LEADER 01146nam a2200313 i 4500 001 991000965519707536 005 20020507104515.0 008 971219s1995 ne ||| | eng 020 $a0792336704 035 $ab1015470x-39ule_inst 035 $aLE00639885$9ExL 040 $aDip.to Fisica$bita 084 $a53.1.4 084 $a530.1'2 084 $aQC173.96.F86 100 1 $aFerrero, Miguel$0462127 245 10$aFundamental problems in quantum physics /$cedited by Miguel Ferrero and Alwyn van der Merwe 260 $aDordrecht :$bKluwer Academic Publishers,$c1995 300 $ax, 375 p. :$bill. ;$c25 cm. 490 0 $aFundamental theories of physics ;$v73 500 $aIncludes bibliographical references and index. 650 4$aQuantum theory$xCongresses 700 1 $aMerwe, Alwyn van der 907 $a.b1015470x$b17-02-17$c27-06-02 912 $a991000965519707536 945 $aLE006 53.1.4 FER$g1$i2006000068581$lle006$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10187017$z27-06-02 996 $aFundamental problems in quantum physics$9187151 997 $aUNISALENTO 998 $ale006$b01-01-97$cm$da $e-$feng$gne $h0$i1 LEADER 01650nam 2200517 450 001 9910793654703321 005 20230817180527.0 010 $a0-271-08545-2 035 $a(CKB)4100000008415479 035 $a(MiAaPQ)EBC6224806 035 $a(EXLCZ)994100000008415479 100 $a20200930d2019 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAfter gun violence $edeliberation and memory in an age of political gridlock /$fCraig Rood 210 1$aUniversity Park, Pennsylvania :$cThe Pennsylvania State University Press,$d[2019] 210 4$dİ2019 215 $a1 online resource (x,186 pages) 225 1 $aRhetoric and democratic deliberation 311 $a0-271-08383-2 320 $aIncludes bibliographical references and index. 410 0$aRhetoric and democratic deliberation. 606 $aFirearms and crime$zUnited States 606 $aViolent crimes$zUnited States 606 $aCollective memory$zUnited States 606 $aMass shootings$zUnited States 606 $aFirearms$xGovernment policy$zUnited States 606 $aRhetoric$zUnited States 615 0$aFirearms and crime 615 0$aViolent crimes 615 0$aCollective memory 615 0$aMass shootings 615 0$aFirearms$xGovernment policy 615 0$aRhetoric 676 $a364.150973 700 $aRood$b Craig$f1985-$01575823 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910793654703321 996 $aAfter gun violence$93853132 997 $aUNINA LEADER 05756nam 22007695 450 001 9910879585003321 005 20250814134737.0 010 $a3-031-64076-4 024 7 $a10.1007/978-3-031-64076-6 035 $a(MiAaPQ)EBC31591914 035 $a(Au-PeEL)EBL31591914 035 $a(CKB)33769532100041 035 $a(DE-He213)978-3-031-64076-6 035 $a(EXLCZ)9933769532100041 100 $a20240808d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Network Technologies and Intelligent Computing $eThird International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I /$fedited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Sanjay Kumar Dhurandher, Isaac Woungang 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (421 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2090 311 08$a3-031-64075-6 327 $a -- Advanced Network Technologies. -- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels. -- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications. -- Enhancement of Security in Opportunistic Networks. -- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy. -- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading. -- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support. -- Vacation Recommendation System Using New York Times Articles. -- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks. -- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet. -- Simulation and Comparison of BB84 and SSP99 QKD Protocols. -- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology. -- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination. -- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control. -- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection. -- Smart Bakery: Technology and Automation. -- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research. -- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique. -- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique. -- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms. -- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning. -- Zero-day exploits framework of supply chain networks. -- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data. -- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing. -- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing. -- DNA-Based Elliptic Curve Cryptography for Data Security in IoT. 330 $aThe 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023. The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on: Part I - Advanced Network Technologies. Part II - Advanced Network Technologies; Intelligent Computing. Part III-IV - Intelligent Computing. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2090 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aCoding theory 606 $aInformation theory 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aSoftware Engineering 606 $aCoding and Information Theory 606 $aComputer Communication Networks 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aSoftware engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aSoftware Engineering. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 676 $a621.39 676 $a004.6 700 $aVerma$b Anshul$01592011 701 $aVerma$b Pradeepika$01765132 701 $aPattanaik$b Kiran Kumar$01765133 701 $aDhurandher$b Sanjay Kumar$01380384 701 $aWoungang$b Isaac$0846886 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910879585003321 996 $aAdvanced Network Technologies and Intelligent Computing$94206367 997 $aUNINA