/978-981-10-1678-3 035 $a(CKB)3710000000837566 035 $a(EBL)4654014 035 $a(DE-He213)978-981-10-1678-3 035 $a(MiAaPQ)EBC4654014 035 $a(PPN)194805549 035 $a(EXLCZ)993710000000837566 100 $a20160824d2017 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the International Conference on Data Engineering and Communication Technology $eICDECT 2016, Volume 2 /$fedited by Suresh Chandra Satapathy, Vikrant Bhateja, Amit Joshi 205 $a1st ed. 2017. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2017. 215 $a1 online resource (805 p.) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v469 300 $aIncludes index. 311 08$a981-10-1677-1 327 $aChapter 1. Experimental Analysis on Big Data in IOT based Architecture -- Chapter 2. Morphology Based Approach for Number Plate Extraction -- Chapter 3. NeSeDroid - Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing -- Chapter 4. RiCoBiT - Ring Connected Binary Tree: A Structured and Scalable Architecture for Network on Chip Based Systems: An Exclusive Summary -- Chapter 5. Application of Compressed Sensing (CS) for ECG Signal Compression: A Review -- Chapter 6. Tracking Pointer Based Approach for Iceberg Query Evaluation -- Chapter 7. Performance Evaluation of Shortest Path Routing Algorithms in Real-road Networks -- Chapter 8. An Outlook in Some Aspects of Hybrid Decision Tree Classification Approach: A Survey -- Chapter 9. Content Search Quaternary Look-up Table Architecture -- Chapter 10. Exhaust Gas Emission Analysis of Automotive Vehicles Using FPGA -- Chapter 11. A Graph BasedActive Learning Approach Using Forest Classifier for Image Retrieval -- Chapter 12. Comparative Analysis of Android Malware Detection Techniques -- Chapter 13. Developing Secure Cloud Storage System by Using Access Control Models -- Chapter 14. ETLR ? Effective DWH Design Paradigm -- Chapter 15. Prediction of Reactor Performance in CATSOL Based Sulphur Recovery Unit by ANN -- Chapter 16. A Multilevel Clustering Using Multi-hop and Multi-head in VANET -- Chapter 17. Patient-speci Cardiac Computational Modeling Based on Left Ventricle Segmentation from Magnetic Resonance Images -- Chapter 18. A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition -- Chapter 19. Methods for Individual and Group Decision Making Using Interval Valued Fuzzy Preference Relations -- Chapter 20. A New Approach to Determine Tie Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC Scheme -- Chapter 21. Significance of Frequency Band Selection of MFCC for Text-independent Speaker Identification -- Chapter 22. Ensuring Performance of Graphics Processing Units: A Programmer's Perspective -- Chapter 23. Analytical Study of Miniaturization of Microstrip Antenna for Bluetooth/WiMax -- Chapter 24. Novel All Optical Encoding and Decoding Scheme for Code Preservation -- Chapter 25. XPM BASED Bandwidth Efficient WDM-to-OTDM Conversion Using HNLF -- Chapter 26. Analysis of a Sporting Event on a Social Network: True Popularity & Popularity Bond -- Chapter 27. Performance Analysis of LPC and MFCC Features in Voice Conversion using Artificial Neural Networks -- Chapter 28. Person Detection & Tracking Using Sparse Matrix Measurement for Visual Surveillance -- Chapter 29. Improvisation in Frequent Pattern Mining Technique -- Chapter 30. Design and Simulation of Hybrid SETMOS Operator Using Multiple Value Logic at 120nm Technology -- Chapter 31. Detailed Survey on Attacks in Wireless Sensor Network -- Chapter 32. Comparative Analysis of Frontal Face Recognition Using Radial Curves and Back Propagation Neural Network -- Chapter 33. Data Perturbation: An Approach to Protect Confidential Data in Cloud Environment -- Chapter 34. Biologically Inspired Techniques for Cognitive Decision-Making -- Chapter 35. Analysis of Edge Detection Techniques for Side Scan Sonar Image Using Block Processing and Fuzzy Logic Methods -- Chapter 36. Leveraging Virtualization for Optimal Resource Management in a Cloud Environment -- Chapter 37. Reconfigurable Circular Microstrip Patch Antenna With Polarization Diversity -- Chapter 38. Issues with DCR and NLSR in Named Based Routing Protocol -- Chapter 39. Design and Analysis of Quantum Dot Cellular Automata Technology based Reversible Multifunction Block -- Chapter 40. Text Independent Automatic Accent Identification Systemfor Kannada Language -- Chapter 41. Study The Effect of Adaptive Boosting on Performance of Classifiers for Human Activity Recognition -- Chapter 42. Towards Improved performance of emotion detection: Multimodal approach -- Chapter 43. Priority Dissection Supervision for Intrusion Detection in Wireless Sensor Networks -- Chapter 44. Multi-Objective Evolution based Scheduling of Computational Intensive Applications in Grid Environment -- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless Multimedia Sensor Networks -- Chapter 46. Mining Frequent Quality Factors of Software System using Apriori Algorithm -- Chapter 47. Algorithm for the Enumeration and Identification of Kinematic Chains -- Chapter 48. A New Congestion Avoidance and Mitigation Mechanism based on Traffic Assignment Factor and Transit Routing in MANET -- Chapter 49. MRWDPP: Multipath Routing Wormhole Detection and Prevention Protocol in Mobile Ad Hoc Networks -- Chapter 50. Self-coordinating bus route system to avoid bus bunching -- Chapter 51. Review on Data Hiding In Motion Vectors and in Intra prediction modes for video compression -- Chapter 52. Generation of Product Cipher for Secure Encryption and Decryption based on Vedic Encryption Ideology and using Variable and Multiple Keys -- Chapter 53. A Novel Integer Representation Based Approach for Classification of Text Documents -- Chapter 54. Communication Device for Differently-abled people: A Prototype Model -- Chapter 55. Combination of PCA and Contourlets for Multispectral Image Fusion -- Chapter 56. A Behavioral Study of Some Widely Employed Partitional and Model-Based Clustering Algorithms and their Hybridizations -- Chapter 57. An Adaptive MapReduce Scheduler for Scalable Heterogeneous Systems -- Chapter 58. Enhancement In Connectivity By Distributed Beamforming In WSN -- Chapter 59. Sparse Representation Based Query Classification using LDA Topic Modeling -- Chapter 60. MULTIPLE HOME AUTOMATION ON RASPBERRY PI -- Chapter 61. Sentiment Analysis based on A.I. over Big Data -- Chapter 62. Negotiation and Monitoring of Service Level Agreements in cloud computing Services -- Chapter 63. IMPACT OF PERFORMANCE MANAGEMENT PROCESS ON PRINT ORGANIZATIONAL PERFORMANCE- IN INDIAN CONTEXT -- Chapter 64. Mobility Aware Path Discovery for efficient routing in Wireless Multimedia Sensor Network -- Chapter 65. Emerging Internet of Things in Revolutionizing Healthcare -- Chapter 66. Swarm Intelligent WSN for Smart City -- Chapter 67. Representing natural language Sentences in RDF graphs to derive Knowledge Patterns -- Chapter 68. A Framework to Enhance Security for OTP SMS in E-Banking Environment using Cryptography and Text Steganography -- Chapter 69. Study on the use of Geographic Information System (GIS) for Effective Transport Planning for Transport for London (TfL) -- Chapter 70. AN INTEGRATION OF BIG DATA AND CLOUD COMPUTING -- Chapter 71. A New Approach for Fast Transmission to Remote Cooperative Groups with a New Key Paradigm using Voice Authentication -- Chapter 72. ICT enabled proposed solutions for Soil Fertility Management in Indian Agriculture -- Chapter 73. Software Maintenance: From the Perspective of Effort and Cost Requirement -- Chapter 74. FPGA IMPLEMENTATION OF LOW POWER PIPELINED 32-BIT RISC PROCESSOR USING CLOCK GATING -- Chapter 75. Dynamic Software Aging Detection Based Fault Tolerant Software Rejuvenation Model for Virtualized Environment -- Chapter 76. Analysis of Group Performance by Swarm Agents in SACA Architecture -- Chapter 77. Background Modeling and Foreground Object Detection for Indoor Video Sequence -- Chapter 78. Agri-Guide: An Integrated Approach for Plant Disease Precaution, Detection & Treatment -- Chapter 79.