top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communication, Networks and Computing : First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers / / edited by Shekhar Verma, Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal Abawajy
Communication, Networks and Computing : First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers / / edited by Shekhar Verma, Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal Abawajy
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 654 p. 438 illus.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Computer Engineering and Networks
Artificial Intelligence
ISBN 981-13-2372-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and wireless communication systems -- High dimensional data representation and processing -- Networks and information security -- Computing techniques for efficient networks design -- Electronic circuits for communication system.
Record Nr. UNINA-9910350239803321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information, Communication and Computing Technology : 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers / / Jemal Abawajy [and four others]
Information, Communication and Computing Technology : 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers / / Jemal Abawajy [and four others]
Edizione [First edition.]
Pubbl/distr/stampa Cham : , : Springer, , [2023]
Descrizione fisica 1 online resource (204 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science Series
Soggetto topico Artificial intelligence
Computer networks
ISBN 3-031-43838-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Intelligent Systems -- Using BERT for Swiss German Sentence Prediction -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Research Questions -- 2 Literature Review -- 2.1 Power of BERT -- 2.2 Multilingual BERT -- 2.3 The Swiss German Struggle -- 2.4 Audio BERT -- 2.5 Research Gap -- 3 Research Design -- 4 Experiments -- 4.1 Architecture Overview and Application Concept of BERT -- 4.2 Adaptation and Application Scenario of BERT -- 5 Results -- 6 Conclusion -- Appendix - Examples of Masked Sentence Predictions -- References -- An ARIMA and XGBoost Model Utilized for Forecasting Municipal Solid Waste Generation -- 1 Introduction -- 2 Related Work -- 3 Material and Methods -- 3.1 Study Area Information -- 3.2 Data Acquisition and Preparation -- 3.3 XGBoost -- 3.4 ARIMA -- 4 Experiments and Results -- 5 Conclusion and Future Work -- References -- An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Personalized Movie Recommendation Prediction Using Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Reinforcement Learning for Recommendation -- 2.2 Novelty of Our Approach -- 3 Methodology -- 3.1 Data Cleaning and Visualization -- 3.2 RL Algorithm -- 4 Experimental Setup -- 4.1 Dataset -- 5 Results and Discussion -- 5.1 Evaluation Metrics -- 5.2 Analysis of Recommendations -- 5.3 Limitations and Future Work -- 6 Conclusions and Perspective -- References -- An Ensemble and Deep Neural Network Based Approaches for Automated Sentiment Analysis -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions of the Paper -- 2 Literature Review -- 2.1 Machine Learning Approach -- 2.2 Deep Learning Approach -- 2.3 Hybrid Model Approach -- 3 Methodology.
3.1 Dataset and Pre-Processing -- 3.2 Ensemble Model -- 3.3 Implementation Using Bidirectional Long Short-Term Memory -- 3.4 Implementation Using Bidirectional Encoder Representations from Transformers (BERT) -- 3.5 The Proposed Hybrid CNN-LSTM Model -- 3.6 Evaluation Metrics -- 4 Results and Discussion -- 4.1 Results Obtained -- 4.2 Findings Based on Models Used Machine Learning Results -- 5 Conclusion and Future Works -- References -- In-store Product Placement Using LiDAR-Assisted Discrete PSO Algorithm -- 1 Introduction -- 2 Related Works -- 3 LiDAR-Assisted In-store Product Placement -- 3.1 Architecture -- 4 Discrete PSO-Algorithm and Stages -- 4.1 Algorithm -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 LiDAR-Based Data Collection -- 5.3 Discrete PSO Sequencer -- 6 Conclusion -- References -- Pattern Recognition -- Deep Residual Variational Autoencoder for Image Super-Resolution -- 1 Introduction -- 2 Related Work -- 2.1 Conventional SR Methods -- 2.2 DL-Based SR Models -- 3 Methodology -- 3.1 Encoder Model -- 3.2 Decoder Model -- 3.3 Loss Function -- 4 Experiments -- 4.1 Training Dataset -- 4.2 Hardware -- 4.3 Training Details -- 4.4 Experimental Results -- 4.5 Comparative Evaluation -- 5 Conclusion -- References -- Hybrid HAN Model to Investigate Depression from Twitter Posts -- 1 Introduction -- 2 Background Study -- 3 Depression Detection Model -- 3.1 BiGRU Layer -- 3.2 Word Attention Context Layer -- 3.3 BiLSTM Layer -- 3.4 Sentence Attention Context Layer -- 3.5 Overall Architecture of Depression Detection Model -- 3.6 Dataset -- 3.7 Lexicon -- 3.8 Dataset Preprocessing -- 4 Performance Analysis -- 5 Conclusion -- References -- Transfer Learning-Based Encoder-Decoder Model for Skin Lesion Segmentation -- 1 Introduction -- 1.1 Study Objectives -- 2 Related Literature -- 3 Methods and Materials -- 3.1 U-Net Design.
3.2 Proposed Framework -- 3.3 Dataset -- 3.4 Experimental Setup -- 3.5 Performance Metrics -- 4 Discussion of Results -- 5 Conclusion -- References -- A System for Liver Tumor Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Preprocessing -- 3.2 Augmentation -- 3.3 Segmentation -- 3.4 Classification Model -- 3.5 Performance Measures -- 4 Results with Discussion -- 4.1 Dataset Description -- 4.2 Computer Settings and Parameters -- 4.3 Preprocessing -- 4.4 Liver Segmentation -- 4.5 Tumor Detection -- 5 Conclusion and Future Work -- References -- High Speed and Efficient Reconfigurable Histogram Equalisation Architecture for Image Contrast Enhancement -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Comparator Design -- 3.2 Counter Circuit Design -- 3.3 Pixel Mapping Unit Design -- 4 Experimental Results -- 4.1 Simulation Results -- 4.2 Synthesis Results and Analysis of Proposed Architecture -- 5 Conclusion -- References -- A Practical Use for AI-Generated Images -- 1 Introduction -- 2 Diffusion Probabilistic Model -- 3 Object Detection -- 4 Related Studies -- 5 Proposed Work -- 5.1 Datasets -- 5.2 Performance Metrics -- 5.3 Model Training -- 6 Result Analysis -- 7 Conclusion -- References -- Homomorphic Encryption Schemes Using Nested Matrices -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Previous HE Model -- 3.2 Proposed HE Model -- 4 Homomorphic Property Proofs -- 4.1 Homomorphic Property for 2 2 Nested Matrix -- 4.2 Encryption Algorithm with Partially Homomorphic Property -- 5 Experimental Results -- 5.1 Evaluation Metrics -- 5.2 Results -- 6 Discussion -- 7 Conclusions -- References -- A Deep Learning Model for Heterogeneous Dataset Analysis - Application to Winter Wheat Crop Yield Prediction -- 1 Introduction -- 2 Literature -- 3 Data Description -- 4 Data Pre-processing.
5 Proposed Approach -- 5.1 Training: Description of Time Steps -- 5.2 Training: Description of Forward/Backward Propagation -- 6 Experiment Setup -- 7 Experimental Results -- 8 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910746069903321
Cham : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information, Communication and Computing Technology : 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers / / Jemal Abawajy [and four others]
Information, Communication and Computing Technology : 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers / / Jemal Abawajy [and four others]
Edizione [First edition.]
Pubbl/distr/stampa Cham : , : Springer, , [2023]
Descrizione fisica 1 online resource (204 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science Series
Soggetto topico Artificial intelligence
Computer networks
ISBN 3-031-43838-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Intelligent Systems -- Using BERT for Swiss German Sentence Prediction -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Research Questions -- 2 Literature Review -- 2.1 Power of BERT -- 2.2 Multilingual BERT -- 2.3 The Swiss German Struggle -- 2.4 Audio BERT -- 2.5 Research Gap -- 3 Research Design -- 4 Experiments -- 4.1 Architecture Overview and Application Concept of BERT -- 4.2 Adaptation and Application Scenario of BERT -- 5 Results -- 6 Conclusion -- Appendix - Examples of Masked Sentence Predictions -- References -- An ARIMA and XGBoost Model Utilized for Forecasting Municipal Solid Waste Generation -- 1 Introduction -- 2 Related Work -- 3 Material and Methods -- 3.1 Study Area Information -- 3.2 Data Acquisition and Preparation -- 3.3 XGBoost -- 3.4 ARIMA -- 4 Experiments and Results -- 5 Conclusion and Future Work -- References -- An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Personalized Movie Recommendation Prediction Using Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Reinforcement Learning for Recommendation -- 2.2 Novelty of Our Approach -- 3 Methodology -- 3.1 Data Cleaning and Visualization -- 3.2 RL Algorithm -- 4 Experimental Setup -- 4.1 Dataset -- 5 Results and Discussion -- 5.1 Evaluation Metrics -- 5.2 Analysis of Recommendations -- 5.3 Limitations and Future Work -- 6 Conclusions and Perspective -- References -- An Ensemble and Deep Neural Network Based Approaches for Automated Sentiment Analysis -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions of the Paper -- 2 Literature Review -- 2.1 Machine Learning Approach -- 2.2 Deep Learning Approach -- 2.3 Hybrid Model Approach -- 3 Methodology.
3.1 Dataset and Pre-Processing -- 3.2 Ensemble Model -- 3.3 Implementation Using Bidirectional Long Short-Term Memory -- 3.4 Implementation Using Bidirectional Encoder Representations from Transformers (BERT) -- 3.5 The Proposed Hybrid CNN-LSTM Model -- 3.6 Evaluation Metrics -- 4 Results and Discussion -- 4.1 Results Obtained -- 4.2 Findings Based on Models Used Machine Learning Results -- 5 Conclusion and Future Works -- References -- In-store Product Placement Using LiDAR-Assisted Discrete PSO Algorithm -- 1 Introduction -- 2 Related Works -- 3 LiDAR-Assisted In-store Product Placement -- 3.1 Architecture -- 4 Discrete PSO-Algorithm and Stages -- 4.1 Algorithm -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 LiDAR-Based Data Collection -- 5.3 Discrete PSO Sequencer -- 6 Conclusion -- References -- Pattern Recognition -- Deep Residual Variational Autoencoder for Image Super-Resolution -- 1 Introduction -- 2 Related Work -- 2.1 Conventional SR Methods -- 2.2 DL-Based SR Models -- 3 Methodology -- 3.1 Encoder Model -- 3.2 Decoder Model -- 3.3 Loss Function -- 4 Experiments -- 4.1 Training Dataset -- 4.2 Hardware -- 4.3 Training Details -- 4.4 Experimental Results -- 4.5 Comparative Evaluation -- 5 Conclusion -- References -- Hybrid HAN Model to Investigate Depression from Twitter Posts -- 1 Introduction -- 2 Background Study -- 3 Depression Detection Model -- 3.1 BiGRU Layer -- 3.2 Word Attention Context Layer -- 3.3 BiLSTM Layer -- 3.4 Sentence Attention Context Layer -- 3.5 Overall Architecture of Depression Detection Model -- 3.6 Dataset -- 3.7 Lexicon -- 3.8 Dataset Preprocessing -- 4 Performance Analysis -- 5 Conclusion -- References -- Transfer Learning-Based Encoder-Decoder Model for Skin Lesion Segmentation -- 1 Introduction -- 1.1 Study Objectives -- 2 Related Literature -- 3 Methods and Materials -- 3.1 U-Net Design.
3.2 Proposed Framework -- 3.3 Dataset -- 3.4 Experimental Setup -- 3.5 Performance Metrics -- 4 Discussion of Results -- 5 Conclusion -- References -- A System for Liver Tumor Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Preprocessing -- 3.2 Augmentation -- 3.3 Segmentation -- 3.4 Classification Model -- 3.5 Performance Measures -- 4 Results with Discussion -- 4.1 Dataset Description -- 4.2 Computer Settings and Parameters -- 4.3 Preprocessing -- 4.4 Liver Segmentation -- 4.5 Tumor Detection -- 5 Conclusion and Future Work -- References -- High Speed and Efficient Reconfigurable Histogram Equalisation Architecture for Image Contrast Enhancement -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Comparator Design -- 3.2 Counter Circuit Design -- 3.3 Pixel Mapping Unit Design -- 4 Experimental Results -- 4.1 Simulation Results -- 4.2 Synthesis Results and Analysis of Proposed Architecture -- 5 Conclusion -- References -- A Practical Use for AI-Generated Images -- 1 Introduction -- 2 Diffusion Probabilistic Model -- 3 Object Detection -- 4 Related Studies -- 5 Proposed Work -- 5.1 Datasets -- 5.2 Performance Metrics -- 5.3 Model Training -- 6 Result Analysis -- 7 Conclusion -- References -- Homomorphic Encryption Schemes Using Nested Matrices -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Previous HE Model -- 3.2 Proposed HE Model -- 4 Homomorphic Property Proofs -- 4.1 Homomorphic Property for 2 2 Nested Matrix -- 4.2 Encryption Algorithm with Partially Homomorphic Property -- 5 Experimental Results -- 5.1 Evaluation Metrics -- 5.2 Results -- 6 Discussion -- 7 Conclusions -- References -- A Deep Learning Model for Heterogeneous Dataset Analysis - Application to Winter Wheat Crop Yield Prediction -- 1 Introduction -- 2 Literature -- 3 Data Description -- 4 Data Pre-processing.
5 Proposed Approach -- 5.1 Training: Description of Time Steps -- 5.2 Training: Description of Forward/Backward Propagation -- 6 Experiment Setup -- 7 Experimental Results -- 8 Conclusion -- References -- Author Index.
Record Nr. UNISA-996550556603316
Cham : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
International Conference on Applications and Techniques in Cyber Security and Intelligence : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
International Conference on Applications and Techniques in Cyber Security and Intelligence : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Edizioni della Normale, , 2018
Descrizione fisica 1 online resource (xv, 520 pages) : 160 illustrations
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-67071-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910299878803321
Cham : , : Springer International Publishing : , : Imprint : Edizioni della Normale, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (305 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-98776-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System’s Testing and Evaluation Methods -- Network Security Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code Injection Attacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining.
Record Nr. UNINA-9910484527703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui