LEADER 01258nam a2200229 i 4500 001 991000863619707536 008 100922s1891 it 000 0 ita d 035 $ab13923547-39ule_inst 040 $aDip.to Studi Giuridici$bita 082 0 $a343.4505 100 1 $aFazio, Giuseppe$0370634 245 10$aCodice daziario : raccolta delle leggi, regolamenti, istruzioni ed altre disposizioni ufficiali riflettenti i dazi di consumo, nonchè la giurisprudenza più recente sulla materia e relativi commenti /$cGiuseppe Fazio, Matilde Fazio 250 $a2. ed. notevolmente corretta ed ampliata 260 $aRoma :$bpresso l'Amministrazione del periodico: Il dazio sul consumo,$c1891 300 $a643 p. ;$c27 cm. 650 4$aDogane$xLegislazione$zItalia$ySec. 19. 907 $a.b13923547$b02-04-14$c23-09-10 912 $a991000863619707536 945 $aLE027 F/A II G FAZ01.01$g1$i2027000304349$lle027$op$pE35.00$q-$rn$s- $t0$u0$v0$w0$x0$y.i1517542x$z23-09-10 996 $aCodice daziario : raccolta delle leggi, regolamenti, istruzioni ed altre disposizioni ufficiali riflettenti i dazi di consumo, nonchè la giurisprudenza più recente sulla materia e relativi commenti$9249768 997 $aUNISALENTO 998 $ale027$b22-09-10$cm$da $e-$fita$git $h0$i0 LEADER 02401oam 2200481 a 450 001 9910702869003321 005 20090420145104.0 035 $a(CKB)4970000000052892 035 $a(OCoLC)265896487 035 $a(EXLCZ)994970000000052892 100 $a20081031d2008 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aStatus of GSA's implementation of selected green building provisions of the Energy Independence and Security Act of 2007$b[electronic resource] /$f[signed] Mark Gaffigan, United States Government Accountability Office 210 1$aWashington, DC :$cU.S. Govt. Accountability Office,$d[2008] 215 $a4 pages $cdigital, PDF file 300 $aTitle from title screen (viewed on Oct. 2, 2008). 300 $a"October 31, 2008." 300 $a"GAO-09-111R." 320 $aIncludes bibliographical references. 330 $aSpecifically, this report provides general information on the status of GSA's (1) establishment of an Office of Federal High-Performance Green Buildings, (2) designation of energy managers for federally owned facilities, (3) adoption of a certification system for federal green buildings, and (4) efforts to accelerate the use of more cost-effective technologies and practices at GSA facilities.. 517 3 $aStatus of General Services Administration's implementation of selected green building provisions of the Energy Independence and Security Act of 2007 517 1 $aFederal green buildings 606 $aSustainable buildings$zUnited States 606 $aSustainable architecture$zUnited States 606 $aAdministrative agencies$xEnergy conservation$zUnited States 606 $aAdministrative agencies$xEnergy consumption$zUnited States 615 0$aSustainable buildings 615 0$aSustainable architecture 615 0$aAdministrative agencies$xEnergy conservation 615 0$aAdministrative agencies$xEnergy consumption 700 $aGaffigan$b Mark$01386207 712 02$aUnited States.$bGovernment Accountability Office. 801 0$bEJB 801 1$bEJB 801 2$bGPO 906 $aDOCUMENT 912 $a9910702869003321 996 $aStatus of GSA's implementation of selected green building provisions of the Energy Independence and Security Act of 2007$93527287 997 $aUNINA LEADER 12715nam 22007335 450 001 9910734872903321 005 20251009074932.0 010 $a981-9914-79-5 024 7 $a10.1007/978-981-99-1479-1 035 $a(MiAaPQ)EBC30615204 035 $a(Au-PeEL)EBL30615204 035 $a(DE-He213)978-981-99-1479-1 035 $a(PPN)272253316 035 $a(CKB)27357746400041 035 $a(EXLCZ)9927357746400041 100 $a20230701d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of Fourth International Conference on Computing, Communications, and Cyber-Security $eIC4S 2022 /$fedited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (920 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v664 311 08$aPrint version: Tanwar, Sudeep Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security Singapore : Springer,c2023 9789819914784 327 $aIntro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control -- 1 Introduction -- 2 Literature Review -- 3 System Design Methodology -- 3.1 System Architecture -- 3.2 IoT System Decision Flow -- 3.3 User Interface Mobile Application -- 4 Results -- 5 Conclusion -- References -- Drone Ecosystem: Architecture for Configuring and Securing UAVs -- 1 Introduction -- 2 UAV Ecosystem Infrastructure -- 3 Communication Architecture-Stage One -- 3.1 UAV or Drones -- 3.2 Light-Weight Cryptographic Function -- 3.3 Ad Hoc Network -- 4 Communication Architecture-Stage Two -- 4.1 5G Cellular Network -- 4.2 5G Cellular Tower -- 4.3 Network Slicing -- 5 Communication Architecture-Stage Three -- 5.1 Ground Station -- 5.2 Sub-ground Station -- 5.3 HTTP-3/QUIC Messaging Protocol -- 5.4 Zero-Round Trip Time (Zero/0-RTT) -- 5.5 Cloud, Cloud-Based Storage, and WAi -- 6 Security: Types of Attacks -- 6.1 Cyberattack Vectors -- 6.2 Physical Threat to Drones -- 7 Conclusion and Future Scope -- References -- An Improved Neural Network-Based Routing Algorithm for Mobile Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Path Finding Mechanism -- 3.2 Management of Event -- 3.3 Evaluation of the QoS Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Harvesting in Fifth-Generation Wireless Network: Upcoming Challenges and Future Directions -- 1 Introduction -- 2 Background and Motivation -- 3 Trends in Energy Harvesting -- 4 Challenges -- 5 Future Directions -- 6 Conclusion -- References -- Develop a Quantum Based Time Scheduling Algorithm for Digital Microfluidic Biochips -- 1 Introduction -- 2 Problem Description -- 2.1 Motivation -- 2.2 Problem Formulation. 327 $a3 Proposed Algorithm -- 4 Experimental Result -- 5 Conclusion -- References -- Revolution in Agriculture with the Aid of Internet of Things -- 1 Introduction -- 2 Review of Literature -- 3 Benefits of IoT in Agriculture -- 4 Role of IoT in Agriculture -- 5 Proposed Systems -- 6 Conclusion -- References -- Supercontinuum Generation in Dispersion-Tailored Tetrachloroethylene Filled Photonic Crystal Fibers -- 1 Introduction -- 2 Theoretical Model of Tetrachloroethylene PCF -- 3 Dispersion Properties of the Proposed Fiber -- 4 SCG in Optimized Structures -- 5 Conclusion -- References -- Early Detection of Covid-19 Using Wearable Sensors' Data Enabled by Semantic Web Technologies -- 1 Introduction -- 1.1 Motivation -- 1.2 Objective -- 1.3 Contribution -- 2 Literature Survey -- 2.1 IoT and Covid-19 -- 2.2 SWT and SWoT -- 2.3 Related Works-Early Detection of Covid-19 -- 3 Methodology -- 4 Evaluation -- 4.1 Method and Metrics -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion and Future Scope -- References -- Cell Outage Detection in 5G Self-organizing Networks Based on FDA-HMM -- 1 Introduction -- 2 FDA Feature Extraction Method -- 3 Hidden Markov Models -- 4 HMM Training and Detection -- 4.1 Training Stage -- 4.2 Detection Stage -- 5 Simulation Results -- 5.1 FDA-HMM Performance at Different pp and upper LL -- 5.2 FDA-HMM Performance Comparison with Other Detectors -- 6 Conclusion -- References -- IoT-Based Scalable Framework for Pollution Aware Route Recommendation -- 1 Introduction -- 2 Background -- 3 Air Quality Standards -- 4 Proposed Architecture -- 4.1 Air Pollution Tracking -- 4.2 Traffic Re-routing -- 5 Process Methodology -- 6 Experimental Setup -- 6.1 Ingest -- 6.2 Collect -- 6.3 Process -- 6.4 Store -- 6.5 Visualize -- 6.6 Route Recommendation -- 6.7 User Interface -- 6.8 Result Analysis -- 7 Interface -- 8 Conclusion and Future Directions. 327 $aReferences -- Drone: A Systematic Review of UAV Technologies -- 1 Introduction -- 1.1 About the Drone and Its History -- 2 Contextual and Associated Work -- 2.1 Literature Review -- 2.2 Challenges in the Field of UAVs -- 2.3 Applications of Drones -- 2.4 Advantages and Disadvantages of Drones -- 2.5 Simulator Tools -- 3 Future Work and Conclusions -- References -- Reconfigurable Intelligent Surface-Enabled Energy-Efficient Cooperative Spectrum Sensing -- 1 Introduction -- 2 System Model -- 3 Energy Efficiency of RIS-Based CSS -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Resource Sharing in Back Haul Satellite-Based NOMA Network -- 1 Introduction -- 2 System Model -- 2.1 Selection a User for a BS -- 2.2 Access to Satellite -- 3 Results and Simulation -- 4 Conclusion -- References -- Advanced Computing Technologies -- A Review on Various Deepfakes' Detection Methods -- 1 Introduction -- 2 Deepfakes' Generation -- 3 Generative Adversarial Networks (GANs) -- 4 Types of Deepfakes -- 5 Literature Survey -- 6 Conclusion -- References -- Proposed Framework for Implementation of Biometrics in Banking KYC -- 1 Introduction -- 2 Literature Review -- 3 Biometric Security -- 3.1 Biometric Implementation in Banking -- 4 Retinal Biometric Recognition -- 4.1 What Is Retinal Biometric Recognition -- 4.2 Working of Retinal Biometric Recognition -- 4.3 Application of Iris Recognition -- 5 Threats and Attacks on Banking -- 6 Proposed Methodology -- 6.1 Components of the Adaptive Framework -- 6.2 Adaptive Operational Framework -- 7 Strengths of Proposed Methodology -- 7.1 Design Objectives of KYC Framework -- 8 Conclusion and Future Scope -- References -- Paddy Pro: A MobileNetV3-Based App to Identify Paddy Leaf Diseases -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 System Architecture -- 4 Classification Models. 327 $a4.1 Convolutional Neural Networks (CNN) -- 4.2 MobileNetV3 -- 4.3 Transfer Learning -- 4.4 Mobile App Development -- 5 Experimental Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing -- 1 Introduction -- 1.1 RFID Communication System Security Standards for IoT -- 2 Literature Review -- 2.1 Definition of the Problem -- 2.2 The Purpose and Signicance of Our Work -- 3 Definitions and Mathematical Preliminaries -- 3.1 Background of ECC -- 4 RSEAP2-Protocol -- 5 Security Analysis of RSEAP2 -- 5.1 Inappropriate Extraction of Keys -- 5.2 Inefficient Mutual Authentication Attack -- 5.3 Inefficient Session Key Establishment Attack -- 5.4 Attack on Denial of Service -- 5.5 Availability Issues -- 6 Performance Analysis -- 7 Concluding Remarks -- References -- A Survey on Code-Mixed Sentiment Analysis Based on Hinglish Dataset -- 1 Introduction -- 2 Related Research -- 3 Datasets -- 4 Challenges and Issues -- 5 Conclusion -- References -- An Alternative to PHP for the Development of Web Applications: Java Server Pages Engine -- 1 Introduction -- 2 Concept Statement -- 2.1 JSP: The Basis and High-Speed Setting -- 2.2 Shell for Java Server Pages -- 3 The Perspectives of Using Java Server Pages -- 4 Conclusions -- References -- Novel Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 1 Introduction -- 1.1 Motivation and Novelty -- 1.2 Load Balancing in Fog Computing -- 2 Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 2.1 Workflow -- 2.2 Details of Microservice in Proposed Healthcare System -- 2.3 Success_factor-Based Load Balancing Algorithm -- 3 Result and Discussion -- 3.1 Throughput -- 3.2 Execution Time -- 4 Conclusion -- References. 327 $aSelf-improved COOT Algorithm for Resource Allocation in Cloud Data Centers -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Resource Allocation Method in Cloud: An Overview of Proposed Concept -- 3.1 Suggested Resource Allocation Method -- 3.2 Cloud Setup -- 4 Improved K-means-Based Workload Clustering: SUCO-Based Optimal Centroid Identification -- 4.1 Improved K-means Clustering-Based Workload Clustering -- 4.2 Defined Threefold Objectives -- 4.3 Suggested SUCO Model for Resource Allocation and Optimal Centroid Selection -- 5 Results and Discussion -- 5.1 Simulation Procedure -- 5.2 Analysis on Energy Consumption -- 5.3 Analysis on Execution Time -- 5.4 Analysis on Resource Utilization -- 5.5 Convergence Analysis -- 5.6 Performance Analysis -- 5.7 Analysis on Computing Time -- 6 Conclusion -- References -- XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector -- 1 Introduction -- 1.1 Customer Interaction -- 1.2 Customer Engagement Marketing -- 1.3 Implementing a Customer Engagement Marketing Strategy -- 1.4 Customer Interaction Strategies -- 2 Literature Review -- 3 Proposed System Model -- 3.1 Work Flow Classification -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- CleanO-Renewable Energy-Based Robotic Floor Cleaner -- 1 Introduction -- 2 Product Design -- 2.1 Product Comparison -- 2.2 Empathize and Ideate Phase -- 3 Proposed System Model -- 3.1 Block Diagram -- 3.2 Architectural Diagram of IoT-Based Floor Cleaner -- 3.3 Navigation System -- 4 Proposed Product Prototype -- 5 Challenges and Research Opportunities -- 5.1 Networking -- 5.2 Machine Learning -- 5.3 Blockchain -- 5.4 Artificial Intelligence -- 5.5 Renewable and Reusable Energych23b27 -- 5.6 Future Resources -- 6 Conclusion -- References. 327 $aImpact of "COVID-19 Pandemic" on Children Online Education: A Review and Bibliometric Analysis. 330 $aThis book features selected research papers presented at the Fourth International Conference on Computing, Communications, and Cyber-Security (IC4S 2022), organized in Ghaziabad India, during October 21?22, 2022. The conference was hosted at KEC Ghaziabad in collaboration with WSG Poland, SFU Russia, & CSRL India. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v664 606 $aTelecommunication 606 $aSignal processing 606 $aComputer networks$xSecurity measures 606 $aArtificial intelligence 606 $aCommunications Engineering, Networks 606 $aSignal, Speech and Image Processing 606 $aMobile and Network Security 606 $aArtificial Intelligence 615 0$aTelecommunication. 615 0$aSignal processing. 615 0$aComputer networks$xSecurity measures. 615 0$aArtificial intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aSignal, Speech and Image Processing. 615 24$aMobile and Network Security. 615 24$aArtificial Intelligence. 676 $a004.6 700 $aTanwar$b Sudeep$0942571 701 $aWierzchon?$b S?awomir T$01425680 701 $aSingh$b Pradeep Kumar$01356193 701 $aGanzha$b M$g(Maria)$01373639 701 $aEpiphaniou$b Gregory$01373640 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910734872903321 996 $aProceedings of Fourth International Conference on Computing, Communications, and Cyber-Security$94470346 997 $aUNINA