![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
Trends in Deep Learning Methodologies: Algorithms, Applications, and Systems covers deep learning approaches such as neural networks, deep belief networks, recurrent neural networks, convolutional neural networks, deep auto-encoder, and deep generative networks, which have emerged as powerful computational models. Chapters elaborate on these models which have shown significant success in dealing with massive data for a large number of applications, given their capacity to extract complex hidden features and learn efficient representation in unsupervised settings. Chapters investigate deep learning-based algorithms in a variety of application, including biomedical and health informatics, computer vision, image processing, and more. In recent years, many powerful algorithms have been developed for matching patterns in data and making predictions about future events. The major advantage of deep learning is to process big data analytics for better analysis and self-adaptive algorithms to handle more data. Deep learning methods can deal with multiple levels of representation in which the system learns to abstract higher level representations of raw data. Earlier, it was a common requirement to have a domain expert to develop a specific model for each specific application, however, recent advancements in representation learning algorithms allow researchers across various subject domains to automatically learn the patterns and representation of the given data for the development of specific models.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
Machine learning is currently one of the most rapidly growing areas of research in computer science. In compiling this volume we have brought together contributions from some of the most prestigious researchers in this field. This book covers the three main learning systems; symbolic learning, neural networks and genetic algorithms as well as providing a tutorial on learning casual influences. Each of the nine chapters is self-contained. Both theoreticians and application scientists/engineers in the broad area of artificial intelligence will find this volume valuable. It also provides a useful sourcebook for Postgraduate since it shows the direction of current research.
Defines the notion of an activity model learned from sensor data and presents key algorithms that form the core of the field Activity Learning: Discovering, Recognizing and Predicting Human Behavior from Sensor Data provides an in-depth look at computational approaches to activity learning from sensor data. Each chapter is constructed to provide practical, step-by-step information on how to analyze and process sensor data. The book discusses techniques for activity learning that include the following: * Discovering activity patterns that emerge from behavior-based sensor data * Recognizing occurrences of predefined or discovered activities in real time * Predicting the occurrences of activities The techniques covered can be applied to numerous fields, including security, telecommunications, healthcare, smart grids, and home automation. An online companion site enables readers to experiment with the techniques described in the book, and to adapt or enhance the techniques for their own use. With an emphasis on computational approaches, Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data provides graduate students and researchers with an algorithmic perspective to activity learning.
This book describes advanced machine learning models - such as temporal collaborative filtering, stochastic models and Bayesian nonparametrics - for analysing customer behaviour. It shows how they are used to track changes in customer behaviour, monitor the evolution of customer groups, and detect various factors, such as seasonal effects and preference drifts, that may influence customers' purchasing behaviour. In addition, the book presents four case studies conducted with data from a supermarket health program in which the customers were segmented and the impact of promotional activities on different segments was evaluated. The outcomes confirm that the models developed here can be used to effectively analyse dynamic behaviour and increase customer engagement. Importantly, the methods introduced here can also be used to analyse other types of behavioural data such as activities on social networks, and educational systems.
Artificial intelligence is at the forefront of research and implementation in many industries including healthcare and agriculture. Whether it's detecting disease or generating algorithms, deep learning techniques are advancing exponentially. Researchers and professionals need a platform in which they can keep up with machine learning trends and their developments in the real world. The Handbook of Research on Applications and Implementations of Machine Learning Techniques provides innovative insights into the multi-disciplinary applications of machine learning algorithms for data analytics. The content within this publication examines disease identification, neural networks, and language support. It is designed for IT professionals, developers, data analysts, technology specialists, R&D professionals, industrialists, practitioners, researchers, academicians, and students seeking research on deep learning procedures and their enactments in the fields of medicine, engineering, and computer science.
Making use of data is not anymore a niche project but central to almost every project. With access to massive compute resources and vast amounts of data, it seems at least in principle possible to solve any problem. However, successful data science projects result from the intelligent application of: human intuition in combination with computational power; sound background knowledge with computer-aided modelling; and critical reflection of the obtained insights and results. Substantially updating the previous edition, then entitled Guide to Intelligent Data Analysis, this core textbook continues to provide a hands-on instructional approach to many data science techniques, and explains how these are used to solve real world problems. The work balances the practical aspects of applying and using data science techniques with the theoretical and algorithmic underpinnings from mathematics and statistics. Major updates on techniques and subject coverage (including deep learning) are included. Topics and features: guides the reader through the process of data science, following the interdependent steps of project understanding, data understanding, data blending and transformation, modeling, as well as deployment and monitoring; includes numerous examples using the open source KNIME Analytics Platform, together with an introductory appendix; provides a review of the basics of classical statistics that support and justify many data analysis methods, and a glossary of statistical terms; integrates illustrations and case-study-style examples to support pedagogical exposition; supplies further tools and information at an associated website. This practical and systematic textbook/reference is a "need-to-have" tool for graduate and advanced undergraduate students and essential reading for all professionals who face data science problems. Moreover, it is a "need to use, need to keep" resource following one's exploration of the subject.
This book first presents a tutorial on Federated Learning (FL) and its role in enabling Edge Intelligence over wireless edge networks. This provides readers with a concise introduction to the challenges and state-of-the-art approaches towards implementing FL over the wireless edge network. Then, in consideration of resource heterogeneity at the network edge, the authors provide multifaceted solutions at the intersection of network economics, game theory, and machine learning towards improving the efficiency of resource allocation for FL over the wireless edge networks. A clear understanding of such issues and the presented theoretical studies will serve to guide practitioners and researchers in implementing resource-efficient FL systems and solving the open issues in FL respectively.
Progress in the application of machine learning (ML) to the physical and life sciences has been rapid. A decade ago, the method was mainly of interest to those in computer science departments, but more recently ML tools have been developed that show significant potential across wide areas of science. There is a growing consensus that ML software, and related areas of artificial intelligence, may, in due course, become as fundamental to scientific research as computers themselves. Yet a perception remains that ML is obscure or esoteric, that only computer scientists can really understand it, and that few meaningful applications in scientific research exist. This book challenges that view. With contributions from leading research groups, it presents in-depth examples to illustrate how ML can be applied to real chemical problems. Through these examples, the reader can both gain a feel for what ML can and cannot (so far) achieve, and also identify characteristics that might make a problem in physical science amenable to a ML approach. This text is a valuable resource for scientists who are intrigued by the power of machine learning and want to learn more about how it can be applied in their own field.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing. The relationship will not be limited to only architecture proposal, trends, and technical advancements. However, the book also explores the possibility of predictive analytics in cloud computing with respect to Blockchain, IoT, and 5G. The recent advancements in the internet-supported distributed computing i.e. cloud computing, has made it possible to process the bulk amount of data in a parallel and distributed. This has made it a lucrative technology to process the data generated from technologies such as Blockchain, IoT, and 5G. However, there are several issues a Cloud Service Provider (CSP) encounters, such as Blockchain security in cloud, IoT elasticity and scalability management in cloud, Service Level Agreement (SLA) compliances for 5G, Resource management, Load balancing, and Fault-tolerance. This edited book will discuss the aforementioned issues in connection with Blockchain, IoT, and 5G. Moreover, the book discusses how the cloud computing is not sufficient and one needs to use fog computing, and edge computing to efficiently process the data generated from IoT, and 5G. Moreover, the book shows how smart city, smart healthcare system, and smart communities are few of the most relevant IoT applications where fog computing plays a significant role. The book discusses the limitation of fog computing and the need for the edge computing to further reduce the network latency to process streaming data from IoT devices. The book also explores power of predictive analytics of Blockchain, IoT, and 5G data in cloud computing with its sister technologies. Since, the amount of resources increases day-by day, artificial intelligence (AI) tools are becoming more popular due to their capability which can be used in solving wide variety of issues, such as minimize the energy consumption of physical servers, optimize the service cost, improve the quality of experience, increase the service availability, efficiently handle the huge data flow, manages the large number of IoT devices, etc.
This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2020), held in Krishna Engineering College, Ghaziabad, India, during December 17-18, 2020. This book discusses key concepts, challenges, and potential solutions in connection with established and emerging topics in advanced computing, renewable energy, and network communications.
The field called Learning Classifier Systems is populated with romantics. Why shouldn't it be possible for computer programs to adapt, learn, and develop while interacting with their environments? In particular, why not systems that, like organic populations, contain competing, perhaps cooperating, entities evolving together? John Holland was one of the earliest scientists with this vision, at a time when so-called artificial intelligence was in its infancy and mainly concerned with preprogrammed systems that didn't learn. that, like organisms, had sensors, took Instead, Holland envisaged systems actions, and had rich self-generated internal structure and processing. In so doing he foresaw and his work prefigured such present day domains as reinforcement learning and embedded agents that are now displacing the older "standard Af' . One focus was what Holland called "classifier systems" sets of competing rule like "classifiers," each a hypothesis as to how best to react to some aspect of the environment--or to another rule. The system embracing such a rule "popu lation" would explore its available actions and responses, rewarding and rating the active rules accordingly. Then "good" classifiers would be selected and re produced, mutated and even crossed, a la Darwin and genetics, steadily and reliably increasing the system's ability to cope."
This book covers the latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing, and their applications in real world. The topics covered in machine learning involve feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN), and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modeling from video, 3D object recognition, localization and tracking, medical image analysis, and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multitask, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG), and electromyogram (EMG).
This book constitutes refereed proceedings of the 3rd International Conference on Recent Trends in Advanced Computing - Artificial Intelligence and Technologies. This book covers a wide range of topics-vision, analytics, robotics, networking, health care, current pandemic issues of COVID-19, and cutting-edge technologies connected to cybersecurity in digital manufacturing and Industry 4.0. The contents of this book will be useful to researchers from industry and academia. The volume includes novel contributions and the latest developments from researchers across industry and academia. The book will serve as a valuable reference resource for academics and researchers across the globe.
This book presents the basics of both NAND flash storage and machine learning, detailing the storage problems the latter can help to solve. At a first sight, machine learning and non-volatile memories seem very far away from each other. Machine learning implies mathematics, algorithms and a lot of computation; non-volatile memories are solid-state devices used to store information, having the amazing capability of retaining the information even without power supply. This book will help the reader understand how these two worlds can work together, bringing a lot of value to each other. In particular, the book covers two main fields of application: analog neural networks (NNs) and solid-state drives (SSDs). After reviewing the basics of machine learning in Chapter 1, Chapter 2 shows how neural networks can mimic the human brain; to accomplish this result, neural networks have to perform a specific computation called vector-by-matrix (VbM) multiplication, which is particularly power hungry. In the digital domain, VbM is implemented by means of logic gates which dictate both the area occupation and the power consumption; the combination of the two poses serious challenges to the hardware scalability, thus limiting the size of the neural network itself, especially in terms of the number of processable inputs and outputs. Non-volatile memories (phase change memories in Chapter 3, resistive memories in Chapter 4, and 3D flash memories in Chapter 5 and Chapter 6) enable the analog implementation of the VbM (also called "neuromorphic architecture"), which can easily beat the equivalent digital implementation in terms of both speed and energy consumption. SSDs and flash memories are strictly coupled together; as 3D flash scales, there is a significant amount of work that has to be done in order to optimize the overall performances of SSDs. Machine learning has emerged as a viable solution in many stages of this process. After introducing the main flash reliability issues, Chapter 7 shows both supervised and un-supervised machine learning techniques that can be applied to NAND. In addition, Chapter 7 deals with algorithms and techniques for a pro-active reliability management of SSDs. Last but not least, the last section of Chapter 7 discusses the next challenge for machine learning in the context of the so-called computational storage. No doubt that machine learning and non-volatile memories can help each other, but we are just at the beginning of the journey; this book helps researchers understand the basics of each field by providing real application examples, hopefully, providing a good starting point for the next level of development.
This book is a timely book to summarize the latest developments in the optimization of tuned mass dampers covering all classical approaches and new trends including metaheuristic algorithms. Also, artificial intelligence and machine learning methods are included to predict optimum results by skipping long optimization processes. Another difference and advantage of the book are to provide chapters about several types of control types including passive tuned mass dampers, active tuned mass dampers, tuned liquid dampers, tuned liquid column dampers and inerter dampers. Tuned mass dampers (TMDs) are vibration absorber devices used in all types of mechanic systems. The key factor in the design is an effective tuning of TMDs for the desired performance. In practice, several high-rise structures and bridges were designed by including TMDs. Also, TMDs were installed after the construction of the structures after several negative experiences resulting from the disturbing sway of the structures. In optimum design, several closed-form expressions have been proposed for optimum frequency and damping ratio of TMDs, but the exact optimization requires iterative optimization approaches. The current trend is to use evolutionary algorithms and metaheuristic optimization methods to reach the goal.
Machine learning heavily relies on optimization algorithms to solve its learning models. Constrained problems constitute a major type of optimization problem, and the alternating direction method of multipliers (ADMM) is a commonly used algorithm to solve constrained problems, especially linearly constrained ones. Written by experts in machine learning and optimization, this is the first book providing a state-of-the-art review on ADMM under various scenarios, including deterministic and convex optimization, nonconvex optimization, stochastic optimization, and distributed optimization. Offering a rich blend of ideas, theories and proofs, the book is up-to-date and self-contained. It is an excellent reference book for users who are seeking a relatively universal algorithm for constrained problems. Graduate students or researchers can read it to grasp the frontiers of ADMM in machine learning in a short period of time.
This book covers not only foundational materials but also the most recent progresses made during the past few years on the area of machine learning algorithms. In spite of the intensive research and development in this area, there does not exist a systematic treatment to introduce the fundamental concepts and recent progresses on machine learning algorithms, especially on those based on stochastic optimization methods, randomized algorithms, nonconvex optimization, distributed and online learning, and projection free methods. This book will benefit the broad audience in the area of machine learning, artificial intelligence and mathematical programming community by presenting these recent developments in a tutorial style, starting from the basic building blocks to the most carefully designed and complicated algorithms for machine learning.
This book organizes principles and methods of signal processing and machine learning into the framework of coherence. The book contains a wealth of classical and modern methods of inference, some reported here for the first time. General results are applied to problems in communications, cognitive radio, passive and active radar and sonar, multi-sensor array processing, spectrum analysis, hyperspectral imaging, subspace clustering, and related. The reader will find new results for model fitting; for dimension reduction in models and ambient spaces; for detection, estimation, and space-time series analysis; for subspace averaging; and for uncertainty quantification. Throughout, the transformation invariances of statistics are clarified, geometries are illuminated, and null distributions are given where tractable. Stochastic representations are emphasized, as these are central to Monte Carlo simulations. The appendices contain a comprehensive account of matrix theory, the SVD, the multivariate normal distribution, and many of the important distributions for coherence statistics. The book begins with a review of classical results in the physical and engineering sciences where coherence plays a fundamental role. Then least squares theory and the theory of minimum mean-squared error estimation are developed, with special attention paid to statistics that may be interpreted as coherence statistics. A chapter on classical hypothesis tests for covariance structure introduces the next three chapters on matched and adaptive subspace detectors. These detectors are derived from likelihood reasoning, but it is their geometries and invariances that qualify them as coherence statistics. A chapter on independence testing in space-time data sets leads to a definition of broadband coherence, and contains novel applications to cognitive radio and the analysis of cyclostationarity. The chapter on subspace averaging reviews basic results and derives an order-fitting rule for determining the dimension of an average subspace. These results are used to enumerate sources of acoustic and electromagnetic radiation and to cluster subspaces into similarity classes. The chapter on performance bounds and uncertainty quantification emphasizes the geometry of the Cramer-Rao bound and its related information geometry.
With the development of Big Data platforms for managing massive amount of data and wide availability of tools for processing these data, the biggest limitation is the lack of trained experts who are qualified to process and interpret the results. This textbook is intended for graduate students and experts using methods of cluster analysis and applications in various fields. Suitable for an introductory course on cluster analysis or data mining, with an in-depth mathematical treatment that includes discussions on different measures, primitives (points, lines, etc.) and optimization-based clustering methods, Cluster Analysis and Applications also includes coverage of deep learning based clustering methods. With clear explanations of ideas and precise definitions of concepts, accompanied by numerous examples and exercises together with Mathematica programs and modules, Cluster Analysis and Applications may be used by students and researchers in various disciplines, working in data analysis or data science.
The power of data drives the digital economy of the 21st century. It has been argued that data is as vital a resource as oil was during the industrial revolution. An upward trend in the number of research publications using machine learning in some of the top journals in combination with an increasing number of academic recruiters within psychology asking for Python knowledge from applicants indicates a growing demand for these skills in the market. While there are plenty of books covering data science, rarely, if ever, books in the market address the need of social science students with no computer science background. They are typically written by engineers or computer scientists for people of their discipline. As a result, often such books are filled with technical jargon and examples irrelevant to psychological studies or projects. In contrast, this book was written by a psychologist in a simple, easy-to-understand way that is brief and accessible. The aim for this book was to make the learning experience on this topic as smooth as possible for psychology students/researchers with no background in programming or data science. Completing this book will also open up an enormous amount of possibilities for quantitative researchers in psychological science, as it will enable them to explore newer types of research questions.
The fundamental mathematical tools needed to understand machine learning include linear algebra, analytic geometry, matrix decompositions, vector calculus, optimization, probability and statistics. These topics are traditionally taught in disparate courses, making it hard for data science or computer science students, or professionals, to efficiently learn the mathematics. This self-contained textbook bridges the gap between mathematical and machine learning texts, introducing the mathematical concepts with a minimum of prerequisites. It uses these concepts to derive four central machine learning methods: linear regression, principal component analysis, Gaussian mixture models and support vector machines. For students and others with a mathematical background, these derivations provide a starting point to machine learning texts. For those learning the mathematics for the first time, the methods help build intuition and practical experience with applying mathematical concepts. Every chapter includes worked examples and exercises to test understanding. Programming tutorials are offered on the book's web site.
1 feel privileged that the J(jh Advances in Computer Games Conference (ACG 10) takes place in Graz, Styria, Austria. It is the frrst time that Austria acts as host country for this major event. The series of conferences started in Edinburgh, Scotland in 1975 and was then held four times in England, three times in The Netherlands, and once in Germany. The ACG-10 conference in Graz is special in that it is organised together with the 11th World Computer Chess Championship (WCCC), the Sth Computer Olympiad (CO), and the European Union Y outh Chess Championship. The 11 th WCCC and ACG 10 take place in the Dom im Berg (Dome in the Mountain), a high-tech space with multimedia equipment, located in the Schlossberg, in the centre of the city. The help of many sponsors (large and small) is gratefully acknowledged. They will make the organisation of this conference a success. In particular, 1 would like to thank the European Union for designating Graz as the Cultural Capital of Europe 2003. There are 24 accepted contributions by participants from all over the world: Europe, Japan, USA, and Canada. The specific research results ofthe ACG 10 are expected to tind their way to general applications. The results are described in the pages that follow. The international stature together with the technical importance of this conference reaffrrms the mandate of the International Computer Games Association (ICGA) to represent the computer-games community."
This open access book focuses on robot introspection, which has a direct impact on physical human-robot interaction and long-term autonomy, and which can benefit from autonomous anomaly monitoring and diagnosis, as well as anomaly recovery strategies. In robotics, the ability to reason, solve their own anomalies and proactively enrich owned knowledge is a direct way to improve autonomous behaviors. To this end, the authors start by considering the underlying pattern of multimodal observation during robot manipulation, which can effectively be modeled as a parametric hidden Markov model (HMM). They then adopt a nonparametric Bayesian approach in defining a prior using the hierarchical Dirichlet process (HDP) on the standard HMM parameters, known as the Hierarchical Dirichlet Process Hidden Markov Model (HDP-HMM). The HDP-HMM can examine an HMM with an unbounded number of possible states and allows flexibility in the complexity of the learned model and the development of reliable and scalable variational inference methods. This book is a valuable reference resource for researchers and designers in the field of robot learning and multimodal perception, as well as for senior undergraduate and graduate university students.
This book focuses on the impact of artificial intelligence (AI) and machine learning (ML) models on supply chain operations in industry 4.0. The chapters illustrate the AI and ML models for all functional areas of operations in SCM. The book also includes examples using ML models like handling supply-to-demand imbalances, triggering automated responses, and reinforcing customer relationships. It describes the evolution of blockchain technology coupled with the ability to automate business logic for the transparency of goods, infrastructure, products, and licenses in software. The book also includes case studies that provide a problem statement and industry overcome by applying ML and AI technologies. This book is suitable for undergraduates, postgraduates, industrial professionals, business executives, entrepreneurs, and freelancers to encourage practical learning on AI and ML algorithms in SCM 4.0. Additionally, this book will provide computer science and information system professionals with the latest technologies embedded in the corporate world. |
![]() ![]() You may like...
Cognitive Data Models for Sustainable…
Siddhartha Bhattacharyya, Naba Kumar Mondal, …
Paperback
R2,941
Discovery Miles 29 410
Applications of Machine Learning and…
Ran Yan, Shuaian Wang
Hardcover
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,638
Discovery Miles 86 380
Deep Learning Applications: In Computer…
Qi Xuan, Yun Xiang, …
Hardcover
R2,840
Discovery Miles 28 400
Deep Learning Applications
Pier Luigi Mazzeo, Paolo Spagnolo
Hardcover
R3,347
Discovery Miles 33 470
Cyber-Physical System Solutions for…
Vanamoorthy Muthumanikandan, Anbalagan Bhuvaneswari, …
Hardcover
R7,203
Discovery Miles 72 030
Foundation Models for Natural Language…
Gerhard PaaĆ, Sven Giesselbach
Hardcover
R935
Discovery Miles 9 350
|