-
-
-
-
-
An Efficient Vertical Handoff Decision Scheme
Ingram 出版The next generation wireless networks are expected to support different applications within a heter
-
Introduction To Cyber Forensics & Investigation
Ingram 出版In the civil and criminal justice systems, computer forensics helps ensure the integrity of digital
-
-
3D Reconstruction with Deep Learning
3D Reconstruction with Deep Learning" by Rocher is a comprehensive guide to the field of 3D reconst
-
-
-
Computer Science for Kids
Wiley 出版A kid-friendly and rigorous new way to teach young readers the fundamentals of computer science In
-
-
Crypto stego protecting digital secrets
Self Publish 出版Crypto steganography (often simply called "stego") is a technique for concealing secret digital inf
-
-
-
-
-
-
-
Get Rich or Lie Trying
Ingram 出版"Compelling." --Reni Eddo-Lodge, author, Why I'm No Longer Talking to White People About Race Disco
-
Amazon Web Services in Action, Third Edition
Master essential best practices for deploying and managing applications on Amazon Web Services. Thi
-
-
-
-
-
-
-
-
The Role of Social Media in IT and ITES Talent Acquisition
Tanvi Singh 出版The chapter aims to provide an introduction to the topic of the research and assessing the signific
-
-
-
-
-
-
Behavior-based Authentication to Protect System Services From Malicious Attacks
Behavior-based authentication is a relatively new approach that has gained traction in recent years
-
A Study on the Social Media Marketing Strategies of Political Parties
Ingram 出版"A Study on the Social Media Marketing Strategies of Political Parties" by Shubham Saxena is a comp
-
Empowering the Next Generation
Ingram 出版A Democratic society is the one, where the citizens elect their representatives and give them the p
-
Concept Map Generation from Domain Text Using Machine Learning and Deep Learning Techniques
The generation of concept maps from domain text using machine learning and deep learning techniques
-
-
Managing the Buffer Overflow Attack in Network and Operating System Detecting and Preventing Techniques
A thorough manual that addresses buffer overflow assaults is "Managing the Buffer Overflow Attack i
-
Artificial Intelligence-Based Performance Evaluation of Routing in Manet
J. Rangaraj's comprehensive manual "Artificial Intelligence-Based Evaluation of Routing in MANET" a
-
-
-
-
-
-
Sentiment and Affect Analysis on Social Media
Srishti 出版Sentiment Analysis is the newest buzzword these days owing to its immense potential to provide real
-