-
Impact of social networking sites on learning
Ingram 出版Social networking sites have had a significant impact on learning over the past decade. While there
-
Crypto stego protecting digital secrets
Self Publish 出版Crypto steganography (often simply called "stego") is a technique for concealing secret digital inf
-
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Intechopen 出版In the modern era of digitization, cryptographic techniques are becoming increasingly important. Th
-
Crypto techniques for secure data distribution
Self Publish 出版Cryptographic techniques are essential for secure data distribution, especially when sensitive info
-
Formalization of Knowledge Centric Paradigms for Diversification of Web Search Encompassing Semantic Artificial Intelligence
Owing to the current structure of the intermediate Web which is transforming from a conventional We
-
-
Performance Based Comparative Assessment of Different Security Tools for Web Application
Ingram 出版Technology has been progressively making a substantial positive influence on social life. If we see
-
Fault Diagnosis in Wireless Sensor Networks using Artificial Immune System
Ingram 出版: LUHOHVV VHQVRU QHWZRUNV:61V KDYH EHFRPH SRSXODU ZRUOGZLGH GXH WR WKHLU ZLGH UDQJH RI DSSOLFDWLRQV
-
Get Rich or Lie Trying
"Compelling." --Reni Eddo-Lodge, author, Why I'm No Longer Talking to White People About Race Disco
-
Amazon Web Services in Action, Third Edition
Master essential best practices for deploying and managing applications on Amazon Web Services. Thi
-
CellCluster
CellCluster is another alternative to the current techniques of data parallel processing, without i
-
-
Machine Learning For Humans
Ingram 出版Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
The Intersection of Artificial and Multiple Intelligence
Ingram 出版The Intersection of Artificial and Multiple Intelligence" is an insightful book that provides a com
-
The Power of Principles
Ingram 出版Recent scandals rocking the American business community have demonstrated the vital relevance of et
-
-
-
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems
Ingram 出版With a business baseline focused on the impact of embedded systems in the years ahead, the book inv
-
How Social Media Shapes Tourist Preferences
Ingram 出版The purpose of the present study is to investigate the influence of contextual factors that predict
-
The Role of Social Media in IT and ITES Talent Acquisition
Tanvi Singh 出版The chapter aims to provide an introduction to the topic of the research and assessing the signific
-
Mitigation of Load Balancing for Cloud Using Ant Colony Optimization
Ingram 出版This book contains the Introduction to Cloud computing, the services provided by the cloud and the
-
Evading Edr
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the
-
Cross Platform Application Development
Ingram 出版Cross-platform applications are characterized by being created with a single programming language t
-
Method for handling incidents in telecommunications systems
Currently, computer networks in the corporate environment have systems and equipment essential to t
-
Deconstructing Socio-Political Dynamics
Social media's penetration was visible as most of the youth got attracted to forums like Facebook,
-
Behavior-based Authentication to Protect System Services From Malicious Attacks
Behavior-based authentication is a relatively new approach that has gained traction in recent years
-
A Study on the Social Media Marketing Strategies of Political Parties
Ingram 出版"A Study on the Social Media Marketing Strategies of Political Parties" by Shubham Saxena is a comp
-
Empowering the Next Generation
Ingram 出版A Democratic society is the one, where the citizens elect their representatives and give them the p
-
Concept Map Generation from Domain Text Using Machine Learning and Deep Learning Techniques
The generation of concept maps from domain text using machine learning and deep learning techniques
-
Password Logbook (Black & Gold)
Ingram 出版Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed noteb
-
Managing the Buffer Overflow Attack in Network and Operating System Detecting and Preventing Techniques
A thorough manual that addresses buffer overflow assaults is "Managing the Buffer Overflow Attack i
-
Artificial Intelligence-Based Performance Evaluation of Routing in Manet
J. Rangaraj's comprehensive manual "Artificial Intelligence-Based Evaluation of Routing in MANET" a
-
A-Z Password Book
Ingram 出版This large-format, alphabetized password book is organized by tabs per letter, making it easy, fast
-
A Framework for User Interface and User Experience of Web-Based Application
Ingram 出版Naveen Kumar's "A Framework for User Interface and User Experience of Web-Based Application" is a t
-
A Proactive Network Surveillance Framework
Network security paradigm should be the one that permeates the enterprise, including people, proces
-
Developing Web Components with Svelte
Apress 出版Leverage the power of Svelte to quickly produce the foundations of a framework-agnostic component l
-
Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media
Researchers developed the Racist and Violent Extremist Flock (RVE-Flock) tool to explore and analyz
-
Sentiment and Affect Analysis on Social Media
Srishti 出版Sentiment Analysis is the newest buzzword these days owing to its immense potential to provide real
-
A Framework for Online Geographical Analysis With Geo Tagged Photos and Events on Twitter
Nowadays, social media mining has become a very important part of modern telecommunication systems.
-
Frameworkless Front-End Development
Apress 出版Explore an alternative method of front-end application development without using frameworks or thir
-
Cloud Computing
Ingram 出版Cloud computing is the delivery of different services through the Internet. These resources include
-
Cloud Computing
Ingram 出版Cloud computing is the process of delivering computing services that include storage, database, ser
-
Free Stuff & Good Deals on the Internet
Santa Monica 出版The completely revised 3rd edition of Free Stuff & Good Deals for Folks over 50 features goods and
-
-
Mastodon for Dummies
For Dummies 出版A little birdy told us you needed to know more about Mastodon Ready to escape the drama of existi
-
Web Page Recommendation Based on Web Usage with the Aid of Mining and Artificial Intelligence
he aim of this research is dual: first, to present an overview of recently proposed make interactio
-
Efficient Similarity Search Techniques for Textual and NonTextual Datasets
Viney 出版In today's information overloaded world, data has become the epicentre of the entire research. Text
-
Performance Optimization of Web Crawler
Kavita Goel 出版Optimizing performance of crawler is the requirement in the area of crawling and searching. As web