Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- RELIGION 118
- Historia 101
- Religion 58
- Documentales 47
- Historia y crítica 43
- History 38
- Crítica e interpretación 36
- African Americans 30
- United States 30
- Literatura norteamericana 28
- Novela norteamericana 26
- Black people 25
- SOCIAL SCIENCE 24
- Història 22
- Iglesia católica 22
- Bible 21
- Christianity 21
- Películas cinematográficas 19
- Religion and sociology 19
- FICTION 18
- Theology 18
- En la literatura 17
- Race relations 17
- Social Sciences 17
- Teología dogmática 17
- Filosofía 16
- Iglesia Luterana 16
- Sociology of Religion 16
- Afronorteamericanos 15
- Biblia 15
-
2521por Rawat, RomilTabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence -- 1.1 Introduction -- 1.2 Aim of the Study -- 1.3 Architecture of Cloud Computing -- 1.4 The Impact of Cloud Computing on Business -- 1.5 The Benefits of Cloud Computing on Business -- 1.6 Generic Security Protocol Features -- 1.7 Cloud Computing Security Protocol Design -- 1.7.1 Protocol for File Transfer (FTP) -- 1.7.2 Local User Authentication Protocol (LUAP) -- 1.7.3 Protocol for Consumption -- 1.7.4 Remote User Authentication Protocol -- 1.7.5 Secure Cloud Transmission Protocol -- 1.7.6 Protocol for Cloud Trust -- 1.7.7 Protocol for Secure Single-Sign-On -- 1.7.8 Secure Session Protocol (SSP) -- 1.7.9 Protocol for Authorization -- 1.7.10 Protocol for Key Management -- 1.8 AI Based Cloud Security -- 1.8.1 Event Detection and Prevention -- 1.8.2 Delegate to Automated Technology -- 1.8.3 Machine Learning Algorithms in Cloud Computing -- 1.9 Various Neuronal Network Architectures and Their Types -- 1.10 Conclusion -- Acknowledgement -- References -- Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space -- 2.1 Introduction -- 2.2 Aim of the Study -- 2.3 Motivation for the Study -- 2.4 Detecting the Dark Web -- 2.5 Preventing the Dark Web -- 2.6 Recommendations -- 2.7 Conclusion -- Acknowledgement -- References -- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning -- 3.1 Introduction -- 3.2 Aim of the Study -- 3.3 Motivation for the Study -- 3.4 Nature of LASERS -- 3.5 Ongoing Laser Weapon Projects -- 3.6 Directed Energy Weapons (DEWs) -- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements -- 3.8 Methodology…”
Publicado 2023
Libro electrónico -
2522Publicado 2023Libro electrónico
-
2523
-
2524
-
2525Publicado 2017“…After all this you'll make your code reproducible with LaTeX, RMarkdown, and Shiny. By the time you're done, you won't just know how to write R programs, you'll be ready to tackle the statistical problems you care about most. …”
Libro electrónico