top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 1
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 1
Autore Devi B. Rama
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (438 pages)
Altri autori (Persone) KumarKishore
RajuM
RajuK. Srujan
SellathuraiMathini
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9997-04-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Committees -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Square Shaped SIW Based Slotted MIMO Antenna -- 1 Introduction -- 2 Antenna Design -- 3 S-parameter and Gain Characteristics of the Antenna -- 4 Multi-beam and Polarisation Characteristics of the Antenna -- 4.1 Individual Excitation of the Ports with Zero Phase -- 4.2 Excitation of Two Ports with a Phase Difference of 90° -- 5 Conclusion -- References -- Food Recognition and Calorie Measurement Using Machine Learning -- 1 Introduction -- 2 Problem Statement -- 3 Existing Work -- 4 Study and Assessment of the Indian Food Recipe Images Dataset -- 5 Methodology -- 5.1 Implementation of CNN -- 5.2 Plan of Implementation -- 6 Working of the Proposed System -- 6.1 System Architecture -- 7 Results and Discussion -- 8 Future Enhancements -- 9 Conclusion -- References -- Breast Cancer Prediction with Gradient Boost and XGBoost -- 1 Introduction -- 1.1 Breast Cancer -- 2 Related Work -- 3 Proposed System -- 3.1 Breast Cancer Dataset -- 3.2 Data Preprocessing -- 3.3 Architecture of Proposed Model -- 3.4 Selection of Features -- 3.5 Classification of Models -- 3.6 Model Training -- 4 Result Analysis -- 5 Conclusion -- References -- Data Cube Technology for Accessing of Large Database -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- Handwritten Character Recognition for South Indian Languages Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset Description -- 3.2 Pre-processing -- 3.3 Bounding Box -- 3.4 Feature Extraction -- 3.5 Model Comparison -- 3.6 Perform Evaluation -- 4 Results and Discussions -- 5 Conclusion -- 6 Future Work -- References -- CavFind: A Novel Algorithm to Detect Cavities on Protein Structure -- 1 Introduction -- 2 Materials and Methods.
3 Results and Discussion -- 4 Conclusion -- References -- Tire Imprint Identification and Classification using VGG19 -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Training and Testing Process -- 3.2 Dataset Description -- 3.3 Pre-processing -- 3.4 Segmentation -- 3.5 Feature Extraction -- 3.6 Model Comparison -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Pre-processing -- 4.3 Segmentation -- 4.4 Feature Extraction -- 4.5 Template Matching -- 4.6 VGG19 -- 5 Results and Discussion -- 5.1 Performance Evaluation Graph -- 6 Conclusion -- 7 Future Work -- References -- Uncovering Insights in Agroforestry: A Text Mining Analysis Using Web Scraping and Topic Modeling -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Design Strategy -- 3.2 System Architecture Diagram -- 3.3 Methods Used -- 4 Observations and Results -- 4.1 Metadata from Google Scholar -- 4.2 Observations -- 5 Conclusion and Future Study -- References -- Generative Adversarial Networks: A Comprehensive Review -- 1 Introduction -- 1.1 Motivation Behind GAN -- 1.2 Structure of GAN -- 1.3 Loss Functions and Training Challenges -- 2 Variants of GAN -- 2.1 Vanilla GAN -- 2.2 DCGAN -- 2.3 BiGAN -- 3 Evaluation Metrics -- 3.1 Quantitative Metrics -- 4 Conclusion and Future Directions -- References -- System Modification Process to Reduce Calculation Complexity in Backward Forward Sweep Algorithm -- 1 Introduction -- 2 Backward Forward Sweep Algorithm -- 2.1 Backward Forward Sweep Algorithm for 3 Bus Lateral System -- 3 Decoupled Backward Forward Sweep (DBFS) Method -- 3.1 DBFS Method for a 3 Bus Lateral System -- 4 DBFS Method-Case Study-55 Bus Unbalanced Radial Distribution System (URDS) -- 5 Conclusion -- References -- Exploit Reversible Gates to Implement Fast Quantum Sorting Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Methodology -- 4 Complexity Analysis.
5 Qiskit Simulation -- 6 Conclusion -- References -- Analyzing the Performance Variations of Naive Bayes, Linear SVM, and Random Forest for Spam Detection: A Comprehensive Study on the & -- Quot -- Spam or Ham& -- quot -- Dataset -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result -- 5 Conclusion -- References -- A Novel Encryption Framework to Improve the Security of Medical Images -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Cuttlefish Algorithm -- 3.2 Particle Swarm Algorithm -- 3.3 Cuttlefish Particle Swarm Optimization -- 3.4 Ciphertext-Policy Weighted Attribute Encryption (CPWAE) -- 4 Result -- 5 Conclusion -- References -- Enhancing DDoS Attack Detection in SDN: A Novel Approach with IG-RFFI Feature Selection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset Description -- 3.2 Feature Selection -- 3.3 Information Gain (or) Mutual Information (IG) -- 3.4 Random Forest Feature Importance (RFFI) -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- A Novel Fusion Study on Disease Detection in Cotton Plants Using Embedded Approaches of Neural Networks -- 1 Introduction -- 1.1 Leaf Disease Detection Using Different Techniques -- 2 Literature Review -- 3 Materials Available -- 4 Discussions -- 5 Conclusion -- References -- A Security Framework for the Detection of Targeted Attacks Using Honeypot -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Results -- 5 Conclusions -- References -- SNMP Watcher: A Model to Detect DoS and DDoS Attacks Using SNMP Management Information Base Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Classifiers -- 3.3 Metrics for Assessing Performance -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References.
Comparative Analysis for Loan Approval Prediction System Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Data Presentation -- 4 Methodology -- 4.1 Exploratory Data Analysis -- 4.2 Data Modeling -- 4.3 Splitting the Data -- 4.4 Selecting the Algorithm -- 4.5 Training or Validating Model -- 5 Results and Discussion -- 6 Conclusion -- References -- Classification of Credit Card Delinquent Customers Using Random Forest Algorithm -- 1 Introduction -- 1.1 Contributions -- 2 Literature Review -- 3 Experimental Setup -- 3.1 The Sample Pseudocode of the Proposed Algorithm is Given Below -- 4 Results and Discussion -- 5 Conclusion and Future Direction -- References -- Evaluating E-learning Engagement Through EEG Signal Analysis with Convolutional Neural Networks -- 1 Introduction -- 2 Challenges Facing in E-Learning Approaches -- 3 Methodology -- 3.1 EEG Signal Classification in Real-Time -- 3.2 Summary of Real-Time E-Learning EEG Data Collection -- 3.3 EEG Data Discretization -- 3.4 EEG Signal Preprocessing Methods -- 4 Implementation Approach -- 4.1 Label Encoding -- 4.2 Representation Learning -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- Food Item Recognition and Calories Estimation Using YOLOv5 -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Data Collection -- 3.2 Data Annotation and Preprocessing -- 3.3 YOLOv5 Architecture and Training -- 4 Evaluation and Performance Analysis -- 4.1 Loss Function -- 4.2 Precision -- 4.3 Recall -- 4.4 F1 Score -- 5 Conclusion and Future Improvements: -- References -- Fuzzy Cognitive Security Techniques for Data Aggregation in Capillary Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results -- 5 Conclusions -- References.
Performance Analysis on Optimal Data Integrity and Security-Constrained Cloud Storage Framework with Meta-heuristic-Based Mechanism -- 1 Introduction -- 2 Literature Survey -- 3 Dual Attribute Merging Scheme for Privacy Protection in Cloud Storage Framework -- 3.1 OM-SRC-Based Optimal Sensitive Attribute Protection -- 3.2 Non-sensitive Attribute Protection Based on Shuffling Algorithm -- 4 Focusing on Data Integrity and Security Using Privacy Preservation Technique -- 4.1 Proposed Cloud Storage Model -- 4.2 Data Collection -- 4.3 Optimal Selection of Sensitive Attribute with PFA -- 5 Experimentation of Result Analysis -- 5.1 Validation Set-Up -- 5.2 State-of-the-Art Observation of the Designed Technique Over Data Sets -- 5.3 Key Sensitive Analysis on the Implemented Framework -- 5.4 Analysis of Convergence in the Suggested Model -- 5.5 Statistical Validation of the Implemented Method -- 6 Conclusion -- References -- Computer Vision-Based Model for Classification of Citrus Fruits Diseases with Pertinent Image Preprocessing Method -- 1 Introduction -- 2 Related Work -- 2.1 Identified Research Gap -- 2.2 Our Contribution -- 3 Proposed Work -- 3.1 Materials and Methods -- 3.2 Preprocessing of Images -- 3.3 Deep Convolutional Neural Network -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- FLAML-HDPS Model: An Efficient and Intelligent AutoML Approach for Heart Disease Prediction -- 1 Introduction -- 2 Literature Works -- 3 Proposed Methodologies -- 3.1 Dataset Description -- 3.2 Workflow of Fast and Lightweight AutoML -- 4 Experimental Results and Analysis -- 5 Conclusions -- References -- An Efficient Selective Features Approach to Detect Hypothyroid Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Principal Component Analysis -- 3.2 Extra Trees Classifier -- 3.3 Borderline SMOTE.
3.4 Decision Trees.
Record Nr. UNINA-9910835059003321
Devi B. Rama
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 2
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 2
Autore Devi B. Rama
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (422 pages)
Disciplina 004.6
Altri autori (Persone) KumarKishore
RajuM
RajuK. Srujan
SellathuraiMathini
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9997-07-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Committees -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Implementation of Digital Down Conversion Technique Using FPGA for Atmospheric RADAR Application -- 1 Introduction -- 2 Literature Review -- 3 Methodologies of Implementing DDC -- 3.1 Existing DDC System -- 3.2 Proposed DDC System -- 4 Analog to Digital Conversion (ADC) by Using AD6654 -- 5 Working with XILINX ISE -- 6 Experimental Setup and Simulation Results -- 7 Conclusions -- References -- Predictive Data Analysis to Support Decision-Making Based on Long-Term Impacts of Disasters -- 1 Introduction -- 2 Significance of Datasets in Disaster Management -- 3 Impacts of Disaster -- 4 Challenges of Regional Administration -- 5 Methodology -- 6 Proposed Algorithm and Implementation -- 7 Discussion -- 8 Conclusion -- References -- Generative Adversarial Networks: Challenges, Solutions, and Evaluation Metrics -- 1 Introduction -- 2 Related Works -- 3 Advantages -- 4 Challenges -- 5 GAN Training Tricks -- 6 Evaluation Metrics -- 7 Applications -- 8 Future Works -- 9 Conclusion -- References -- Improving Accuracy and Robustness in Depression Detection with Ensemble Learning and Optimization Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Problem Statement -- 3.2 Dataset -- 3.3 Text Processing -- 3.4 Optimization Techniques -- 4 Results -- 5 Conclusion and Future Scope -- References -- Spatial-Spectral Features-Based Dimensionality Reduction Technique for Robust Multivariate Image Classification -- 1 Introduction -- 2 Spatial-Spectral DR Method -- 2.1 GLCM and Fusion Matrix -- 2.2 Principal Component Analysis (PCA) for Dimensionality Reduction -- 2.3 DR Using Locally Linear Embedding (LLE) -- 2.4 Classification Using Support Vector Machine (SVM) -- 3 Experiment and Result -- 4 Conclusion -- References.
Improving Breast Cancer Prognosis with DL-Based Image Classification -- 1 Introduction -- 2 Literature Review -- 3 Dataset Overview -- 3.1 Data Collection -- 3.2 Image Resizing -- 3.3 Image Normalization -- 3.4 Image Data Augmentation -- 3.5 Image Label Encoding -- 4 Experimental Analysis and Discussion -- 4.1 Performance Analysis of the Models -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- A Lightweight Encryption Method for Preserving E-Healthcare Data Privacy Using Dual Signature on Twisted Edwards Curves -- 1 Introduction -- 2 Preliminaries -- 2.1 Healthcare Device -- 2.2 Edge Computing Device -- 2.3 Cloud Storage -- 2.4 Dual Signature -- 3 Proposed Scheme -- 4 Correctness of Scheme -- 5 Performance Analysis and Result Comparison -- 6 Conclusion -- References -- Intrusion Classification and Detection System Using Machine Learning Models on NSL-KDD Dataset -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Linear Support Vector Machine (SVM) -- 3.2 Quadratic Support Vector Machine (SVM) -- 3.3 K-Nearest-Neighbor (KNN) -- 3.4 Linear Discriminant Analysis (LDA) -- 3.5 Quadratic Discriminant Analysis (QDA) -- 3.6 Multi-layer Perceptron (MLP) -- 3.7 Long Short-Term Memory (LSTM) -- 3.8 Auto Encoder -- 4 Implementation -- 4.1 Dataset -- 4.2 Illustrative Example -- 5 Result -- 5.1 Linear Support Vector Machine -- 5.2 Quadratic Support Vector Machine -- 5.3 K-Nearest-Neighbor -- 5.4 Linear Discriminant Analysis -- 5.5 Quadratic Discriminant Analysis -- 5.6 Multi-layer Perceptron -- 5.7 Long Short-Term Memory -- 5.8 Auto Encoder -- 5.9 Comparative Result of Models -- 6 Conclusion -- References -- A Comprehensive Review of the Application of Greenhouse Using the Internet of Things -- 1 Introduction -- 1.1 Problems Occurred in Agriculture Department -- 2 Literature Review -- 3 Observation -- 4 Techniques.
4.1 Proper Light for Photosynthesis -- 4.2 Proper Irrigation Techniques -- 4.3 Technique for Humidity and Temperature -- 5 Conclusion -- References -- Controlling PowerPoint Slide Presentations Through Hand Gestures -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Algorithm -- 3.3 Euclidean Distance -- 3.4 Bounding Box -- 4 Result and Discussion -- 5 Conclusion -- References -- Design of Multiband GaN HEMT Power Amplifier for Radar Applications -- 1 Introduction -- 2 Design Methodology -- 2.1 DC Analysis -- 2.2 Stability Analysis -- 2.3 Load Pull Analysis -- 2.4 Input and Output Matching Circuit -- 2.5 Layout Preparation -- 3 Results and Discussions -- 4 Conclusion -- References -- SqueezeNet-Based Model for Subject Identification from Off-Angle Iris Image -- 1 Introduction -- 2 Background Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Brain Tumor Detection and Segmentation Using Deep Learning Models with Dual Attention Mechanism -- 1 Introduction -- 2 Literature Review -- 3 Investigating Deep Models with Dual Attention Mechanism -- 3.1 Dual Attention Mechanism -- 3.2 Proposed Methodology -- 4 Experimental Results and Evaluation -- 5 Conclusions -- References -- Exploring Machine Learning Algorithms for Accurate Breast Cancer Classification: A Comparative Analysis Using F2 Metric -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Dataset -- 3.2 Work Flow Model -- 4 Performance Metrics -- 4.1 Confusion Matrix -- 4.2 Accuracy -- 4.3 Precision -- 4.4 Recall or Sensitivity -- 4.5 F-Measure -- 4.6 FBeta Measure -- 5 Implementation -- 5.1 Decision Tree Classifier -- 5.2 Logistic Regression -- 5.3 Support Vector Machine -- 5.4 K-Nearest Neighbors -- 5.5 Naïve Bayes -- 6 Results and Discussion -- 7 Conclusion -- References.
Optimizing Gene Expression Analysis Using Clustering Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- Prevention and Mitigation of Intrusion Using an Efficient Ensemble Classification in Fog Computing -- 1 Introduction -- 2 Related Works -- 2.1 Literature Survey -- 2.2 Challenges -- 3 Computational System Model -- 4 RSLO for IDS -- 4.1 Training Data Phase via Cloud Layer -- 4.2 End Layer and Fog Layer -- 5 Results and Discussion -- 6 Conclusion -- References -- Fake News Detector Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Flowchart -- 3.2 Tools and Technology Used -- 3.3 Python Libraries -- 3.4 Dataset and Data Preprocessing -- 3.5 Algorithm of Decision Tree -- 3.6 Algorithm of Random Forest -- 3.7 Algorithm of Naïve Bayes -- 3.8 Algorithm of Logistic Regression -- 4 Results and Discussion -- 5 Conclusion -- References -- Electric Vehicle Energy Management System Using Fuzzy Logic Controller -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 3.1 PI Controller -- 4 Proposed System -- 4.1 Fuzzy Logic Controller -- 5 Results -- 6 Conclusion -- References -- Optimized Fall Detection Algorithm with Adaptive Sum Vector Magnitude and Axis-Weighted Features from Wearable Accelerometer Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Classification -- 5 Performance Evaluation -- 5.1 Dataset Description -- 5.2 Quantitative Analysis -- 6 Conclusion and Future Work -- References -- Deep Learning-Based Real-Time Face Mask Detection for Human Using Novel YOLOv2 with Higher Accuracy -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 YOLOv2 Algorithm-Based Detection Network -- 3.2 Proposed Classification Network Architecture -- 4 Discussion and Experimental Result.
5 Conclusion -- References -- Smart University Application: Internet of Things (IoT)-Based Smart and Random Method to Collect Waste Management System in a University Campus by Using Ant Colony Optimization (ACO) Algorithm -- 1 Introduction -- 2 Ant Colony Optimization (Aco)-An Overview -- 3 Literature Survey -- 4 Ant Colony Optimization (ACO) Algorithm -- 5 Result and Discussion -- 6 . -- 7 Conclusion -- References -- Tomato Leaf Disease Detection and Classification by Using Novel CNN Model -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Dataset Description -- 3.2 Convolutional Neural Network -- 3.3 Depth-Wise Separable Convolution -- 3.4 Implemented Novel CNN Method for Detection of Tomato Leaf Diseases -- 4 Results -- 4.1 Results of the Experiments -- 4.2 Transfer Learning Models Comparison -- 5 Conclusion -- References -- Adaptive Trajectory Data Stream Clustering -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Statistical Model for JR -- 3.2 Statistical Model for BM -- 3.3 Statistical Model for SP -- 4 Experimental Results and Evaluation -- 5 Conclusions -- References -- Ransomware Classification and Detection: A Supervised Machine Learning Approach -- 1 Introduction -- 1.1 Types of Ransomware -- 1.2 Top Ransomware Targets -- 1.3 Recognition of Attacks -- 1.4 Ransomware Detection Techniques -- 1.5 Prevent Ransomware Attacks -- 2 Proposed Methodology -- 3 Implementation -- 3.1 The Effect of Features Dimension -- 3.2 The Impact of Tree and Seed Numbers -- 4 Conclusion -- References -- Comparing Ensemble Learning Algorithms to Improve Flight Prediction Accuracy and Reliability -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Experimental Framework -- 3.2 Data Balancing and Preprocessing -- 3.3 Feature Selection -- 3.4 Building Ensemble Models -- 4 Results and Discussion.
4.1 Data Balancing and Preprocessing.
Record Nr. UNINA-9910842296503321
Devi B. Rama  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Fourth International Conference on Computer and Communication Technologies : IC3T 2022 / / edited by K. Ashoka Reddy, B. Rama Devi, Boby George, K. Srujan Raju, Mathini Sellathurai
Proceedings of Fourth International Conference on Computer and Communication Technologies : IC3T 2022 / / edited by K. Ashoka Reddy, B. Rama Devi, Boby George, K. Srujan Raju, Mathini Sellathurai
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XXVII, 665 p. 381 illus., 286 illus. in color.)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Data protection
Telecommunication
Computational Intelligence
Data and Information Security
Communications Engineering, Networks
ISBN 981-19-8563-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Plant Diseases Detection Using Transfer Learning -- Shuffled Frog Leap And Ant Lion Optımızatıon For Intrusıon Detectıon In IOT-Based WSN -- A Comprehensive Alert System Based on Social Distancing for Cautioning People Amidst the Covid19 Pandemic Using Deep Neural Network Models -- An Improved Image Enhancing Technique for Underwater Images by Using White Balance Approach -- Metaverse: The Potential Threats in the Virtual World -- Establishing communication between Neural Network Models. .
Record Nr. UNINA-9910686784303321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui