LEADER 01521nam 2200445 450 001 9910714613003321 005 20200303102847.0 035 $a(WsH)opnaddmzn 035 $a(CKB)5580000000285384 035 $a(OCoLC)1142814027 035 $a(EXLCZ)995580000000285384 100 $a20200303d2019 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aOccupation and demobilization, 1918-1923 /$fby Brian F. Neumann and Shane D. Makowicki 210 1$aWashington, D.C. :$cCenter of Military History, United States Army,$d2019. 215 $a1 online resource (87 pages) $cillustrations, color maps 225 1 $aCMH Pub ;$v77-9 225 1 $aThe U.S. Army campaigns of World War I 300 $a"PIN : 205915-000"--Back cover. 320 $aIncludes bibliographical references (page 87). 606 $aWorld War, 1914-1918$xPeace 606 $aPeace-building 606 $aWorld War, 1914-1918$zUnited States 607 $aGermany$xHistory$yAllied occupation, 1918-1930 615 0$aWorld War, 1914-1918$xPeace. 615 0$aPeace-building. 615 0$aWorld War, 1914-1918 700 $aNeumann$b Brian F$g(Brian Fisher),$f1975-$01412900 702 $aMakowicki$b Shane D. 712 02$aCenter of Military History, 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910714613003321 996 $aOccupation and demobilization, 1918-1923$93514312 997 $aUNINA LEADER 04267nam 2200613 450 001 9910790608903321 005 20230803220323.0 010 $a0-19-933524-9 010 $a0-19-933521-4 010 $a0-19-933523-0 035 $a(CKB)2550000001139930 035 $a(EBL)1538383 035 $a(OCoLC)862612714 035 $a(SSID)ssj0001041183 035 $a(PQKBManifestationID)12469323 035 $a(PQKBTitleCode)TC0001041183 035 $a(PQKBWorkID)11009088 035 $a(PQKB)10036717 035 $a(MiAaPQ)EBC1538383 035 $a(Au-PeEL)EBL1538383 035 $a(CaPaEBR)ebr10792469 035 $a(CaONFJC)MIL539444 035 $a(EXLCZ)992550000001139930 100 $a20130724h20142014 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 04$aThe other Gospels $eaccounts of Jesus from outside the New Testament /$fedited and translated by Bart D. Ehrman and Zlatko Ples?e 210 1$aNew York :$cOxford University Press,$d[2014] 210 4$d©2014 215 $a1 online resource (343 p.) 300 $aRev. ed. of: The Apocryphal Gospels : texts and translations. c2011. 311 $a0-19-933522-2 311 $a1-306-08193-9 320 $aIncludes bibliographical references. 327 $aCover; Contents; Preface; Table of Technical Terms and Symbols; INFANCY GOSPELS; 1. The Infancy Gospel of Thomas; 2. The Infancy Gospel of Thomas C: An Alternative Beginning; 3. The Proto-Gospel of James (The Birth of Mary, the Revelation of James); 4. The Gospel of Pseudo-Matthew; 5. The Latin Infancy Gospels (J Composition): Arundel Form; 6. History of Joseph the Carpenter; MINISTRY GOSPELS; 7. The Jewish-Christian Gospels; THE GOSPEL OF THE NAZAREANS; THE GOSPEL OF THE EBIONITES; THE GOSPEL ACCORDING TO THE HEBREWS; 8. The Gospel according to the Egyptians 327 $a9. A Gospel Harmony: The Diatessaron?10. Papyrus Berlin 11710; 11. Papyrus Cairo 10735; 12. Papyrus Egerton 2 (and Papyrus Ko?ln 255); 13. Papyrus Merton 51; 14. Papyrus Oxyrhynchus 210; 15. Papyrus Oxyrhynchus 840; 16. Papyrus Oxyrhynchus 1224; 17. Papyrus Oxyrhynchus 2949; 18. Papyrus Oxyrhynchus 4009; 19. Papyrus Vindobenensis G 2325 (The Fayu?m Fragment); SAYINGS GOSPELS AND AGRAPHA; 20. The Gospel according to Thomas; THE GOSPEL OF THOMAS: THE GREEK FRAGMENTS; 21. Agrapha; PASSION, RESURRECTION, AND POST-RESURRECTION GOSPELS; 22. The Gospel of Peter; 23. The Gospel of Judas 327 $a24. Jesus' Correspondence with Abgar25. The Gospel of the Savior; 26. The Discourse upon the Cross; 27. The Gospel of Nicodemus (The Acts of Pilate) A; 28. The Gospel of Nicodemus (Acts of Pilate) B (Including the Descent into Hades); 29. The Report of Pontius Pilate (Anaphora Pilati); 30. The Handing Over of Pilate (Paradosis Pilati); 31. The Letter of Pilate to Claudius; 32. The Letter of Herod to Pilate; 33. The Letter of Pilate to Herod; 34. The Letter of Tiberius to Pilate; 35. The Vengeance of the Savior (Vindicta Salvatoris); 36. The Death of Pilate Who Condemned Jesus (Mors Pilati) 327 $a37. The Narrative of Joseph of Arimathea38. The Gospel according to Mary; THE GOSPEL ACCORDING TO MARY: GREEK FRAGMENTS; 39. The Greater Questions of Mary 330 $aBart Ehrman--the New York Times bestselling author of Misquoting Jesus and a recognized authority on the early Christian Church--and Zlatko Plese--a foremost authority on Christian Gnosticism--here offer a valuable compilation of over 40 ancient gospel texts and textual fragments that do not appear in the New Testament. This comprehensive collection contains Gospels describing Jesus's infancy, ministry, Passion, and resurrection, and includes the controversial manuscript discoveries of modern times, such as the Gospel of Thomas and the most recent Gospel to be discovered, the Gospel of Judas I 606 $aApocryphal books (New Testament) 615 0$aApocryphal books (New Testament) 676 $a229/.8052 701 $aEhrman$b Bart D$0476550 701 $aPles?e$b Zlatko$01121962 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790608903321 996 $aThe other Gospels$93717622 997 $aUNINA LEADER 10865nam 22004933 450 001 9910847077003321 005 20240405084504.0 010 $a981-9701-80-5 035 $a(MiAaPQ)EBC31246345 035 $a(Au-PeEL)EBL31246345 035 $a(CKB)31326334900041 035 $a(MiAaPQ)EBC31266939 035 $a(Au-PeEL)EBL31266939 035 $a(EXLCZ)9931326334900041 100 $a20240405d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of International Joint Conference on Advances in Computational Intelligence $eIjcaci 2023 205 $a1st ed. 210 1$aSingapore :$cSpringer Singapore Pte. Limited,$d2024. 210 4$d©2024. 215 $a1 online resource (797 pages) 225 1 $aAlgorithms for Intelligent Systems Series 311 $a981-9701-79-1 327 $aIntro -- Preface -- Contents -- About the Editors -- 1 Conversational Swarm Intelligence (CSI) Enhances Groupwise Deliberation -- 1 Introduction -- 2 Conversational Swarm Intelligence (CSI) -- 3 Experimental Study -- 4 Results -- 5 Conclusions -- References -- 2 Enhancing Biometrics with Auto Encoder: Accurate Finger Detection from Fingerprint Images -- 1 Introduction -- 2 Related Study -- 3 Proposed Method -- 3.1 Work Flow -- 3.2 Proposed Model -- 4 Result and Discussion -- 4.1 Dataset -- 4.2 Model Training and Testing -- 4.3 Model Performance Analysis -- 5 Conclusion -- References -- 3 Minimization of Structural Systems Eccentricity by Means of the Imperialist Competitive Algorithm -- 1 Introduction -- 2 Minimization of Structural Eccentricity -- 2.1 Problem Formulation -- 2.2 Optimization Algorithm -- 3 Numerical Test Case -- 4 Structural Design Based on Design Codes -- 5 Design Based on the Minimization Problem of Torsional Response -- 5.1 Eccentricities of the Initial and Improved Structural System Using KANEPE -- 5.2 Stiffness Eccentricity Minimization Problem -- 5.3 Strength Eccentricity Minimization Problem -- 6 Conclusions -- References -- 4 Toward Early Detection of Neonatal Birth Asphyxia Utilizing Ensemble Machine Learning Approach -- 1 Introduction -- 2 Methodology -- 2.1 Dataset Description -- 2.2 Audio Sampling -- 2.3 Feature Extraction -- 2.4 Machine Learning Classifier -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- 5 Data Hiding System Based on Variations in Image Interpolation Algorithms -- 1 Introduction -- 2 Problem Statement -- 3 Literature Survey -- 4 Proposed Model -- 4.1 Overview -- 4.2 Embedding Technique -- 4.3 Extraction Methodology -- 4.4 Perceptual Distortion Function -- 4.5 Experimental Setup -- 4.6 Evaluation Metrics -- 4.7 Working -- 5 Results and Discussion -- 6 Conclusion -- 7 Future Scope. 327 $aReferences -- 6 Fault Assessment and Early Performance Prediction of PV Module Using Machine Learning -- 1 Introduction -- 2 Anisotropic Diffusion Filter and Image Segmentation -- 3 Internet of Things (IoT)-Based Micro crack Detection -- 4 Electroluminescence Images and Machine Learning for Crack Identification -- 5 Crack Detection Using Complex Wavelet Transform and ANFIS Classification Method -- 5.1 Transfer Learning-Based Approach -- 6 Conclusion -- References -- 7 Speeding Classification by a Deep Learning Audio Analysis System Optimized by the Reptile Search Algorithm -- 1 Introduction -- 2 Related Works and Preliminaries -- 2.1 Deep Neural Networks -- 2.2 Metaheuristic Optimization -- 3 Methods -- 3.1 Reptile Search Algorithm -- 3.2 Modified RSA -- 4 Experimental Setup -- 4.1 Dataset Description -- 4.2 Metrics -- 4.3 Simulation Setup -- 5 Experiments Outcomes -- 6 Conclusion -- References -- 8 Exploring Sentiments in Text: A Survey of Implicit and Explicit Aspect-Based Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 3 Implicit and Explicit Sentiment Analysis -- 3.1 Terminology and Attributes -- 3.2 Data Requirements -- 3.3 Intricacy and Generalization -- 3.4 Methodologies and Techniques -- 3.5 Techniques Employed -- 3.6 Benefits -- 3.7 Techniques Utilized -- 3.8 Future Research Directions -- 3.9 Performance, Advantages, and Limitations of ABSA -- 4 Conclusion -- References -- 9 A Comprehensive Review on Prediction of Blood Glucose Level in Type 1 Diabetic Using Machine Learning Techniques -- 1 Introduction -- 2 Modeling Approach -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Processing -- 4 Glucose Prediction Model -- 4.1 Data-Driven Model with CGM Data Only -- 4.2 Data-Driven Model with CGM Data and Additional Input Features -- 4.3 Hybrid Model with CGM and Additional Features -- 5 Discussion -- 6 Conclusion. 327 $aReferences -- 10 Effect of Phosphorylation on the Circadian Clock of Drosophila by Analytical and Graph Theory Matrix Approach -- 1 Introduction -- 2 Mathematical Modelling -- 3 Analytical Expression Using Homotopy Perturbation Method -- 4 Graph Theory Matrix Approach -- 5 Effects of Kinetic Parameter from Graph Theory Matrix Approach -- 6 Matrix Representation of Structure Graph -- 7 Discussion -- 7.1 Effects of Kinetic Parameter from Analytical Expression by HPM -- References -- 11 Exploiting Deep Learning Techniques for Autistic Face Recognition -- 1 Introduction -- 2 Dataset Description -- 3 Introduction of VGG16 and EfficientNet and DenseNet Model -- 4 Comparison Analysis of Pre-trained Models -- 5 Conclusion and Future Work -- References -- 12 A Comprehensive Review of Migration of Big Data Applications to Public Clouds: Current Requirements, Types, Strategies, and Case Studies -- 1 Introduction -- 1.1 Motivation for Review -- 1.2 History of Data Migration -- 2 Related Works -- 3 Types of Strategies for Cloud Data Migration -- 4 Latest Advancements in Big Data Migration -- 5 Case Studies on Data Migration Services Offered by Popular Public Cloud Environments -- 6 Conclusion -- References -- 13 Potato Leaf Disease Detection and Classification Using VGG16 -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Architecture -- 3.2 Transfer Learning -- 3.3 VGG 16 Architecture -- 4 Modules -- 4.1 Image Processing -- 4.2 Data Splitting -- 4.3 Feature Extraction -- 4.4 Data Classification -- 4.5 Testing -- 5 Results -- 6 Conclusion -- References -- 14 Assessing Student Engagement Levels Using Speech Emotion Recognition -- 1 Introduction -- 2 Literature Review -- 2.1 Importance of Understanding Student Emotions -- 2.2 Implementation Aspects of SER -- 2.3 Features Considered for SER -- 2.4 Databases Referred by Studies. 327 $a2.5 The Conclusion from Literature Review -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Preprocessing and Exploratory Analysis -- 3.3 Feature Extraction -- 3.4 Building SER Models Using Machine Learning and Deep Learning -- 4 Results and Analysis -- 4.1 Machine Learning-Based Models -- 4.2 Deep Learning-Based Models -- 5 Conclusion and Future Scope -- References -- 15 K-Means Clustering and Support Vector Machine for Assamese Dialect Identification -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Feature Extraction -- 3.2 K-Means Clustering -- 3.3 Feature Classification -- 4 Experimental Setup -- 4.1 Speech Database -- 5 Result and Discussion -- 6 Conclusion -- References -- 16 Emotion Recognition in Speech Using Convolutional Neural Networks (CNNs) -- 1 Introduction -- 2 Literature Survey -- 3 System Model -- 3.1 Dataset Being Used for the Work -- 3.2 Feature Extraction Methods -- 3.3 The CNN Model -- 4 Proposed Methodology -- 4.1 Data Augmentation -- 4.2 Data Pre-processing and Feature Extraction -- 4.3 Model Parameters -- 5 Experimental Results -- 6 Conclusion -- References -- 17 Single Value Neutrosophic Virtual Machine Resources Optimization -- 1 Introduction -- 2 Neutrosophic Virtual Machine Resource Optimization for Tasks Load Distribution -- 3 Experimental Discussions -- 4 Comparison Between Existing Approaches with Proposed Framework -- 5 Conclusion -- References -- 18 Route Selection in Multimodal Transport Networks Incorporating Disruption -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 3.1 Pareto Optimality -- 3.2 Tiered Table -- 4 Multimodal Freight Route Selection via Tiered Table -- 4.1 Step 1: Formulating the Multi-objective Problem -- 4.2 Step 2: Obtaining Series of Possible Routes from Origin to Destination -- 4.3 Step 3: Processing MCS Results. 327 $a4.4 Step 4: Populating the n n -tiered table -- 4.5 Lemma -- 4.6 Step 5: Interrogating the n-tiered Table -- 5 Numerical Case Study -- 6 Results -- 6.1 Case 1 -- 6.2 Case 2 -- 6.3 Case 3 -- 6.4 Case 4 -- 7 Discussion -- 8 Conclusion -- References -- 19 A Smart Surveillance System to Detect Modern Gun Using YOLOv5 Algorithm: A Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset Explanation -- 3.2 Dataset Preprocessing -- 3.3 YOLOv5 Implementation for Gun Detection -- 4 Experiment Results -- 5 Conclusion -- References -- 20 A Comparative Analysis of Models for Dark Web Data Classification -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preparation -- 3.3 Model Training -- 4 Results -- 4.1 Accuracy -- 4.2 Performance Measures -- 5 Conclusion -- References -- 21 Optimizing Cloud Computing Load Balancing Through Extended Ant Colony Optimization -- 1 Introduction -- 2 Literature Survey -- 3 Virtual Machine Allocation -- 3.1 Basic Ant Colony Algorithm -- 3.2 Extended Ant Colony Algorithm (EACA) -- 4 Results -- 5 Conclusion -- References -- 22 Computationally Efficient and Statistical Attack Resistant Image Encryption System for Smart Healthcare -- 1 Introduction -- 2 Literature Survey -- 3 Preliminaries -- 4 Proposed Algorithm -- 4.1 Generation of Control Parameters -- 4.2 Generation of Key Image Blocks and Indexed Sequences -- 4.3 Intra-row Confusion and Row-Wide Diffusion -- 4.4 Intra-column Confusion and Column-Wide Diffusion -- 4.5 Intra-row Confusion and Row-Wide Diffusion -- 5 Experimental Results -- 5.1 Key Space Analysis -- 5.2 Key Sensitivity Analysis -- 5.3 Information Entropy Analysis (IE) -- 5.4 Statistical Analysis -- 5.5 Differential Attack Analysis -- 5.6 Execution Time (ET) -- 5.7 Perception Analysis -- 6 Decryption Process. 327 $a7 Conclusion. 410 0$aAlgorithms for Intelligent Systems Series 676 $a006.3 700 $aUddin$b Mohammad Shorif$01369079 701 $aBansal$b Jagdish Chand$01338605 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910847077003321 996 $aProceedings of International Joint Conference on Advances in Computational Intelligence$94154607 997 $aUNINA