LEADER 00946nam--2200349---450- 001 990001554470203316 005 20050624103130.0 035 $a000155447 035 $aUSA01000155447 035 $a(ALEPH)000155447USA01 035 $a000155447 100 $a20040402d1947----km-y0itay0103----ba 101 0 $afre 102 $aFR 105 $a||||||||001yy 200 1 $aVie des'Formes$fHenri Focillon 210 $aParis$cPresses Universitavres$d1947 215 $a124 p.$d23 cm 410 0$12001 454 1$12001 461 1$1001-------$12001 700 1$aFOCILLON,$bHenri$033219 801 0$aIT$bsalbc$gISBD 912 $a990001554470203316 951 $aII.1.D. 2542(IV C 1895)$b49551 L.M.$cIV C 959 $aBK 969 $aUMA 979 $aSIAV2$b10$c20040402$lUSA01$h1239 979 $aSIAV1$b10$c20040406$lUSA01$h1751 979 $aCOPAT5$b90$c20050624$lUSA01$h1031 996 $aVie des'Formes$9941175 997 $aUNISA LEADER 01044nam a2200205 i 4500 001 991001594969707536 008 030509s2002 it 000 0 ita d 035 $ab12169663-39ule_inst 040 $aDip.to Studi Storici$bita 082 $a282.092 100 1 $aL'Arco, Adolfo$0451141 245 00$aBartolo Longo e la sua intimità con Dio /$cAdolfo L'Arco ; in collaborazione con il Vice-Postulatore della causa di canonizzazione del beato Bartolo Longo e l'Associazione "Amici di Bartolo Longo" 260 $aPompei :$bPontificio santuario di Pompei,$c2002 650 4$aBartolo Longo - Studi 907 $a.b12169663$b02-04-14$c09-05-03 912 $a991001594969707536 945 $aLE023 282.09 LAR 1 1$g1$lle023$nordini 2003 Pellegrino$nlibro in prestito da controllare$nVen 20 Apr 2007: Sollecito rientrato il Data sconosciuta per .p1012704$o-$pE7.00$q-$rl$sm $t0$u1$v0$w1$x0$y.i12511547$z09-05-03 996 $aBartolo Longo e la sua intimità con Dio$9145151 997 $aUNISALENTO 998 $ale023$b09-05-03$cm$da $e-$fita$git $h0$i0 LEADER 01765oam 2200469I 450 001 9910705244903321 005 20140410101232.0 035 $a(CKB)5470000002448918 035 $a(OCoLC)875922499 035 $a(EXLCZ)995470000002448918 100 $a20140407d2014 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aLivestock gross margin dairy isurance $ean assessment of risk management and potential supply impacts /$fKenny Burdine [and three others] 210 1$a[Washington, D.C.] :$cUnited States Department of Agriculture, Economic Research Service,$d[2014] 215 $a1 online resource (ii pages, 2 unnumbered pages, 25 pages) $ccolor illustrations 225 1 $aEconomic research report ;$vnumber 163 300 $aTitle from title screen (viewed April 7, 2014). 300 $a"March 2014." 300 $aAccompanied by summary report. 320 $aIncludes bibliographical references (pages 16-17) and glossary. 517 $aLivestock gross margin dairy isurance 606 $aAgricultural insurance$zUnited States 606 $aDairying$xRisk management$zUnited States 606 $aMilk trade$xRisk management$zUnited States 606 $aSupply and demand 615 0$aAgricultural insurance 615 0$aDairying$xRisk management 615 0$aMilk trade$xRisk management 615 0$aSupply and demand. 700 $aBurdine$b Kenny$01401956 712 02$aUnited States.$bDepartment of Agriculture.$bEconomic Research Service, 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910705244903321 996 $aLivestock gross margin dairy isurance$93471448 997 $aUNINA LEADER 05776nam 22007935 450 001 9910983297803321 005 20250212115311.0 010 $a9783031813368 010 $a3031813367 024 7 $a10.1007/978-3-031-81336-8 035 $a(CKB)37516084600041 035 $a(MiAaPQ)EBC31903262 035 $a(Au-PeEL)EBL31903262 035 $a(OCoLC)1499720193 035 $a(DE-He213)978-3-031-81336-8 035 $a(EXLCZ)9937516084600041 100 $a20250212d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputational Intelligence in Communications and Business Analytics $e6th International Conference, CICBA 2024, Patna, India, January 23?25, 2024, Revised Selected Papers, Part III /$fedited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (475 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2368 311 08$a9783031813351 311 08$a3031813359 327 $aTheories and Applications to Data Communications and Analytics -- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things -- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems -- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach -- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption -- A Novel Chaos and DNA Computing for Medical Image Encryption -- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift -- Digital Images Encryption Using PWLCM and Sine Map -- Hybrid Humor Classification and Detection Based on Machine Learning -- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree -- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi -- ECCNN A Novel Efficient Compressed Convolutional Neural Network -- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks -- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms -- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting -- Secure Non Fungible Token Marketplaces Using ERC 721 -- A Detailed Comparative Study of Regression Models for Stock Price Prediction -- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization -- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction -- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords -- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective -- Is software defined smart grid secure An analysis of security issues and solutions -- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring -- Smart Tech Cane Navigator (STCN) for Physically Challenged -- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant -- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments -- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy. 330 $aThis three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23?25, 2024. The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2368 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer engineering 606 $aComputer networks 606 $aArtificial intelligence 606 $aApplication software 606 $aData Structures and Information Theory 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 14$aData Structures and Information Theory. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 615 24$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 676 $a005.73 676 $a003.54 700 $aSingh$b Jyoti Prakash$01059572 701 $aSingh$b Maheshwari Prasad$01784284 701 $aSingh$b Amit Kumar$0871867 701 $aMukhopadhyay$b Somnath$01784285 701 $aMandal$b Jyotsna K$01784286 701 $aDutta$b Paramartha$0852950 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983297803321 996 $aComputational Intelligence in Communications and Business Analytics$94315968 997 $aUNINA