ei ole lubatud
ei ole lubatud
Digitaalõiguste kaitse (DRM)
Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).
Vajalik tarkvara
Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)
PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )
Seda e-raamatut ei saa lugeda Amazon Kindle's.
.- Information System.
.- Localization in WSNs Based On Machine Learning Approach.
.- Improved Clustering-Based Feature Selection Using Feature Extraction Based On Principal Component Analysis.
.- Computing Methodologies.
.- Real-Time Arabic Speech Recognition from Lips Movement Based On Deep Learning.
.- Parkinson's Disease Prediction and Progression Based On Voice Analysis: A Literature Survey.
.- BGWO-Based Classification of Parkinson's Disease Via MEG Signnals.
.- Enhancing Twitter Comment Classification Using Convolutional Neural Networks and Support Vector Machines.
.- High-Stakes Deception Detection Leveraging 3D Facial Landmarks.
.- Enhancement of Low Light Images Using Residual Deep Learning.
.- Hybrid Model for Hospital Services Quality Prediction Based On Patient Viewpoint.
.- Security and privacy.
.- Advanced Text Vectorization and Deep Learning Models for Enhanced Fake News Detection On Social Media.
.- Utilizing Graph Neural Networks for The Detection of Fake News Through Analysis of Relationships Among Various Social Media Entities.
.- Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach.
.- Hybrid Multimodal Biometric Identification System: Integrating Face and Palmprint Traits Through Feature-Level Fusion.
.- Improving Machine Learning-Based Intrusion Detection Systems: A Comparative Study On NSL-KDD Dataset.
.- Enhancing Penetration Testing: Leveraging Machine Learning for Ethical Hacking.