Search Results - Web observers Programming.

Search alternatives:

Refine Results
  1. 41

    Research methods for public administrators by Johnson, Gail, 1947-

    Published 2002
    Table of Contents: “…GUIDELINES FOR WRITING AN EXECUTIVE SUMMARY -- GUIDELINES FOR FORMATTING THE REPORT -- GUIDELINES FOR USING CHARTS AND TABLES -- GUIDELINES FOR PRESENTATIONS -- Appendix F Resources -- WEB SITES: -- Index -- About the Author.…”
    Full text (MFA users only)
    Electronic eBook
  2. 42
  3. 43
  4. 44

    Contemporary Chinese discourse and social practice in China

    Published 2015
    Table of Contents: “…Popular Spring Festival Gala language: Sociocultural observations -- Background -- A short history of the Spring Festival Gala -- Studies on PSFGEs -- Methodology -- Rationale -- Findings -- Discussion -- The characteristics of PSFGE -- Implications -- Conclusion -- Acknowledgment -- References -- Chapter 12. …”
    Full text (MFA users only)
    Electronic eBook
  5. 45
  6. 46
  7. 47

    Health and the Developing World by Bryant, John H., 1925-2017

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  8. 48

    Critical Properties of Phi4- Theories. by Schulte-Frohlinde, Verena

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  9. 49
  10. 50

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…Sethuramalingam and Abdul Munaf -- 9.1 Introduction 156 -- 9.2 Inspection System for Defect Detection 158 -- 9.3 Defect Recognition Methodology 162 -- 9.4 Health Care MGPS Inspection 165 -- 9.5 Conclusion 168 -- References 169 -- 10 Fuzzy Approach for Designing Security Framework 173 Kapil Chauhan -- 10.1 Introduction 173 -- 10.2 Fuzzy Set 177 -- 10.3 Planning for a Rule-Based Expert System for Cyber Security 185 -- 10.3.1 Level 1: Defining Cyber Security Expert System Variables 185 -- 10.3.2 Level 2: Information Gathering for Cyber Terrorism 185 -- 10.3.3 Level 3: System Design 186 -- 10.3.4 Level 4: Rule-Based Model 187 -- 10.4 Digital Security 188 -- 10.4.1 Cyber-Threats 188 -- 10.4.2 Cyber Fault 188 -- 10.4.3 Different Types of Security Services 189 -- 10.5 Improvement of Cyber Security System (Advance) 190 -- 10.5.1 Structure 190 -- 10.5.2 Cyber Terrorism for Information/Data Collection 191 -- 10.6 Conclusions 191 -- References 192 -- 11 Threat Analysis Using Data Mining Technique 197 Riddhi Panchal and Binod Kumar -- 11.1 Introduction 198 -- 11.2 Related Work 199 -- 11.3 Data Mining Methods in Favor of Cyber-Attack Detection 201 -- 11.4 Process of Cyber-Attack Detection Based on Data Mining 204 -- 11.5 Conclusion 205 -- References 205 -- 12 Intrusion Detection Using Data Mining 209 Astha Parihar and Pramod Singh Rathore -- 12.1 Introduction 209 -- 12.2 Essential Concept 210 -- 12.2.1 Intrusion Detection System 211 -- 12.2.2 Categorization of IDS 212 -- 12.2.2.1 Web Intrusion Detection System (WIDS) 213 -- 12.2.2.2 Host Intrusion Detection System (HIDS) 214 -- 12.2.2.3 Custom-Based Intrusion Detection System (CIDS) 215 -- 12.2.2.4 Application Protocol-Based Intrusion Detection System (APIDS) 215 -- 12.2.2.5 Hybrid Intrusion Detection System 216 -- 12.3 Detection Program 216 -- 12.3.1 Misuse Detection 217 -- 12.3.1.1 Expert System 217 -- 12.3.1.2 Stamp Analysis 218 -- 12.3.1.3 Data Mining 220 -- 12.4 Decision Tree 221 -- 12.4.1 Classification and Regression Tree (CART) 222 -- 12.4.2 Iterative Dichotomise 3 (ID3) 222 -- 12.4.3 C 4.5 223 -- 12.5 Data Mining Model for Detecting the Attacks 223 -- 12.5.1 Framework of the Technique 224 -- 12.6 Conclusion 226 -- References 226 -- 13 A Maize Crop Yield Optimization and Healthcare Monitoring Framework Using Firefly Algorithm through IoT 229 S K Rajesh Kanna, V. …”
    Full text (MFA users only)
    Electronic eBook
  11. 51

    Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now

    Published 2005
    Full text (MFA users only)
    Electronic Conference Proceeding eBook