Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Virtual Catalogues
Access
  • 1
    UID:
    almahu_9950000765902882
    Format: VIII, 342 p. 50 illus. , online resource.
    Edition: 1st ed. 2025.
    ISBN: 9783031776618
    Series Statement: Studies on Entrepreneurship, Structural Change and Industrial Dynamics,
    Content: This comprehensive book addresses the multifaceted challenges posed by technological innovation, ecological transitions, and sustainable business practices. Drawing on extensive research in the circular economy and green, inclusive transitions, it serves as an essential reference for scholars, researchers, and practitioners. In today's global landscape, quality of life transcends economic indicators like GDP. True well-being and happiness are influenced by a myriad of factors beyond financial wealth. Social and environmental domains are crucial to ensuring that no individual or community is left behind. This commitment aligns with the Sustainable Development Goals (SDGs) framework, emphasizing holistic sustainability.
    Note: Introduction -- Part I - Social Development: Paths for Sustainability -- Using the happiness framework as a catalyst for the green transition -- Neo-nomads and sustainability -- Rolling with the resistance to the circular economy? A contribution to sustainable consumption and social engagement -- "It's only waste if you're not innovative": Understanding micro-scale circular economy practices as social innovations -- Universal Design Applied to Inclusive and Sustainable Economy For All -- Part II - Education for Sustainability and SDG -- EU GREEN: How peripheral regional universities created a European Alliance based in SDGs -- Designing new forms of business education at Circular Economy and Sustainable Business: an experience report on stakeholders' engagement through co-creation -- Teaching Sustainable Development Goals from theory to praxis in universities based on the theory of graphs -- Environmentally sustainable conscious students when starting up -- Part III - Construction and Energy as CE strategies -- Architecture for Deconstruction: a methodological approach to eco-construction -- Circularity of household-generated construction and demolition waste: management principles for green transition in Latvia -- Impact of home energy efficiency labelling investment on rent housing decision of students in Spain: A choice experiment approach -- Photovoltaic module waste and the circular economy: A comprehensive review -- Renewable energy production with a circular economy approach: entrepreneurial brazilian and italian case studies.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031776601
    Additional Edition: Printed edition: ISBN 9783031776625
    Additional Edition: Printed edition: ISBN 9783031776632
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV046140948
    Format: 304 Seiten , Illustrationen , 24 cm
    ISBN: 9783956794865 , 9781927071656
    Content: How do we design our cities when our most intimate experiences are incessantly tracked and our feelings become the base of new modes of production that prioritize the immaterial over the material? Since the 2008 financial crisis, lists of well-being indicators, happiness indexes, and quality-of-life rankings have become viral. Concurrently, the emotional data presented in these surveys - including perceptions on questions such as loneliness, friendship, and intimate fears - feed an expanding political agenda of happiness and a new form of market whose most decisive asset is "affect". Our Happy Life investigates the architectural implications of this trend by dissecting and questioning the political, economic, and emotional conditions that generate space today. Organized as a visual narrative with critical readings by Will Davies, Daniel Fujiwara, Simon Fujiwara, Ingo Niermann, Deane Simpson, and Mirko Zardini, this book reveals architecture, city, and landscape as contested surfaces, caught between the intangible guidelines of happiness indexes, the new marketplace of emotions, and the relentless ideology of positivity.
    Note: Aus dem Colophon: "Issued also in French under title: Nos jours heureux"
    Additional Edition: Parallele Sprachausgabe Nos jours heureux
    Language: English
    RVK:
    Keywords: Städtebau ; Stadtgestaltung ; Architektur ; Innenarchitektur ; Lebensqualität ; Ausstellungskatalog ; Ausstellungskatalog ; Ausstellungskatalog ; Bildband
    Author information: Garutti, Francesco 1979-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Boca Raton :Taylor & Francis Group,
    UID:
    almahu_9949950922002882
    Format: 1 online resource (562 pages)
    Edition: 1st ed.
    ISBN: 9781040261163
    Content: Thos book is a comprehensive and interdisciplinary introduction to AI Safety. As AI threatens to transform society, it becomes increasingly more important to understand the risks that AI poses, and to learn what measures we can take to mitigate them.
    Note: Cover -- Endorsements -- Half Title -- Title Page -- Copyright Page -- Contents -- Introduction -- SECTION I: AI and Societal-Scale Risks -- CHAPTER 1: Overview of Catastrophic AI Risks -- 1.1. INTRODUCTION -- 1.2. MALICIOUS USE -- 1.2.1. Bioterrorism -- 1.2.2. Unleashing AI Agents -- 1.2.3. Persuasive AIs -- 1.2.4. Concentration of Power -- 1.3. AI RACE -- 1.3.1. Military AI Arms Race -- 1.3.2. Corporate AI Race -- 1.3.3. Evolutionary Pressures -- 1.4. ORGANIZATIONAL RISKS -- 1.4.1. Accidents Are Hard to Avoid -- 1.4.2. Organizational Factors can Reduce the Chances of Catastrophe -- 1.5. ROGUE AIS -- 1.5.1. Proxy Gaming -- 1.5.2. Goal Drift -- 1.5.3. Power-Seeking -- 1.5.4. Deception -- 1.6. DISCUSSION OF CONNECTIONS BETWEEN RISKS -- 1.7. CONCLUSION -- 1.8. LITERATURE -- 1.8.1. Recommended Reading -- CHAPTER 2: Artificial Intelligence Fundamentals -- 2.1. INTRODUCTION -- 2.2. ARTIFICIAL INTELLIGENCE & -- MACHINE LEARNING -- 2.2.1. Artificial Intelligence -- 2.2.2. Types of AI -- 2.2.3. Machine Learning -- 2.2.4. Types of Machine Learning -- 2.3. DEEP LEARNING -- 2.3.1. Model Building Blocks -- 2.3.2. Training and Inference -- 2.3.3. History and Timeline of Key Architectures -- 2.3.4. Applications -- 2.4. SCALING LAWS -- 2.4.1. Scaling Laws in DL -- 2.5. SPEED OF AI DEVELOPMENT -- 2.6. CONCLUSION -- 2.6.1. Summary -- 2.7. LITERATURE -- 2.7.1. Recommended Resources -- SECTION II: Safety -- CHAPTER 3: Single-Agent Safety -- 3.1. INTRODUCTION -- 3.2. MONITORING -- 3.2.1. ML Systems Are Opaque -- 3.2.2. Motivations for Transparency Research -- 3.2.3. Approaches to Transparency -- 3.2.4. Emergent Capabilities -- 3.2.5. Emergent Goal-Directed Behavior -- 3.2.6. Tail Risk: Emergent Goals -- 3.2.7. Evaluations and Anomaly Detection -- 3.3. ROBUSTNESS -- 3.3.1. Proxies in ML -- 3.3.2. Proxy Gaming -- 3.3.3. Adversarial Examples. , 3.3.4. Trojan Attacks and Other Security Threats -- 3.3.5. Tail Risk: AI Evaluator Gaming -- 3.4. ALIGNMENT -- 3.4.1. Deception -- 3.4.2. Deceptive Evaluation Gaming -- 3.4.3. Tail Risk: Deceptive Alignment and Treacherous Turns -- 3.4.4. Power -- 3.4.5. People Could Enlist AIs for Power Seeking -- 3.4.6. Power Seeking Can Be Instrumentally Rational -- 3.4.7. Structural Pressures Toward Power-Seeking AI -- 3.4.8. Tail Risk: Power-Seeking Behavior -- 3.4.9. Techniques to Control AI Systems -- 3.5. SYSTEMIC SAFETY -- 3.6. SAFETY AND GENERAL CAPABILITIES -- 3.7. CONCLUSION -- 3.8. LITERATURE -- 3.8.1. Recommended Reading -- CHAPTER 4: Safety Engineering -- 4.1. RISK DECOMPOSITION -- 4.1.1. Failure Modes, Hazards, and Threats -- 4.1.2. The Classic Risk Equation -- 4.1.3. Framing the Goal as Risk Reduction -- 4.1.4. Disaster Risk Equation -- 4.1.5. Elements of the Risk Equation -- 4.1.6. Applying the Disaster Risk Equation -- 4.2. NINES OF RELIABILITY -- 4.3. SAFE DESIGN PRINCIPLES -- 4.3.1. Redundancy -- 4.3.2. Separation of Duties -- 4.3.3. Principle of Least Privilege -- 4.3.4. Fail-Safes -- 4.3.5. Antifragility -- 4.3.6. Negative Feedback Mechanisms -- 4.3.7. Transparency -- 4.3.8. Defense in Depth -- 4.3.9. Review of Safe Design Principles -- 4.4. COMPONENT FAILURE ACCIDENT MODELS AND METHODS -- 4.4.1. Swiss Cheese Model -- 4.4.2. Bow Tie Model -- 4.4.3. Fault Tree Analysis Method -- 4.4.4. Limitations -- 4.5. SYSTEMIC FACTORS -- 4.5.1. Systemic Accident Models -- 4.6. DRIFT INTO FAILURE AND EXISTENTIAL RISKS -- 4.7. TAIL EVENTS AND BLACK SWANS -- 4.7.1. Introduction to Tail Events -- 4.7.2. Tail Events Can Greatly Affect the Average Risk -- 4.7.3. Tail Events Can Be Identified From Frequency Distributions -- 4.7.4. A Caricature of Tail Events -- 4.7.5. Introduction to Black Swans -- 4.7.6. Known Unknowns and Unknown Unknowns. , 4.7.7. Implications of Tail Events and Black Swans for Risk Analysis -- 4.7.8. Identifying the Risk of Tail Events or Black Swans -- 4.8. CONCLUSION -- 4.8.1. Summary -- 4.8.2. Key Takeaways -- 4.9. LITERATURE -- 4.9.1. Recommended Reading -- CHAPTER 5: Complex Systems -- 5.1. OVERVIEW -- 5.2. INTRODUCTION TO COMPLEX SYSTEMS -- 5.2.1. The Reductionist Paradigm -- 5.2.2. The Complex Systems Paradigm -- 5.2.3. DL Systems as Complex Systems -- 5.2.4. Complexity Is Not a Dichotomy -- 5.2.5. The Hallmarks of Complex Systems -- 5.2.6. Social Systems as Complex Systems -- 5.3. COMPLEX SYSTEMS FOR AI SAFETY -- 5.3.1. General Lessons from Complex Systems -- 5.3.2. Puzzles, Problems, and Wicked Problems -- 5.3.3. Challenges With Interventionism -- 5.3.4. Systemic Issues -- 5.4. CONCLUSION -- 5.5. LITERATURE -- 5.5.1. Recommended Reading -- SECTION III: Ethics and Society -- CHAPTER 6: Beneficial AI and Machine Ethics -- 6.1. INTRODUCTION -- 6.2. LAW -- 6.2.1. The Case for Law -- 6.2.2. The Need for Ethics -- 6.3. FAIRNESS -- 6.3.1. Bias -- 6.3.2. Sources of Bias -- 6.3.3. AI Fairness Concepts -- 6.3.4. Limitations of Fairness -- 6.3.5. Approaches to Combating Bias and Improving Fairness -- 6.4. THE ECONOMIC ENGINE -- 6.4.1. Allocative Efficiency of Free Markets -- 6.4.2. Market Failures -- 6.4.3. Inequality -- 6.4.4. Growth -- 6.4.5. Beyond Economic Models -- 6.5. WELLBEING -- 6.5.1. Wellbeing as the Net Balance of Pleasure over Pain -- 6.5.2. Wellbeing as a Collection of Objective Goods -- 6.5.3. Wellbeing as Preference Satisfaction -- 6.5.4. Applying the Theories of Wellbeing -- 6.6. PREFERENCES -- 6.6.1. Revealed Preferences -- 6.6.2. Stated Preferences -- 6.6.3. Idealized Preferences -- 6.7. HAPPINESS -- 6.7.1. The General Approach to Happiness -- 6.7.2. Problems for Happiness-Focused Ethics -- 6.8. SOCIAL WELFARE FUNCTIONS. , 6.8.1. Measuring Social Welfare -- 6.9. MORAL UNCERTAINTY -- 6.9.1. Making Decisions Under Moral Uncertainty -- 6.9.2. Implementing a Moral Parliament in AI Systems -- 6.9.3. Advantages of a Moral Parliament -- 6.10. CONCLUSION -- 6.11. LITERATURE -- 6.11.1. Recommended Reading -- CHAPTER 7: Collective Action Problems -- 7.1. MOTIVATION -- 7.2. GAME THEORY -- 7.2.1. Overview -- 7.2.2. Game Theory Fundamentals -- 7.2.3. The Prisoner's Dilemma -- 7.2.4. The Iterated Prisoner's Dilemma -- 7.2.5. Collective Action Problems -- 7.2.6. Summary -- 7.3. COOPERATION -- 7.3.1. Summary -- 7.4. CONFLICT -- 7.4.1. Overview -- 7.4.2. Bargaining Theory -- 7.4.3. Commitment Problems -- 7.4.4. Information Problems -- 7.4.5. Factors Outside of Bargaining Theory -- 7.4.6. Summary -- 7.5. EVOLUTIONARY PRESSURES -- 7.5.1. Overview -- 7.5.2. Generalized Darwinism -- 7.5.3. Levels of Selection and Selfish Behavior -- 7.5.4. Summary -- 7.6. CONCLUSION -- 7.7. LITERATURE -- 7.7.1. Recommended Reading -- CHAPTER 8: Governance -- 8.1. INTRODUCTION -- 8.1.1. The Landscape -- 8.2. ECONOMIC GROWTH -- 8.3. DISTRIBUTION OF AI -- 8.3.1. Distribution of Access to AI -- 8.3.2. Distribution of Power Among AIs -- 8.4. CORPORATE GOVERNANCE -- 8.4.1. What Is Corporate Governance? -- 8.4.2. Legal Structure -- 8.4.3. Ownership Structure -- 8.4.4. Organizational Structure -- 8.4.5. Assurance -- 8.5. NATIONAL GOVERNANCE -- 8.5.1. Standards and Regulations -- 8.5.2. Liability for AI Harms -- 8.5.3. Targeted Taxation -- 8.5.4. Public Ownership over AI -- 8.5.5. Improving Resilience -- 8.5.6. Not Falling Behind -- 8.5.7. Information Security -- 8.6. INTERNATIONAL GOVERNANCE -- 8.6.1. Forms of International Governance -- 8.6.2. Four Questions for AI Regulation -- 8.6.3. What Can Be Included in International Agreements? -- 8.7. COMPUTE GOVERNANCE. , 8.7.1. Compute Is Indispensable for AI Development and Deployment -- 8.7.2. Compute Is Physical, Excludable, and Quantifiable -- 8.8. CONCLUSION -- 8.9. LITERATURE -- 8.9.1. Recommended Reading -- Acknowledgments -- References -- Index.
    Additional Edition: Print version: Hendrycks, Dan Introduction to AI Safety, Ethics, and Society Boca Raton : Taylor & Francis Group,c2024 ISBN 9781032869926
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9961612467702883
    Format: 1 online resource (590 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819720040
    Series Statement: Lecture Notes in Networks and Systems, 966
    Content: This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2023) held at PES University, Bangalore, India, during December 18–20, 2023. The research papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on security and privacy, network management and software-defined networks, Internet of Things (IoT) and cyber-physical systems, intelligent distributed systems, mobile computing and vehicle communications, and emerging topics. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.
    Note: Intro -- Conference Organization -- Preface -- Contents -- Editors and Contributors -- Artificial Intelligence and Human-Computer Interaction -- Open Gaze: Open-Source Eye Tracker for Smartphone Devices Using Deep Learning -- 1 Introduction -- 2 Dataset -- 3 Data Splits -- 3.1 MIT Split -- 3.2 Exclusively Mobile Devices in All Orientations -- 3.3 Mobile Devices Used Solely in Portrait Orientation -- 3.4 Google's Data Division -- 4 Model Architecture -- 5 Training -- 5.1 Implementation -- 5.2 Refining Hyperparameters -- 6 Post-training SVR Personalization -- 6.1 Differential Impact Based on Dataset Characteristics -- 6.2 Segmentation According to 13-Point Calibration -- 6.3 Google's 70/30 Training and Testing Split Methods -- 7 Results -- 7.1 PyTorch Results -- 8 Individualization Using Transformations -- 8.1 SVR Results -- 8.2 Version of Google Split -- 8.3 Version of MIT Split -- 8.4 Unique -- 8.5 Random Data Points/Samples -- 8.6 Outcomes from MIT Split Evaluation -- 8.7 Results from Google Split Evaluation -- 9 Future Scope and Improvements -- 10 Availability of Code and Data -- References -- Comparison on the Metaverse Space Development in Spatial.io Platform and Monaverse Platform -- 1 Introduction -- 2 Background -- 2.1 Spatial.io: Platform Overview -- 2.2 Monaverse: Platform Overview -- 3 Comparative Analysis -- 3.1 Decentralization -- 3.2 Interoperability -- 3.3 Space Creation and Scalability -- 3.4 Project Setup and Space Components -- 3.5 Interaction Interface of the Metaverse Space -- 3.6 Examples of Monetization and Opportunities -- 4 Discussion and Future Work -- References -- Intelligent Holo-Assistant Avatar with Lip-Syncing -- 1 Introduction -- 2 Methodology -- 2.1 Designing of GUI of Holo-Assistant Applications -- 2.2 Developing Intelligent Assistant Avatar with Lip-Syncing. , 2.3 Integrate the Intelligent Holo-Assistant Avatar with Lip-Syncing -- 3 Implementation and Results -- 4 Conclusion -- References -- Historical Analysis of Financial Fraud and Its Future -- 1 Introduction -- 2 Historical Analysis of Financial Fraud -- 2.1 Early Modern Finance -- 2.2 Industrial Revolution and Capital Market Development -- 2.3 Post World War II -- 2.4 Globalization and Financial Deregulation -- 2.5 Digital Age and FinTech -- 3 Factors Contributing to Financial Fraud -- 3.1 The Human Factor -- 3.2 Weak Internal Controls -- 3.3 The Psychological Factor -- 4 Classification and Impacts of Financial Fraud -- 4.1 Direct Impact of Financial Fraud -- 4.2 Indirect Impact of Financial Fraud -- 5 The Future of Financial Fraud -- 5.1 The Technology Advancements -- 5.2 Dynamic Economic Circumstances -- 5.3 Regulatory Responses -- 5.4 Fraudster Adaptability -- 5.5 Ethical Considerations -- 6 Conclusion -- References -- A Study on Colour-Emotion Association for Happiness Among the Indian Youth Using Artificial Intelligence -- 1 Introduction -- 2 Methodology -- 2.1 Colour Extraction from T-Shirts -- 2.2 Facial Emotion Recognition -- 2.3 Data Collection for Colour-Emotion Mapping -- 3 Discussion -- 4 Conclusion and Future Directions -- References -- Comparative Analysis of Chicken Swarm Optimization and IbI Logics Algorithm for Multiobjective Optimization in kk-Coverage and mm-Connectivity Problem -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Multiobjective Optimization Formulation -- 4 Proposed Algorithm -- 4.1 ILA Versus CSO -- 4.2 Fitness Function for both Algorithm -- 5 Simulation Results -- 6 Conclusion -- References -- Security and Privacy in Emerging Technologies -- Machine Learning-Based Detection of Attacks and Anomalies in Industrial Internet of Things (IIoT) Networks -- 1 Introduction. , 1.1 IIoT Network Security Challenges -- 1.2 Attack Detection and Anomaly Identification Using Machine Learning -- 2 Literature Review -- 2.1 Existing IDS Systems Based on GANs -- 2.2 G-IDS Proposal -- 3 Dataset Information -- 4 Proposed System -- 4.1 Data Preprocessing -- 4.2 Feature Selection Algorithm -- 4.3 Generative Adversarial Networks -- 5 Results and Discussion -- 6 Conclusion -- References -- Privacy in Data Handling in Agile Development Environments -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem and Target Audience -- 2 Theoretical Reference -- 3 Related Work -- 4 Proposal Presentation -- 4.1 Methodological Structure -- 4.2 Setting Security and Privacy Controls -- 4.3 Proposed Instruction Set -- 5 Practical Application -- 6 Final Considerations -- References -- Feature Enriched Framework for Rumor Detection Using Tweets -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning Models/Techniques -- 2.2 Deep Learning Models/Techniques -- 2.3 Hybrid Techniques -- 2.4 Word/Contextual Embedding Techniques and Transformer Models -- 3 Research Design -- 3.1 Feature Enriched Rumor Detection Framework -- 3.2 Perspectives Used for Rumor Modeling -- 4 Methodology -- 4.1 Models Used for Experimentation -- 4.2 Rumor Dataset Description -- 4.3 Experimentation -- 4.4 Evaluation Results -- 5 Analysis and Discussion -- 6 Conclusion -- References -- Enhancing KYC Verification: A Secure and Efficient Approach Utilizing Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Traditional KYC Verification -- 2.2 Blockchain -- 2.3 KYC and Blockchain -- 3 Related Work -- 4 Enhancements -- 5 Proposed Approach -- 5.1 System Architecture -- 5.2 Proposed Algorithms -- 6 Results and Discussion -- 6.1 Scalability -- 6.2 Flexibility -- 6.3 Transparency -- 6.4 Privacy -- 6.5 History Tracking -- 7 Future Scope -- 8 Conclusion -- References. , A Smartphone Data Steganography Framework Based on K-mean Image Selection and Random Embedding in Three Image Channels -- 1 Introduction -- 2 Related Works -- 3 K-mean Select Random Insert (KSRI) Framework -- 3.1 The K-mean Selector Layer -- 3.2 The Random Inserter Layer -- 4 Experiment -- 4.1 The K-means Model Validation -- 4.2 The Data Embedding in Cover Images -- 5 Conclusion -- References -- Communication and Network Technologies -- Comparative Analysis of LSTM and GRU for Uplink Data Rate Prediction in 5G Networks -- 1 Introduction -- 2 Background and State of the Art -- 3 Data and Methods -- 3.1 Data Collection -- 3.2 RNN Variants-LSTM and GRU -- 3.3 Performance Measures -- 4 Proposed Approach -- 4.1 Data Preparation -- 4.2 Experiments -- 4.3 Evaluation -- 5 Conclusion -- References -- Scheduling in Time-Sensitive Networks Using Deep Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 The Solution Approach -- 3.1 Reinforcement Learning -- 3.2 Simulation -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Power Control for Collaborative Sensors in Internet of Things Environments Using upper KK-means Approach -- 1 Introduction -- 2 Channel and Signal Modeling of Collaborative Sensors -- 3 Power Control Strategy of Collaborative Sensors -- 3.1 Energy Consumption Model -- 3.2 Power Control Strategy -- 4 Implementing K-means -- 5 Simulation and Results -- 6 Conclusion -- References -- Optimizing the EDFA Gain for Optical WDM Network Using Simulation Method -- 1 Introduction -- 2 Simulative Setup -- 3 Results and Discussion -- 4 Conclusion -- References -- RFID-Based Smart Trolley with Mobile Application -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Arduino UNO -- 3.2 EM-18 Reader Module -- 3.3 Bluetooth Module (HC-05) -- 3.4 RFID Tags -- 3.5 Voltage Divider Circuit. , 3.6 Android Studio -- 3.7 Radio Frequency Identification -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Secure Authentication and Key Management -- SAKM-ITS: Secure Authentication and Key Management Protocol Concerning Intelligent Transportation Systems -- 1 Introduction -- 2 Related Work -- 3 Threat Model -- 4 Proposed Model -- 4.1 Registration of Entities -- 4.2 Authentication and Key Exchange Phase -- 5 Security Analysis -- 5.1 Formal Verification Using Scyther -- 5.2 Formal Verification Using Tamarin Prover -- 5.3 Informal Security Analysis -- 6 Comparative Analysis -- 6.1 Communication Cost -- 6.2 Computation Cost -- 7 Conclusion -- References -- Addressing Single Point of Failure in Group Communication of Constrained Environments -- 1 Introduction -- 2 Background -- 2.1 Shamir's Secret Sharing -- 2.2 Lagrange Interpolation -- 2.3 ECC and ECDH -- 3 The Proposed Scheme -- 3.1 Sharing Shares -- 4 Analysis of the Scheme -- 5 Conclusion -- References -- An RFID-Based Authentication Protocol for Smart Healthcare Applications -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminaries -- 2.1 Basic Concept of Elliptic Curve over a Prime Field GF(p) -- 2.2 Cryptographic Hash Function -- 2.3 Threat Model -- 3 Proposed Protocol -- 3.1 Initialization Phase -- 3.2 Registration Phase -- 3.3 Login and Mutual Authentication Phase -- 4 Security and Performance Analysis -- 4.1 Formal Security Verification Using AVISPA Tool -- 4.2 Security Features Comparison -- 4.3 Performance Analysis -- 5 Conclusion -- References -- Advanced Threat Detection and Mitigation -- On Credit Card Fraud Detection Using Machine Learning Techniques -- 1 Introduction -- 2 Machine Learning Techniques -- 2.1 Decision Tree -- 2.2 Random Forest -- 2.3 Isolation Forest -- 2.4 Support Vector Machine. , 3 Experimental Results.
    Additional Edition: Print version: Thampi, Sabu M. Applied Soft Computing and Communication Networks Singapore : Springer,c2024 ISBN 9789819720033
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949698484702882
    Format: 1 online resource (1199 pages)
    Edition: 1st ed.
    ISBN: 9782384761708 , 2384761706
    Series Statement: Advances in Social Science, Education and Humanities Research Series ; v.806
    Content: This book is a compilation of proceedings from the 2023 5th International Conference on Literature, Art and Human Development (ICLAHD 2023), held in Chengdu, China. It explores advances and innovations in literature, art, and human development, featuring contributions from leading academics and industrial experts. Topics include Chinese literary translation, ecological literature, calligraphy, film and television management, and humanistic concerns. The book aims to foster dialogue on emerging research areas and future directions in these fields. It is intended for scholars, researchers, and practitioners interested in the intersections of literature, art, and human development.
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- If Žižek look awry at The Sleep of Endymion The Way of Seeing Painting in S/Z -- Environmental Ethics Manifested in Stories by Roald Dahl-A Study on Environmental Writing for Children -- Functions of "Mirror" in Renaissance Artworks -- Research on the Protection and Development Path of Ethnic Minority Characteristic Villages from the Perspective of "Double Cultivation" of Settlements -Taking Shigu Ancient Town of Lijiang as an Example -- The Renaissance Artists' Understanding of Anatomy and Human Proportions and Their Application to Their Work -- A Comparative Study of Paintings of the Eucharist in the Second Half of the 15th Century -- Naturalism in Leonardo Da Vinci and Durer's Work -- More Than Its Timeless Beauty-Exploring the Legacy of Mona Lisa Through Its Possibility -- Phantom Truth and Renaissance Religious Images -- Promoting Contemporary Ming Furniture Design Through Sustainable Development -- A Study on the Usage and Language Attitudes of the National Common Language of the Yi Ethnic Group in Xichang -- A study on the new media communication path in the industrialization of non-legacy local drama taking Fujian Minju as an example -- Analysis of the Portrayal of Female Characters in Chinese Science Fiction Films from the Feminist Perspective -- A study on the changes in the depiction of women's nonkinship relationships in Chinese TV dramas from 2010 to the present -- From Peach Blossom Land to Yellow Earth: The Transformation of the "Rural" Context of Chinese Literature from a Postcolonial Perspective -- The Awakening of Women's Consciousness in the Western World: The Case of Women's Films Directed by Women in Europe and America -- Relating to how otome games affect female players' perceptions of mate choice. , The Influential Factors of Information Exposure and Trust on HPV Vaccination Intention of Female College Students -- Analysis of the "reversal" Phenomenon of Male and Female Gender Language and Stereotypes in Film and Television under the "Principle of Politeness" Take "Everything Everywhere All at Once" as an Example -- The Representation and Performance of homosexual subculture in Contemporary Chinese Film and Television -- Differences in the Shaping of " Immortal " in Chinese and Western Fables--Take Zhuang Zi and Aesop's Fables as examples -- Design and implementation of Brocade Ash Pile exhibiting platform using human-computer interaction and Web-based technologies -- The effect of Self-selected background music on spatial reasoning ability-an extension of the Mozart effect -- The Translation of Conceptual Metaphors in Government External Communication Texts - A case study on the 2022 Chinese Government Work Report -- The urban consciousness of the mainland in xixi's works -- A developmental study of children's emotional comprehension skills on music learning outcomes -- Incidental Focus on form in meaning-focused classes of Chinese as a foreign language -- A Study on Subtitle Translation of "Empresses in the Palace" from the Perspective of Medio-Translatology -- A Comparative Analysis of Pinger's Characterization as a Maid in the Dialogues of Two Hong Lou Meng Translations -- How Architecture Responds to Humans: A Study of the First Unitarian Church -- On the Artistic Expression of Traditional History Museums in the Digital Era -- Different Expositions of Chinese and Western Feminisms from the Perspective of Multiple Translations - Taking Game of Thrones as an Example -- The Hobbit: The Battle of the Five Armies -- The continuity of tradition in reshaping contemporary Chinese art forms -- Lost in the Stars: Humanity and Society in Metaphor. , A Study of Subtitle Translation from the Perspective of Functional Equivalence Theory Taking the Movie "La La Land" as an Example -- Unveiling the Ecological and Naturalistic Views in Zhuangzi's Daoism: Exploring the Concept of "The Usefulness of Uselessness" -- The Feminist contrast in the films of A Little Princess and The Secret Garden -- Analyzing Hong Kong Literature and Hong Kong People's Identity with the Example of the Novel "The Opposite -- Interpretation of the protagonist image in Jiefuyin and analysis and comparison of the similarities and differences with the protagonist image in Moshangsang and Yulinlang -- The Construction of "Cultural Imagery" in Chinese Films -- Art Criticism Perspective of Taine -- Gender Role Subversion and Self-Liberation in "The Handmaid's Tale -- Analysing the Historical Changes of The Song of Long Hatred from the Perspective of the Lane -- Intangible Cultural Heritage APP Design Based on Craftsman's spirit: The Case of Chinese Cantonese Embroidery -- Research on Dance Education Supported by Virtual Reality Technology -- Recovered Voice: Viktor Ullmann's Theresienstadt Vocal Music -- The Paradox of Romance in Tango A Close-Reading of Wong Kar Wai's Films of Happy Together, In the Mood for Love, and Fallen Angles -- Analysis of "Taste": Serves as the Aesthetic Experience of Calligraphy -- On the Phenomenon of "Embodiment" in 19th Century British Literature -- An Analysis of the Formation and Evolutionary Path of the Internet Buzzword 'Versailles' -- Exploring the Aesthetic Characteristics of Qingzhen Ci -- The New Development of Narrative Language And Aesthetics of VR Films -- On the Change of Sorrow in Li Qingzhao 's Ci -- Petrarch: The Otherization and Humanization of "Laura"-Petrarch's View of Women from Laura. , Sincerity First: The Way to Break Through for Acquaintance Variety Shows--Taking Go for Happiness and Kuai Le De Da Ren as Examples -- Ancient and Modern Changes in Yan Zhenqing's Calligraphy--Taking the Manuscript of Offering to a Nephew as an Example -- An Analysis of the Images in Angela Carter's Short Stories from the Perspective of Female Gothic -- What Path Do Luxury Brands Follow on the Eve of the Economic Crisis? -- An Analysis of the Present Situation and Future Development of NFR in the Post-pandemic Era -- A Study of Bronze Animal Motif Cultural and Creative Products in the New Media Era -- Writing on the Edge: Richard Flanagan's "Australian-ness" and the National Imagination -- Translation Strategies for the Dinghai Folk Culture in the Context of 'Culture Going Global' -- The Tactile Reconstruction of The Fall of the House of Usher -- From the Tiger's Mouth painted by Wu Yunhua -- Aesthetic Study of the Body from the Perspective of Martial Arts and Dance Integration---Based on the Dance Drama "Yong Chun -- Research on urban waterfront landscape design based on sponge city theory -- Analysis of Su Dongpo's Transformation in Separation -- Awakening Shakti: On the Hindu Aesthetics of the Bhagavad Gita from the Scene Design of Padmaavat -- Research on the Cross-Cultural External Dissemination Path of Zhoushan Folk Culture -- Analysis of Creative Tourism Development in Aba Tibetan-Qiang Autonomous Prefecture Based on the Successful Case of Yim Tin Tsai -- We All Love the White Mermaid" Chinese Disney Fans Discuss Racism Issues -- The Impact of Existentialism on Modern Society's Value Judgments: An Analysis through Camus' Absurdist Trilogy -- Research on the Village Color of Overseas Chinese Hometown in Modern Lingnan from the Perspective of Cultural Landscape -- Exploring Confucian Concepts of Ghosts and Gods. , An Analysis of the Internal Colonization Tendency in The Turn of the Screw From Power Discourse Perspective -- Depiction of Life Contradictions and the Character of Strangers in "One Word is Worth Ten Thousand Words": A Case Study -- Art Success: Necessarily Against Ethics? -- A Corpus-Based Analysis of the Language Features and Plot Representation in Jane Eyre -- Analysis on the Commercialization of Pop Art -- The Formation Logic, Existence of Chaos and Its Governance Strategy of the Culture of "Fan communities -- Lost and Found: Dual Narrative Progression in The Sun Also Rises -- Digital Fashion: Transforming Design, Technology, and Industry -- Visual Narratives of Ming Dynasty Courtesans: Aesthetic Appreciation and Cultural Practice in "Wu Ji Bai Me "Illustrations -- On the Translation Ethics Teaching for University Teachers in the Context of New Artificial Intelligence: Based on the Book Translation Ethics Research -- How to seek stability in an uncertain world-- On the love writing in Pan Xiangli's novels -- The Rise of Art Exhibitions and Their Value for Social Aesthetic Education in the Republic of China -- A Study on the Behavior of Public Viewing of Cantonese Opera from the Perspective of TPB using the SEM Model -- The Politics of Queer Emotion: Exploring Identity Politics of the LGBTQ+ Community Coming Out in Love, Simon -- An Analysis of the Application of Symbolic Graphics in the Design of Public Welfare Posters -- A Cross-Cultural Perspective on the Similarities and Differences in Chinese and American Body Language and the Reasons -- A comparative study of Chinese and American sight singing and ear training Materials -- Application of Bioinspired Surface Texture in Product Design: Exploration of Microbial Morphology -- A Study on Lam-qua's Medical Image (1836-1855) Based on the Chinese and Western Visual Interaction Mode. , Study on English Translation of Traditional ChineseMedicine Terminology from the Perspective ofChesterman's Translation Ethics.
    Additional Edition: ISBN 9782384761692
    Additional Edition: ISBN 2384761692
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949698674302882
    Format: 1 online resource (402 pages)
    Edition: 1st ed.
    ISBN: 9789464633146 , 946463314X
    Series Statement: Atlantis Highlights in Computer Sciences Series ; v.18
    Content: This book presents the proceedings from the Fourth International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2023), emphasizing advancements in computer engineering and communication technologies. It highlights themes such as Artificial Intelligence, Machine Learning, Data Mining, Big Data, and Quantum Computing. Organized by the VNR Vignana Jyothi Institute of Engineering and Technology in collaboration with international partners, the conference aims to showcase innovative technological trends and their impact on society. The publication includes 36 peer-reviewed papers selected from 221 submissions, reflecting cutting-edge research and development in areas like Green Computing, 5G Networks, IoT, and Smart Systems. The intended audience includes researchers, academics, and professionals in the fields of computer science and engineering.
    Note: Intro -- Preface -- Contents -- Peer-Review Statements -- Unsupervised Context Distillation from Weakly Supervised Data to Augment Video Question -- Public Perception of Myocarditis and Pericarditis Risk after Covid-19 Vaccination -- Fuzzy C-Means Approach Optimized using Raindrop Algorithm for Image Segmentation -- Shape Based Classification and Segmentation Of 3D Point Clouds using Deep Learning -- A Novel Optimized Variant of Machine Learning Algorithm for Accurate Energy Demand Prediction for Tetouan City, Morocco -- Improving the Efficiency of Object Grasp Detection on Embedded Platforms Using the AOGNet Neural Network Architecture -- Happiness Index Prediction of Students Using Machine Learning -- Enhancing AI Model for Fault Detection in Rail Through the Evaluation of AE Parameters with Proper Weighting Approach: A Comprehensive Study -- A COMPARATIVE STUDY ON AUTHENTICATION VULNERABILITIES AND SECURITY ISSUES IN WEARABLE DEVICES -- Prediction of Chronic Kidney Disease using Machine Learning Techniques -- Enhancing MCI Detection with a Hybrid Machine Learning Approach -- Revolutionizing Digital Ownership: Examining the Perks of a Polkadot- Based NFT Marketplace -- Comparative Analysis of Machine Learning Algorithms for Cervical Cancer Prediction -- Deep Learning - Based Forecasting of Task Failures in Cloud Data Centers -- A Frame Work Designing for Deep Fake Motion Detection using Deep Learning in Video Surveillance Systems -- A Design of Highly-Secured Map Chaotic Encryption Scheme for VANET Communication -- Quantum Cryptography Analysis for Secure Data Communication in Multi-Core Environment -- An Automatic Rice Grain Classification for Agricultural Products Marketing -- Smart IoT-Enabled pH Strip Reader for Simple and Accurate Analysis of Cervical Mucous pH. , Developing a Credible and Trustworthy E-Commerce Application using Blockchain and Machine Learning -- Multistage Encryption of Mammogram Images Using Fractional Fourier Transform and 3D Chaotic Map -- Visual Profiling and Automated Classification of Malware Samples using Deep Learning. -- A new approach for efficient clustering usingfuzzy prototypes with varying neighborhoods -- Ensemble Machine Learning to Predict and Feature Engineering to Identify Factors for Academic-Success -- Ensemble Machine Learning to Predict and Feature Engineering to Identify Factors for Academic-Success -- Parallelization of Content aware Image Resizing -- A Deep CNN-Based Approach Felicia Proposed for Identifying Medicinal and Edible Plants in the Western Ghats Region -- Experience-based learning for multi-parameter regression control of snake-like robots -- Optimizing Technical Parameters and Stock Price Prediction using: Linear Regressive MapReduce and Quasi-Newton Deep Learning -- Tri Bird Technique for Effective Face Recognition Using Deep Convolutional Neural Network -- Assessing the Performance of ZigBee RF Protocol using Path loss models for IoT Application -- Image Caption Generator -- Detection of Epileptic Seizures from Logistic Model Trees -- An Empirical Comparative Study of Machine Learning Algorithms for Telugu News Classification.
    Additional Edition: ISBN 9789464633139
    Additional Edition: ISBN 9464633131
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cambridge ; : Cambridge University Press,
    UID:
    almafu_9959242695302883
    Format: 1 online resource (ix, 342 pages) : , digital, PDF file(s).
    ISBN: 1-107-17896-7 , 1-281-14618-8 , 9786611146184 , 1-139-13225-3 , 0-511-36697-3 , 0-511-49781-4 , 0-511-36634-5 , 0-511-36571-3 , 0-511-36756-2
    Content: In Aristotle's Ethics as First Philosophy Claudia Baracchi demonstrates the indissoluble links between practical and theoretical wisdom in Aristotle's thinking. Referring to a broad range of texts from the Aristotelian corpus, Baracchi shows how the theoretical is always informed by a set of practices, and specifically, how one's encounter with phenomena, the world, or nature in the broadest sense, is always a matter of ethos. Such a 'modern' intimation can, thus, be found at the heart of Greek thought. Baracchi's book opens the way for a comprehensively reconfigured approach to classical Greek philosophy.
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015). , Introduction -- On Ethics as First Philosophy -- On Interpreting Aristotle: Epistēmē as First Philosophy? -- Prelude. Before Ethics: Metaphysics A and Posterior Analytics B.19 -- Metaphysics A: On "Metaphysics" and Desire -- Posterior Analytics: On Nous and Aisthēsis -- Architecture as First Philosophy -- Main Section. Ēthikōn Nikomakheiōn Alpha-Eta -- Human Initiative and its Orientation to the good -- On Happiness -- On the Soul -- On Justice -- The Virtues of the Intellect -- Interlude. Metaphysics Gamma -- Aporiai of the Science of "Being qua Being" -- The Principle "By Nature" -- Reiterations -- Teleology, Indefinable and Indubitable -- The Phenomenon of Truth and the Action of Thinking -- Concluding Section. Ēthikōn Nikomakheiōn Theta-Kappa -- Friendship and Justice: Inceptive Remarks -- Perfection of Friendship -- Again on Friendship and Justice -- On Happiness or the Good -- Again on Logos and Praxis -- Kolophon. , English
    Additional Edition: ISBN 1-107-40051-1
    Additional Edition: ISBN 0-521-86658-8
    Language: English
    Subjects: Philosophy , Ancient Studies
    RVK:
    RVK:
    Keywords: Hochschulschrift ; Hochschulschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_9961946967402883
    Format: 1 online resource (XX, 407 p. 176 illus., 152 illus. in color.)
    Edition: 1st ed. 2025.
    ISBN: 3-031-88042-0
    Series Statement: Communications in Computer and Information Science, 2431
    Content: The two-volume proceedings set CCIS 2430-2431 constitutes the revised selected papers of the 6th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2024, held in Bangkok, Thailand, during December 10–12, 2024. The 58 full papers and 3 short papers included in this book were carefully reviewed and selected from 501 submissions. They were organized in topical sections as follows: Part I: Theory and Methods. Part II: Theory and Methods; Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.
    Note: -- Theory and Methods. -- DL DTCD: Deep Learning Powered EV Location Prediction and Dynamic TOPSIS Charging Deployment. -- A Novel Approach of Electrocardiogram Denoising based on Deep Learning CNN and TVD. -- LSTM GRN: A Deep Learning Model for the Prediction of Gene Regulatory Networks from Single Cell Data. -- Sense@BoEmo: A Novel Approach to Identify Precise Emotion Sensing Skin of Human Body. -- Students’ Performance Prediction in An E-Learning Platform With Sea Hawk Optimized Single Head Attention Enabled Bi Directional Long Short Term Memory. -- Traffic crash severity prediction using eXplainable AI. -- Exploring the Role of Data Filtering and Machine Learning Algorithms in Enhancing RSSI-Based Indoor Positioning Accuracy in Dynamic Environments. -- Bio Medical Waste Management: Deep Learning Approach. -- Principles of Basal Area Modeling of Forest Trees and Stands: Bivariate Mixed Effect Parameters Diffusion Process Framework. -- High Resolution Mapping of Rock Glacier Dynamics in the Sikkim Himalayas, Using remote sensing data. -- An Efficient On demand Mobile Charger Scheduling in WRSNs Using MJaya Meta Heuristic Algorithm. -- Systems and Applications. -- Improving Intrusion Detection System using Feature Weighting. -- AI enabled Network Intrusion Detection and Classification with UNSW NB15 Datasets. -- Data Science Techniques to Reduce the Occurrence of False Negatives during Intrusion Detection. -- Process Mining and Standardized Generic Business Process Tracing for ERP Systems: Requirements for ERP vendors. -- Hand Gesture Identifying Wearable Input Device for OS-Platform Independent Generic HCI Application in a Multi modal Platform. -- GeMoP: General Motion Planning in High Speed & Accuracy and Fast Settle application. -- Rebounded PSO Method for Sigmoid PID Controller for a Maglev System with Input Saturation. -- A Linear Programming problem in Python and CPLEX, led by Monte Carlo on the Web. -- Machine Learning Based Performance Evaluation of Spatial Modulation Schemes in Correlated Nakagami m Fading Channels. -- Prediction of Life Expectancy for India using Time Series Models. -- Leveraging Machine Learning to Detect and Alleviate Natural Anxiety. -- Multiple Novel Algorithms Based on TF IDF and Inverse Document Frequency, Experimented with Text Data in the Education Field. -- Modified Alexnet For English Handwritten Character Recognition. -- PGP Miner: A Data and Text Mining Tool for PhysicoChemical and Toxicity Data in P glycoprotein (P gp) Inhibitors. -- InterpretableTruthDetection: Interpretable Bimodal Within Subject Truth and Deception Detection Models. -- Hybrid Techniques. -- A Novel Neurofuzzy Architecture for Deterministic Non affine Nonlinear System Identification. -- A Neuro Evolutionary Framework for Enhancing Communication, Safety, and Decision Making in Connected Car Ecosystems. -- Soft Computing for Smart World. -- Smart Scheduling of Home Appliances using Happiness Aware Scalable Reinforcement Learning Agent. -- Adoption Intention of Smartwatch Technology: A Study Among Runners Using the Health Belief and Technology Acceptance Models.
    Additional Edition: ISBN 3-031-88041-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Frankfurt am Main :Fischer,
    UID:
    almafu_BV023257640
    Format: 287 Seiten : , Illustrationen ; , 205 mm x 125 mm.
    Edition: 2. Auflage
    ISBN: 978-3-10-046321-0 , 3-10-046321-8
    Uniform Title: The architecture of happiness
    Language: German
    Subjects: Engineering
    RVK:
    RVK:
    RVK:
    Keywords: Architektur ; Befindlichkeit ; Architekturtheorie ; Psychologie ; Architektur ; Wohnkultur ; Soziologie ; Fiktionale Darstellung ; Fiktionale Darstellung
    Author information: De Botton, Alain 1969-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Edinburgh :Edinburgh University Press,
    UID:
    almafu_BV044011547
    Format: 1 Online-Ressource (ix, 230 Seiten) : , Illustrationen.
    ISBN: 978-0-7486-9326-9 , 978-0-7486-9327-6
    Content: In 12 original essays, this collection aims to present new scholarship in the fields of modernist literature, film, dance, visual art, architecture, and design emerging in the light of theory's 'affective turn'. Essays draw on a diverse range of affective theories to examine such concepts as happiness, melancholy, love, sympathy, cuteness, fear, trauma, and bliss in works by Proust, Ford Madox Ford, James Joyce and Virginia Woolf among others
    Additional Edition: Erscheint auch als Druck-Ausgabe, hardback ISBN 978-0-7486-9325-2
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    Keywords: Moderne ; Literatur ; Künste ; Affekt ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages