Computer Networks and Inventive Communication Technologies : Proceedings of Fourth ICCNCT 2021 |
Autore | Smys S |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (889 pages) |
Altri autori (Persone) |
BestakRobert
PalanisamyRam KotuliakIvan |
Collana | Lecture Notes on Data Engineering and Communications Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-3728-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Computer Networks and Inventive Communication Technologies |
Record Nr. | UNINA-9910502635103321 |
Smys S
![]() |
||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data intelligence and cognitive informatics : proceedings of ICDICI 2021 / / edited by I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, and Robert Bestak |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (843 pages) |
Disciplina | 006.312 |
Collana | Algorithms for Intelligent Systems |
Soggetto topico | Data mining |
ISBN |
981-16-6460-9
981-16-6459-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743215603321 |
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
International Conference on Computer Networks and Communication Technologies : ICCNCT 2018 / / edited by S. Smys, Robert Bestak, Joy Iong-Zong Chen, Ivan Kotuliak |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (1,035 pages) |
Disciplina | 303.4834 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Electrical engineering
Computer security Application software Communications Engineering, Networks Systems and Data Security Information Systems Applications (incl. Internet) |
ISBN | 981-10-8681-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Centralized Reliability and Security Management of Data in Internet of Things (IoT) with Rule Builder -- Chapter 2: Reliability Evaluation of Wireless Sensor Networks using EERN algorithm -- Chapter 3: Reliable AI based Smart Sensors for Managing Irrigation Resources in Agriculture -- Chapter 4: Dynamic Resource Management through Task Migration in Cloud -- Chapter 5: Modified Rounding Based Approximate Multiplier (MROBA) and MAC Unit Design for Digital Signal Processing -- Chapter 6: Development of Optical Communication Framework with Xilinx Gigabit Transceivers -- Chapter 7: OFDM Implementation on a Software Defined Radio Platform -- Chapter 8: Enhanced Equally Distributed Cluster Head Technique for Cluster Head Selection -- Chapter 9: Design of Cylindrical Mushroom like EBG-PRS Antenna for Enhanced Gain for Wi-Max Applications -- Chapter 10: Industrial Parameters Monitoring & Control with IoT. |
Record Nr. | UNINA-9910337654003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive Computation Technologies / / edited by S. Smys, Robert Bestak, Álvaro Rocha |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (949 pages) |
Disciplina | 004 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Control engineering
Machine learning System theory Robotics Automation Control and Systems Theory Machine Learning Systems Theory, Control Robotics and Automation |
ISBN | 3-030-33846-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910482973803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021 |
Autore | Shakya Subarna |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (864 pages) |
Altri autori (Persone) |
BestakRobert
PalanisamyRam KamelKhaled A |
Collana | Lecture Notes on Data Engineering and Communications Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-1866-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3). 4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review. 3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References. Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Managment -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Disscusions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works. 3 Proposed Methodology. |
Altri titoli varianti | Mobile Computing and Sustainable Informatics |
Record Nr. | UNINA-9910497103403321 |
Shakya Subarna
![]() |
||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
NETWORKING 2012 [[electronic resource] ] : 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II / / edited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XXI, 421 p. 182 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Application software Algorithms Software engineering Management information systems Computer science Data encryption (Computer science) Computer Communication Networks Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity Software Engineering Management of Computing and Information Systems Cryptology |
ISBN | 3-642-30054-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465391603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
NETWORKING 2012 [[electronic resource] ] : 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I / / edited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XXII, 437 p. 191 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Application software Algorithms Software engineering Management information systems Computer science Data encryption (Computer science) Computer Communication Networks Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity Software Engineering Management of Computing and Information Systems Cryptology |
ISBN | 3-642-30045-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pt. 1. |
Record Nr. | UNISA-996465392603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
NETWORKING 2012 Workshops [[electronic resource] ] : International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012, Proceedings / / edited by Zdenek Becvar, Robert Bestak, Lukas Kencl |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XVI, 158 p. 57 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Application software Algorithms Software engineering Management information systems Computer science Computer simulation Computer Communication Networks Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity Software Engineering Management of Computing and Information Systems Simulation and Modeling |
Soggetto genere / forma | Conference papers and proceedings. |
ISBN | 3-642-30039-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
A Fairness Model for Resource Allocation in Wireless Networks / Huaizhou Shi, R. Venkatesha Prasad, Vijay S. Rao and I. G. M. M. Niemegeers -- An Extension and Cooperation Mechanism for Heterogeneous Overlay Networks / Vincenzo Ciancaglini, Luigi Liquori, Giang Ngo Hoang and Petar Maksimović -- Dynamic Pricing Coalitional Game for Cognitive Radio Networks / Yong Xiao and Luiz A. DaSilva -- Evaluation of ON-OFF Schemes and Linear Prediction Methods for Increasing Energy Efficiency in Mobile Broadband Networks / Dario Sabella, Marco Caretti, William Tomaselli, Valerio Palestini and Bruno Cendón, et al. -- Challenge-Aware Traffic Protection in Wireless Mobile Backhaul Networks / Javier Martín-Hernández, Christian Doerr, Johannes Lessmann and Marcus Schöller -- A Distributed Signaling Fast Mobile IPv6 Scheme for Next Generation Heterogeneous IP Networks / Mohtasim Abbassi, Shahbaz Khan and M. Rahman -- Energy Efficiency Gains Using VHOs in Heterogeneous Networks / António Serrador and Luís M. Correia -- Inter-Domain Route Diversity for the Internet / Xavier Misseri, Ivan Gojmerac and Jean-Louis Rougier -- A Proposal of Business Model Design Parameters for Future Internet Carriers / Antonio Ghezzi
Reputation-Aware Learning for SLA Negotiation / Mohamed Lamine Lamali, Dominique Barth and Johanne Cohen -- From Quality of Experience to Willingness to Pay for Interconnection Service Quality / Andreas Sackl, Patrick Zwickl and Peter Reichl -- An Instance-Based Approach for the Quantitative Assessment of Key Value Network Dependencies / Patrick Zwickl and Peter Reichl -- Evaluating Impacts of Oversubscription on Future Internet Business Models / Anand Raju, Vânia Gonçalves, Sven Lindmark and Pieter Ballon -- Inter-domain Coordination Models / Eleni Agiatzidou, Costas Courcoubetis, Olivier Dugeon, Finn-Tore Johansen and George D. Stamoulis -- In Which Content to Specialize? A Game Theoretic Analysis / Eitan Altman -- Estimation of Expectable Network Quality in Wireless Mesh Networks / Till Wollenberg -- Development of Localization Module for Various Smart Devices Platforms / Ondrej Krejcar -- Improved GSM-Based Localization by Incorporating Secondary Network Characteristics / Marek Dvorsky, Libor Michalek, Pavel Moravec and Roman Sebesta -- Visualization of Complex Networks Dynamics: Case Study / Ivan Zelinka, Donald Davendra and Lenka Skanderova -- PCI Planning Strategies for Long Term Evolution Networks / Hakan Kavlak and Hakki Ilk -- Effective Packet Loss Estimation on VoIP Jitter Buffer / Miroslav Voznak, Adrian Kovac and Michal Halas. |
Record Nr. | UNISA-996465397303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ubiquitous Computing and Internet of People - Models and Appplications / / A. Pasumpon Pandian, Robert Bestak, and Klimis Ntalianis |
Autore | Pandian A. Pasumpon |
Pubbl/distr/stampa | [Place of publication not identified] : , : Emerald Publishing Limited, , [2022] |
Descrizione fisica | 1 online resource (145 pages) |
Disciplina | 621.384 |
Collana | International Journal of Pervasive Computing and Communications |
Soggetto topico |
Wireless communication systems
Mobile computing - Computer programs |
ISBN | 1-80382-582-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910795889303321 |
Pandian A. Pasumpon
![]() |
||
[Place of publication not identified] : , : Emerald Publishing Limited, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ubiquitous Computing and Internet of People - Models and Appplications / / A. Pasumpon Pandian, Robert Bestak, and Klimis Ntalianis |
Autore | Pandian A. Pasumpon |
Pubbl/distr/stampa | [Place of publication not identified] : , : Emerald Publishing Limited, , [2022] |
Descrizione fisica | 1 online resource (145 pages) |
Disciplina | 621.384 |
Collana | International Journal of Pervasive Computing and Communications |
Soggetto topico |
Wireless communication systems
Mobile computing - Computer programs |
ISBN | 1-80382-582-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910815175203321 |
Pandian A. Pasumpon
![]() |
||
[Place of publication not identified] : , : Emerald Publishing Limited, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|