No. | DAFTAR JUDUL E-JOURNAL STIKI MALANG | Link |
---|---|---|
481. | Human Compatible: Artificial Intelligence and the Problem of Control | Download |
482. | Learning Analytics for Investigating the Mind Map-Guided AI Chatbot Approach in an EFL Flipped Speaking Classroom | Download |
483. | Methodology for Computer Security Incident Response Teams into IoT Strategy | Download |
484. | Modeling the Effect of Spending on Cyber Security by Using Surplus Process | Download |
485. | Operational Risk Management Using Multi-Criteria Assessment (AHP Model) | Download |
486. | Predicting rice diseases across diverse agro-meteorological conditions using an artificial intelligence approach | Download |
487. | Risk Management for New Products | Download |
488. | Risk Management in Prototyping Phase | Download |
489. | Risk Management in View of the Product Lifecycle | Download |
490. | Security Measurements of Cyber Networks | Download |
491. | Using a prediction model to manage cyber security threats | Download |
492. | Virtual Lab for Online Cyber Security Education | Download |
493. | Predicting fracture outcomes from clinical registry data using artificial intelligence supplemented models for evidence-informed treatment (PRAISE) study protocol | Download |
494. | Artificial intelligence on COVID-19 pneumonia detection using chest xray images | Download |
495. | Bringing artificial intelligence to asset-performance management | Download |
496. | Mapping technological innovation dynamics in artificial intelligence domains: Evidence from a global patent analysis | Download |
497. | Artificial intelligence in orthopaedics: A scoping review | Download |
498. | The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities | Download |
499. | Using a prediction model to manage cyber security threats | Download |
500. | Cyber security: retaining the power | Download |