114 results on '"Jenkins, Paul"'
Search Results
2. AI Financial Adviser Performance and Monitoring of AI Derived Stocks
3. A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN
4. An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges
5. Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service (DDoS) Attacks
6. Challenges in Implementing Artificial Intelligence on the Raspberry Pi 4, 5 and 5 with AI HAT
7. Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack
8. Analysing Cyberattacks Using Attack Tree and Fuzzy Rules
9. Privacy and Security Landscape of Metaverse
10. Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack
11. A Capital in History: Widening the Temporal and Physical Context of Maputo
12. Learning Agile Scrum Methodology Using the Groupware Tool Trello Through Collaborative Working
13. Contextualization at Micro-Level
14. Key Issues Arising
15. Queries and a Proposal
16. Integrated Findings
17. Life Stories
18. Contextualization at Macro-Level
19. Contextualization at Meso-Level
20. The Intellectual Approach of the Book
21. The Aims and Objectives of the Book
22. Biology and Management of Grape Berry Moth in North American Vineyard Ecosystems
23. How Many Transcripts Does It Take to Reconstruct the Splice Graph?
24. Image of the City in Mozambique: Civilization, Parasite, Engine of Growth or Place of Opportunity?
25. World Wide Web - future uses
26. Inflation in North America
27. Link Prediction in Stochastic Online Social Network Using Machine Learning Algorithm
28. Comparative Analysis of Community Detection Methods for Online Learning Environments
29. Explainability and Transparency in Designing Responsible AI Applications in the Enterprise
30. Feature Extraction Methods in Alzheimer’s Disease: A Comparative Assessment
31. Higher Education Students Performance and Feature Analysis Using Classification Models Based on Blended Learning Data
32. Exploring U-Net, FCN, SegNet, PSPNet, Mask R-CNN and Using DeepLabV3+ for Multiclass Semantic Segmentation on Satellite Images of Western Ghats
33. Experimental Demonstration for Learning Analytics and Data Mining on e-assessment
34. A Decision Tree Approach for Identifying Indian Penal Code Sections Across Different Crime Aspects
35. Applications of AI Chatbots Based on Generative AI, Large Language Models and Large Multimodal Models
36. Rise of Federated Learning to Real-World Applications
37. Handling Overfitting and Imbalance Data in Modelling Convolutional Neural Networks for Astronomical Transient Discovery
38. Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection
39. Leveraging the Use of ChatGPT: Exploring Its Real-World Applications Including Their Related Ethical and Regulatory Considerations
40. Threat Modelling in Virtual Assistant Hub Devices
41. DAN: Deep Neural Network-Based Application Mapping for Optimized Network-on-Chip Design
42. Information Communication Technology (ICT) Tools for Online Learning Environments (OLE) Towards Quality Higher Education with NEP-2020
43. Information Security Primitives Automatic Variable Key Approaches and Cryptic Mining
44. Cyber Attacks and Review of Recent Data Breach Incidents Their Trends and Measures
45. Prompt Engineering for Personalized Assessment and Formative Assessment in Technical Education
46. Investigating the Benefits and Barriers of Using AI Chatbots in Education
47. Is ChatGPT Effective or Disruptive in Education?
48. Towards an IoT-Enabled Support System for Water Management Control, with a Focus on Storm, Drainage, and Sewage Systems
49. An Empirical Study on Insider Threats Towards Crime Prevention Through Environmental Design (CPTED) : A Student Case Study
50. Methods to Improve API Performance in PHP Programming Language
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.