ei ole lubatud
ei ole lubatud
Digitaalõiguste kaitse (DRM)
Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).
Vajalik tarkvara
Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)
PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )
Seda e-raamatut ei saa lugeda Amazon Kindle's.
Assessment of a Small Scale WMN for Different Number of Mesh Routers and Subway Distribution of Mesh Clients Considering Blend and Simplex Crossovers.- Enhancing Real-Time IoT Applications: Latency Reduction Techniques in 5G MIMO Networks.- A Fuzzy-based System for Handover in 5G/B5G Wireless Networks: Effect of Slice Active Time on Handover Decision.- A Modified Energy-Aware PRoPHET DTN Routing Protocol for Low-Energy Networks.- Multi-Link/Multi-AP Coordination based Joint Transmission for Seamless Roaming in IEEE 802.11 bn (Wi-Fi 8).- Electric Power Transportation System on Battery Swapping EV for Emergency Power Supply while Reducing User Overhead.- Design and Evaluation of the Network-Based Fog Computing (NBFC) Model for Linear.- Applications of Sensor Data.- Development of a Framework for Web-based Collaborative VR Tours Using 360VR Images/Videos.- Hacking Using Social Engineering Detection and Prevention Methods.- Securing FSK-based Paging System using Format Preserving Encryption (FPE).- Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.- Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.- An Isolation Forest Model for Anomaly Detection in IoT Networks using Directional Graphs.- Federated Virtual Sensors for IoT: Applying Machine Learning Algorithms through Federated Averaging and Distributed Intelligence.- Polymorphic Keys in Multi-Secret Cryptography.