for Journals by Title or ISSN for Articles by Keywords help
 Subjects -> ENGINEERING (Total: 2450 journals)     - CHEMICAL ENGINEERING (208 journals)    - CIVIL ENGINEERING (208 journals)    - ELECTRICAL ENGINEERING (116 journals)    - ENGINEERING (1288 journals)    - ENGINEERING MECHANICS AND MATERIALS (394 journals)    - HYDRAULIC ENGINEERING (56 journals)    - INDUSTRIAL ENGINEERING (82 journals)    - MECHANICAL ENGINEERING (98 journals) ENGINEERING (1288 journals)                  1 2 3 4 5 6 7 | Last
 3D ResearchJournal Prestige (SJR): 0.222 Citation Impact (citeScore): 1Number of Followers: 21      Hybrid journal (It can contain Open Access articles) ISSN (Online) 2092-6731 Published by Springer-Verlag  [2351 journals]
• Contrast Enhancement Technique Based on Lifting Wavelet Transform
• Authors: Megha Goyal; Bharat Bhushan; Shailender Gupta; Rashmi Chawla
Abstract: Contrast enhancement is an indispensable process for improving the subjective quality and information content of an image. Adjustment in the relative brightness and darkness of an image is done in order to attain the same. This paper employs lifting wavelet transform (LWT) to enhance the image since it is computationally inexpensive. The application of LWT results in the low and high frequency components. The former components that contain most of the information are enhanced using CLAHE algorithm while the latter are kept unchanged. In addition, a weighted average matrix which controls the level of enhancement is used to acquire the enhanced output image. To measure the efficacy, the proposed technique is implemented in MATLAB-2013 and evaluated on the basis of several performance metrics such as: absolute mean brightness error, average information content, Contrast Improvement Index, degree of entropy unpreserved, Structural Similarity Index, Universal Quality Index. From experiment, it can be observed that the results obtained from proposed algorithm are better than or comparable to other popular techniques in literature in almost all the parameters undertaken.
PubDate: 2018-10-12
DOI: 10.1007/s13319-018-0201-z
Issue No: Vol. 9, No. 4 (2018)

• Multi-objective Optimization of Permanent Magnet Adjustable Speed Driver
Base on RSM Model and NSGA-II
• Authors: Xinquan Yin; Yaping Zhang; Jun Wang
Abstract: To optimise the structure of a permanent magnet adjustable speed driver (PMASD), a multi-objective optimization design method for increasing the output torque and reducing the eddy current loss was proposed. Firstly, the three-dimensional finite element method model of a PMASD was established, the influence of the main configuration parameters in the PMASD on the output torque and the eddy current loss was analyzed, and the reasonable range of the parameters was determined. When taking the minimal eddy current loss and maximum output torque as the optimal objectives, the secondary response surface numerical model equation was built using the Central Composite Design experimental method and the Response Surface Methodology. Then, while ensuring that the output torque of the PMASD is not less than the rated torque, the NSGA-II was used to perform multi-objective optimization based on the response surface model and the Pareto optimal solution sets for two objectives was obtained. Finally, the minimal eddy current loss model and maximum output torque model were selected to compare with the initial model that was not optimized. The simulation results proved that the output torque of the minimal eddy current loss model increased by 6.54% based on the reduction of eddy current loss by 0.81% and the output torque of the maximum output torque model increased by 24.41% based on an increase in eddy current loss of 10.51%: the performance of both optimization models had been improved significantly. The optimization results show that this method improves the transmission performance of the PMASD.
PubDate: 2018-10-11
DOI: 10.1007/s13319-018-0202-y
Issue No: Vol. 9, No. 4 (2018)

• Offline Handwritten Signature Verification Using Cylindrical Shape Context
Abstract: Offline handwritten signatures is a convincing evidence form of biometrics for verification. However, the verification of offline handwritten signatures is challenging task because of the variations in handwritten signatures. To address this difficulty, this paper proposes a new approach to represent the shape. In this newly proposed approach, the signature pixels are represented by: (1) Gaussian Weighting Based Tangent Angle, to represent the curve angle at the reference pixel; (2) a new shape descriptor, i.e. cylindrical shape context is proposed for a detailed and accurate description of the curve at corresponding pixel. Experimental results show that desired pixel matching results are obtained by using cylindrical shape context which automatically increases the accuracy of verification of offline handwritten signatures. The shape dissimilarity measures are computed and given to the Support Vector Machine with Radial Basis Function (RBF) kernel for classification of signature. The results obtained using GPDS synthetic signature database, UTSig persian offline signature database, and MCYT-75 offline signature database shows the effectiveness of proposed cylindrical shape context.
PubDate: 2018-10-11
DOI: 10.1007/s13319-018-0200-0
Issue No: Vol. 9, No. 4 (2018)

• Metaheuristic Techniques for Detection of Optic Disc in Retinal Fundus
Images
• Authors: Jyotika Pruthi; Shaveta Arora; Kavita Khanna
Abstract: Eye diseases like glaucoma and diabetic retinopathy are known to be the thieves of eye-sight that are responsible for causing the vision loss worldwide. Automatic detection of such diseases with the help of the digital color fundus photography helps in early diagnosis and treatment. From the fundus images, optic disc is required to be analyzed to diagnose the disease. In this paper, a technique has been proposed for locating optic disc through metaheuristic techniques namely Ant Colony Optimization algorithm, Bacterial Foraging Optimization, Firefly algorithm, Cuckoo Search algorithm and Krill Herd algorithm. A comparison has been made amongst all of them and also with existing disc detection techniques. The bacterial foraging algorithm has shown the best results as it has obtained 99.55% accuracy with DiaRetDB1 database, 100% accuracy with HEI-MED database, 100% with DRIVE database and 98% with STARE database.
PubDate: 2018-10-01
DOI: 10.1007/s13319-018-0198-3
Issue No: Vol. 9, No. 4 (2018)

• Modeling and Optimization of Tool Wear and Surface Roughness in Turning of
Al/SiCp Using Response Surface Methodology
• Authors: Rashid Ali Laghari; Jianguang Li; Zhengyou Xie; Shu-qi Wang
Abstract: Nowadays metal matrix composites are widely utilized in major industries such as aerospace and automotive because of their excellent properties in association with non-reinforced. This research work is attempted to analyze the consequence of cutting parameters on tool life and surface quality. The experimental work is consist of turning Al/SiCp (45%SiCp) weight with uncoated Carbide tools and the effect of three machining parameters including depth of cut, feed, and speed. Tool life and surface roughness have considered as process response for investigation. The predictive model has been developing to optimize the machining parameters in accordance to Box–Behnken design in Minitab 17, the contour plots the surface plot and response optimizer have made to study the influence of machining parameters and their interactions. ANOVA was carried out to identify the key factor affecting the tool life and surface roughness. The maximum tool life is 10.511 (min) and least surface roughness was observed 0.044 μm. The abrasion and adhesive have the principle wear mechanism observed in machining process. Response surface methodology (RSM) approach have used to optimize the machining parameters, and the RSM model found more than 95% confidence level.
PubDate: 2018-09-24
DOI: 10.1007/s13319-018-0199-2
Issue No: Vol. 9, No. 4 (2018)

• Improvement of Large-Vehicle Detection and Monitoring on CPEC Route
• Authors: Muhammad Ibrar; Jianing Mi; Shahid Karim; Asif Ali Laghari; Shakir Muhammad Shaikh; Vishal Kumar
Abstract: Satellite imagery is being used to monitor agriculture fields, vehicle detection, surveillance and remote sensing. In this paper, we proposed large-vehicle detection to monitor the status on route of China Pakistan economic corridor (CPEC). In the present experiments, the region of interests extracted from more than thousand images through different angles to train machine for large-vehicle detection using RCNN, Fast-RCNN, Faster-RCCN and Cascade methods. The training images were enhanced through contrast change and image sharpening to avoid errors during detection of vehicles on route. Results show that the proposed method is promising for large-vehicle detection on CPEC route. The Faster-RCNN is more promising due to fast computational speed with high precision and recall rate. Furthermore, the developed dataset is also useful for future CPEC applications such as large-vehicles/trucks tracking, detection and identification. Graphical
PubDate: 2018-09-03
DOI: 10.1007/s13319-018-0196-5
Issue No: Vol. 9, No. 3 (2018)

• An Effective DOS Attack Detection Model in Cloud Using Artificial Bee
Colony Optimization
• Authors: Jitendra Kumar Seth; Satish Chandra
Abstract: Denial of service (DOS) attack is a serious threat in the cloud which causes unavailability of cloud services to genuine users. Firewalls alone are not able to detect DOS attack because of the dynamic nature of the attack and masked identity. This paper proposes a cloud-based DOS attack detection model (CDOSD) which is setup through key feature selection using a new binary version of Artificial bee colony optimization (BABCO) and decision tree (DT) classifier. The DT classifier is utilized because it has superior learning speed than other classification algorithms and BABCO is used for feature selection from the dataset. The real-time DOS attack tools are used to perform the attacks on cloud host. It has been observed that the CDOSD detects DOS attack on cloud host with high accuracy and a very low false positive rate. The features of the dataset are significantly reduced by BABCO which provides a low dimension of computation space for training and classification. The proposed scheme is also compared with the other existing models and found superior in performance. The proposed methodology may help the cloud service providers to design more secure cloud environment. Graphical
PubDate: 2018-09-03
DOI: 10.1007/s13319-018-0195-6
Issue No: Vol. 9, No. 3 (2018)

• Symmetric Cryptosystem Based on Chaos Structured Phase Masks and Equal
Modulus Decomposition Using Fractional Fourier Transform
• Authors: R. Girija; Hukum Singh
Abstract: Chaotic structured phase masks (CSPM), equal modulus decomposition (EMD) and fractional Fourier transform are potentially proposed to design the effective symmetric cryptosystem. The encryption and decryption process of our proposed system is completely established by using double random phase encoding (DRPE) in fractional Fourier domain. Frequently, random phase mask (RPM) are used routinely as secret key in most of the DRPE schemes. Nevertheless, RPM are not optimally robust against many attacks. Henceforth, this method utilises chaotic structured phase masks in the place of random phase masks (RPM). CSPM are assembled with the help of logistic map, Fresnel zone plates (FZP) and radial Hilbert mask (RHM) functions. To design an effectual trap door one-way function, equal modulus decomposition (EMD) is performed for encryption and decryption procedure of our cryptosystem. Various asymmetric cryptosystem was designed for EMD; but constructing EMD effectively in symmetric cryptosystem based on chaos structured phase masks and fractional Fourier transform is considered as a novel work and it is employed. As a result, the proposed symmetric cryptosystem attains high robust and withstand many attacks. Numerical simulations are exhibited in order to validate our system and support the fact that our EMD and CSPM based cryptosystem is extremely suitable for securing images.
PubDate: 2018-08-25
DOI: 10.1007/s13319-018-0192-9
Issue No: Vol. 9, No. 3 (2018)

• 3D Point Cloud Initial Registration Using Surface Curvature and SURF
Matching
• Authors: Lijing Tong; Xiang Ying
Abstract: Initial registration of the 3D point clouds affects the final reconstruction result directly. However, some of the current point cloud initial registration methods are mainly based on the spatial distribution characteristics of the point clouds, which have the problems of large calculation, low accuracy of registration, and so on. In this paper, a new initial registration method based on the combination of texture features and curvature features is proposed to improve the speed and accuracy of the initial registration. First, the texture information of the point cloud model is projected onto a two-dimensional space to obtain its projection image. Then, the matched point pairs of the projection image are extracted using the SURF operator. Next, the curvature information of the matched point pairs is calculated, and only the point pairs with higher similarity are reserved. Finally, the transformed matrix is calculated using the reserved point pairs to achieve the initial registration. Experimental results show that the proposed method can implement the initial registration quickly and accurately. Graphical
PubDate: 2018-08-22
DOI: 10.1007/s13319-018-0193-8
Issue No: Vol. 9, No. 3 (2018)

• Pixel Overlapping Image Steganography Using PVD and Modulus Function
• Authors: Aditya Kumar Sahu; Gandharba Swain
Abstract: This paper proposes an image steganography technique based on the principle of pixel overlapping to improve the embedding capacity (EC) and peak signal-to-noise ratio (PSNR). The proposed technique has two variants: (1) overlapped pixel value differencing with modulus function (OPVDMF), and (2) overlapped pixel value differencing (OPVD). Both the variants operate on pixel blocks of size 1 × 5. The OPVDMF uses the difference between the first four pixels with the 5th pixel for data embedding. Again the pixel adjustment is done to minimize the distortion. The OPVD method divides the block into four sub-blocks with 1st and 5th, 5th and 2nd, 3rd and 5th, 5th and 4th pixels. The proposed technique has been compared with the existing techniques in terms of PSNR, EC, bits per pixel, and execution time. Further, the security of the proposed technique has been verified using RS analysis. Graphical
PubDate: 2018-08-18
DOI: 10.1007/s13319-018-0188-5
Issue No: Vol. 9, No. 3 (2018)

• Impact of Video File Format on Quality of Experience (QoE) of Multimedia
Content
• Authors: Asif Ali Laghari; Hui He; Asiya Khan; Sajida Karim
Abstract: Video file formats are used to record, play and store videos according to heterogeneous platforms; devices and online streaming on networks vary by speed. Video formats are different codecs and resolution from each other and also vary in display quality and storage size which also differentiate the quality of experience (QoE) of users. This paper presents the subjective QoE of end user’s for different video file format varied according to resolution quality and bitrate. Videos of most popular formats which are used for online streaming was downloaded from YouTube and stored on the local system for play for subjects to perceive the video quality. Subjective QoE experiments were conducted by questionnaires given to subjects to perceive video quality and assign ratings. Results show high ratings for FLV 240P and WebM 360P for low resolution videos where high ratings for the MP4 video for 720P and 2160P high resolutions. Graphical
PubDate: 2018-08-17
DOI: 10.1007/s13319-018-0191-x
Issue No: Vol. 9, No. 3 (2018)

• Asymmetric Optical Image Triple Masking Encryption Based on Gyrator and
Fresnel Transforms to Remove Silhouette Problem
• Authors: Mehak Khurana; Hukum Singh
Abstract: An asymmetric scheme based on equal modulus decomposition (EMD) and singular value decomposition (SVD) encrypted using Fresnel and gyrator transform is proposed to enhance the security of the system and to make it free from silhouette problem. In this technique, it uses triple masking technique where double masking is done through random phase mask (diffusers) and the third masking is done through EMD using $$\theta$$ . After the triple masking the distorted obtained image is decomposed into segments (U, S, V) using SVD and each decomposed encrypted segment is transmitted through different channels and kept at different locations. The extra degree of freedom (keys) provided by triple making technique increases the key space hereby enhances the optical encryption security that makes it difficult for an attacker to find the exact key to recover an original image. It also makes it highly resistant to many conventional and iterative attacks. The robustness of the asymmetric proposed cryptosystem has been examined by simulating on MATLAB 8.3.0 (R2014a). The experimental results are provided to highlight the effectiveness, robustness and suitability of the proposed cryptosystem and to prove the feasibility and validity of the proposal.
PubDate: 2018-08-17
DOI: 10.1007/s13319-018-0190-y
Issue No: Vol. 9, No. 3 (2018)

• Detection of Choroidal Neovascularization Through Characterization of
Changes in Anterior and Posterior Eye Segments
• Authors: G. Anitha; Mohamed Ismail
Abstract: Choroidal neovascularization (CNV) is an age related eye disease caused due to the growth of new blood vessels beneath the retina which leads to vision loss. This is identified by analyzing the changes in the anterior segment such as filtration angle, which is one of the important parameters in ophthalmology and analyzing the posterior segment of the retinal image such as thickness of fusiform and commotion of blood vessels in Retinal Pigment Epithelium layer. Using image processing techniques, the Optical Coherence Tomography images of anterior and posterior eye segments are analyzed and the factors such as Angle opening distance, Euler number, thickness, angle of elevation and its maximum thickness value (in pixels) of the image are obtained. It is observed that there is a vast change in the above factors during CNV and thus it is possible to get knowledge whether the particular person is suffering from the disease or not. The factors obtained are fed to Neural Classifier which is used to show whether the person is in the starting stage or final stage of the disease. Graphical
PubDate: 2018-08-11
DOI: 10.1007/s13319-018-0189-4
Issue No: Vol. 9, No. 3 (2018)

• Mixed Finite Element Approximation for Bivariate Perona–Malik Model
Arising in 2D and 3D Image Denoising
• Authors: Amal Hjouji; Mostafa Jourhmane; Jaouad EL-Mekkaoui; Mohammed Es-sabry
Abstract: In this paper, we present a new model of nonlinear diffusion arising in image processing field based on the Perona–Malik equation which we call the bivariate Perona–Malik model. The aim of this model is to remove image noise while preserving edges, boundaries, and textures. To solve this model we use a new algorithm based on mixed finite element method. In this context we prove mathematically the existence and uniqueness of the solution of the proposed model in a well chosen space. At last, we present the experimental results in 2D and 3D images filtering, which demonstrate the efficiency and effectiveness of our algorithm and finally, we compare it with other well known methods such as the finite difference method presented by Perona et al. (IEEE Trans Pattern Anal Mach Intell 12:629–639, 1990), the finite element method and the finite volume method studied by Handlovičová et al. (J Vis Commun Image Represent 13:217–237, 2002).
PubDate: 2018-08-02
DOI: 10.1007/s13319-018-0187-6
Issue No: Vol. 9, No. 3 (2018)

• A Mamdani Fuzzy Logic System to Enhance Solar Cell Micro-Cracks Image
Processing
• Authors: Rashmi Chawla; Poonam Singal; Amit Kumar Garg
Abstract: Micro-cracks in solar Photo-Voltaic Cells (PVCs) can be formed in the vicinity of PVC/wafer manufacturing process or by thermal stress produced in transportation/handling or by inclement weather condition. Its insight is must as it reduces the efficiency of PVCs, enfeeble the cell constitution as well as affect the net manufactured production yield resulting in increase in production cost. The detection of these micro-cracks is strenuous owing to wafer’s heterogeneous textured base and involves two steps; first visualization of micro-cracks to imaging device, second efficient image processing technique to extract these micro-cracks from the captured image. In this paper Mamdani Fuzzy logic is proposed for extracting micro-cracks from solar PVCs images and comparison of performance analysis is done using MATLAB. The results show that using the proposed strategy, micro cracks visibility is much more prominent than its counterparts present in literature. To access local and remote output current data of solar panel the Internet of Things accreditation is done using Arduino and WiFi module.
PubDate: 2018-07-27
DOI: 10.1007/s13319-018-0186-7
Issue No: Vol. 9, No. 3 (2018)

• Automatic Depth Prediction from 2D Videos Based on Non-parametric Learning
and Bi-directional Depth Propagation
• Authors: Huihui Xu; Mingyan Jiang
Abstract: With progress in 3D video technology, 2D to 3D conversion has drawn great attention in recent years. Predicting perceptually reasonable depth information from traditional monocular videos is a challenging task in 2D to 3D conversion. For the purpose of generating convincing depth maps, an efficient depth estimation algorithm utilizing non-parametric learning and bi-directional depth propagation is proposed. First, global depth maps on key frames are generated on the basis of gradient samples and the gradient reconstruction method. Then, foreground objects are extracted and employed to refine global depth maps for producing more local depth details. Next, the depth information of key frames is propagated utilizing bi-directional motion compensation to recover the forward and backward depth information of non-key frames. In the end, a weighting fusion strategy is designed to integrate forward and backward depths for predicting the depth information of each non-key frame. The quality of estimated depth maps is assessed by leveraging objective and subjective quality evaluation criteria. The experimental results verify that the proposed depth prediction framework outperforms some depth estimation methods and is efficient at producing 3D views.
PubDate: 2018-07-27
DOI: 10.1007/s13319-018-0184-9
Issue No: Vol. 9, No. 3 (2018)

• An Efficient Stereo Matching Algorithm Based on Four-Moded Census
Transform for High-Resolution Images
• Authors: Yizhong Yang; Dong Xu; Shen Rong; Guangjun Xie; Feng Chen
Abstract: By establishing slanted surfaces, PatchMatch stereo (PMS) algorithm can achieve impressive disparity details and high sub-pixel precision. However, it is too unwieldy for practical calculations in handling images with high resolution. In this paper, we improved the PMS algorithm to efficiently handle the high-resolution images. Firstly, four-mode census transform, which can improve matching accuracy and solve the problem of the center pixel distortion effectively, is applied to measure the dissimilarity between pixels, instead of the absolute differences of the gray-value and the gray-value gradient. Utilizing this transform can halve the time of dissimilarity measurement compared to that of PMS. Then, the proposed algorithm adopt the integer disparity plane approximation strategy during the PatchMatch inference procedure. This strategy is applied in the random initialization step, the computation of the matching cost and the process of searching and renewing the minimum matching cost. Finally, the outlier pixels are refined with the post-process steps. Experimental results show that the proposed algorithm is more efficient than the PMS algorithm and generates comparable disparity maps in handling the high-resolution images. Graphical
PubDate: 2018-07-27
DOI: 10.1007/s13319-018-0185-8
Issue No: Vol. 9, No. 3 (2018)

• Software Architectural Quality Assessment Model for Security Analysis
Using Fuzzy Analytical Hierarchy Process (FAHP) Method
• Authors: Udaya Dayanandan; Vivekanandan Kalimuthu
Abstract: In the last decade, the greater need for quality software led to the development of quality assessment especially at the software architecture (SA) level. Since software security is an important quality attribute, several models have been evolved to validate the security related issues at the SA level. This paper proposes a Fuzzy Analytical Hierarchy Process (FAHP) with Buckley method for security assessment at the SA level for object-oriented design. FAHP is a Multi-Criteria Decision Making approach which employs linguistic variables as a pair-wise comparison matrix to derive priorities of various selection attributes and sub-attributes. In addition, the proposed work uses genetic algorithm to fill the missing values in the comparison matrix of FAHP. The validation of FAHP model takes place by the use of four versions of apache Tomcat series namely TC 7.0.6, TC 7.0.22, TC 7.0.39 and TC 7.0.47. The obtained results ensure that the proposed FAHP model with Buckley method performs well than existing methods in terms of security index to measure the performance at the SA level and defect density ratio to validate the results. Graphical
PubDate: 2018-07-23
DOI: 10.1007/s13319-018-0183-x
Issue No: Vol. 9, No. 3 (2018)

• Multi-objective Test Case Prioritization Using Improved Pareto-Optimal
Clonal Selection Algorithm
• Authors: Megala Tulasiraman; Nivethitha Vivekanandan; Vivekanandan Kalimuthu
Abstract: Regression test plays a vital role in software testing by ensuring the quality and stability of the developed software. During regression test a large number of test cases are involved thus making the process expensive and difficult. In order to reduce the cost and time of regression test, test case prioritization is applied. However in real world scenario multiple testing criteria and constraint are evolved, such as to detect all faults within minimum time, and to detect most severe faults earlier. This takes the test case prioritization problem turn into multi-objective test case prioritization paradigm. In this paper an improved pareto-optimal clonal selection algorithm is proposed to generate test case order depending on three objective such as minimum execution time, maximum severity fault identification and cost-cognizant average percentage of fault detected. The experimental analysis is conducted over an industrial project with seven different versions for which the proposed approach generates scheduled test case order. And it is concluded that the performance of proposed approach is better than other tested algorithms like random approach, weighted genetic algorithm, greedy and NSGA-II. Graphical
PubDate: 2018-07-23
DOI: 10.1007/s13319-018-0182-y
Issue No: Vol. 9, No. 3 (2018)

• Watermarking Techniques for Three Dimensional (3D) Mesh Authentication in
Spatial Domain
• Abstract: Due to lightning growth in multimedia processing technologies and frequent usage of Internet, media contents often get exposed to malicious interventions. Hence it is very important to verify the authenticity and integrity of the digital contents by using proper security mechanisms. Thanks to the advancement in computer graphics processing technologies due to which higher dimensional rendering of real life objects has become apparent. Lately, three dimensional (3D) representations are more preferred in different application domains for better visualization and understanding. While talking about security related to 3D models, digital watermarking has come out to be an effective and prominent solution among various other authentication mechanisms. The purpose of this study is to present an in-depth review and investigation of the authentication based watermarking techniques for 3D models in spatial domain. The methods are classified based on various attributes that effect the design and working of an authentication protocol. The study also discusses different types of geometrical attacks that may occur to a 3D model and methodologies that help in detecting and locating the attacks. The paper concludes with a set of remarks and some of the research issues and challenges which are needed to be studied further.
PubDate: 2018-08-28
DOI: 10.1007/s13319-018-0194-7

JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327

Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs