Search Results - Web observers Programming.
Suggested Topics within your search.
Suggested Topics within your search.
- Research 8
- Application software 6
- Development 5
- Data processing 4
- JavaScript (Computer program language) 4
- Methodology 4
- PHP (Computer program language) 3
- Public health 3
- Web site development 3
- Computer security 2
- Design 2
- Discourse analysis 2
- Ecology 2
- Internet 2
- Language and languages 2
- Management 2
- Programming 2
- Sociolinguistics 2
- Technological innovations 2
- Telemedicine 2
- Virtual reality in medicine 2
- Web applications 2
- Web sites 2
- sociolinguistics 2
- Accounting 1
- Anxiety 1
- Applied anthropology 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Auditing 1
Search alternatives:
- observers »
-
41
Research methods for public administrators
Published 2002Table of Contents: “…GUIDELINES FOR WRITING AN EXECUTIVE SUMMARY -- GUIDELINES FOR FORMATTING THE REPORT -- GUIDELINES FOR USING CHARTS AND TABLES -- GUIDELINES FOR PRESENTATIONS -- Appendix F Resources -- WEB SITES: -- Index -- About the Author.…”
Full text (MFA users only)
Electronic eBook -
42
How to be a quantitative ecologist : the 'A to R' of green mathematics and statistics
Published 2011Full text (MFA users only)
Electronic eBook -
43
The ecology of place : contributions of place-based research to ecological understanding
Published 2010Full text (MFA users only)
Electronic eBook -
44
Contemporary Chinese discourse and social practice in China
Published 2015Table of Contents: “…Popular Spring Festival Gala language: Sociocultural observations -- Background -- A short history of the Spring Festival Gala -- Studies on PSFGEs -- Methodology -- Rationale -- Findings -- Discussion -- The characteristics of PSFGE -- Implications -- Conclusion -- Acknowledgment -- References -- Chapter 12. …”
Full text (MFA users only)
Electronic eBook -
45
Qualitative Methods in Public Health : A Field Guide for Applied Research.
Published 2016Full text (MFA users only)
Electronic eBook -
46
Advanced data structures : theory and applications
Published 2020Full text (MFA users only)
Electronic eBook -
47
-
48
-
49
Rapid ethnographic assessments : a practical approach and toolkit for collaborative community research
Published 2020Full text (MFA users only)
Electronic eBook -
50
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…Sethuramalingam and Abdul Munaf -- 9.1 Introduction 156 -- 9.2 Inspection System for Defect Detection 158 -- 9.3 Defect Recognition Methodology 162 -- 9.4 Health Care MGPS Inspection 165 -- 9.5 Conclusion 168 -- References 169 -- 10 Fuzzy Approach for Designing Security Framework 173 Kapil Chauhan -- 10.1 Introduction 173 -- 10.2 Fuzzy Set 177 -- 10.3 Planning for a Rule-Based Expert System for Cyber Security 185 -- 10.3.1 Level 1: Defining Cyber Security Expert System Variables 185 -- 10.3.2 Level 2: Information Gathering for Cyber Terrorism 185 -- 10.3.3 Level 3: System Design 186 -- 10.3.4 Level 4: Rule-Based Model 187 -- 10.4 Digital Security 188 -- 10.4.1 Cyber-Threats 188 -- 10.4.2 Cyber Fault 188 -- 10.4.3 Different Types of Security Services 189 -- 10.5 Improvement of Cyber Security System (Advance) 190 -- 10.5.1 Structure 190 -- 10.5.2 Cyber Terrorism for Information/Data Collection 191 -- 10.6 Conclusions 191 -- References 192 -- 11 Threat Analysis Using Data Mining Technique 197 Riddhi Panchal and Binod Kumar -- 11.1 Introduction 198 -- 11.2 Related Work 199 -- 11.3 Data Mining Methods in Favor of Cyber-Attack Detection 201 -- 11.4 Process of Cyber-Attack Detection Based on Data Mining 204 -- 11.5 Conclusion 205 -- References 205 -- 12 Intrusion Detection Using Data Mining 209 Astha Parihar and Pramod Singh Rathore -- 12.1 Introduction 209 -- 12.2 Essential Concept 210 -- 12.2.1 Intrusion Detection System 211 -- 12.2.2 Categorization of IDS 212 -- 12.2.2.1 Web Intrusion Detection System (WIDS) 213 -- 12.2.2.2 Host Intrusion Detection System (HIDS) 214 -- 12.2.2.3 Custom-Based Intrusion Detection System (CIDS) 215 -- 12.2.2.4 Application Protocol-Based Intrusion Detection System (APIDS) 215 -- 12.2.2.5 Hybrid Intrusion Detection System 216 -- 12.3 Detection Program 216 -- 12.3.1 Misuse Detection 217 -- 12.3.1.1 Expert System 217 -- 12.3.1.2 Stamp Analysis 218 -- 12.3.1.3 Data Mining 220 -- 12.4 Decision Tree 221 -- 12.4.1 Classification and Regression Tree (CART) 222 -- 12.4.2 Iterative Dichotomise 3 (ID3) 222 -- 12.4.3 C 4.5 223 -- 12.5 Data Mining Model for Detecting the Attacks 223 -- 12.5.1 Framework of the Technique 224 -- 12.6 Conclusion 226 -- References 226 -- 13 A Maize Crop Yield Optimization and Healthcare Monitoring Framework Using Firefly Algorithm through IoT 229 S K Rajesh Kanna, V. …”
Full text (MFA users only)
Electronic eBook -
51
Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now
Published 2005Full text (MFA users only)
Electronic Conference Proceeding eBook