Results for ' Computational efficiency'

957 found
Order:
  1.  56
    A Comprehensive Evaluation and Methodology on Enhancing Computational Efficiency through Accelerated Computing.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):517-525.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst client and resources. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, energy consumption has a positive correlation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  65
    Hybrid Accelerated Computing Architecture for Real-Time Data Processing Applications.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):525-535.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. EXPLORING SERVER-LESS COMPUTING FOR EFFICIENT RESOURCE MANAGEMENT IN CLOUD ARCHITECTURES.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):77-83.
    Server-less computing, also known as Function as a Service (FaaS), revolutionizes cloud architecture by allowing developers to focus on code and functionality without managing underlying infrastructure. This paradigm enhances resource management efficiency by dynamically allocating resources only when needed, thus optimizing cost and performance. Server-less models, epitomized by platforms like AWS Lambda, Google Cloud Functions, and Azure Functions, provide automatic scaling and fine-grained billing, making them ideal for applications with variable workloads. While challenges such as cold start latency and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  66
    Dynamic Resource Allocation in Accelerated Computing Architectures for Improved Computational Throughput.Prabaharan Manoj - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-545.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  68
    Parallel Processing Techniques for Optimizing Data-Intensive Applications on Accelerated Computing Platforms.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-550.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Morphological Computation: Nothing but Physical Computation.Marcin Miłkowski - 2018 - Entropy 10 (20):942.
    The purpose of this paper is to argue against the claim that morphological computation is substantially different from other kinds of physical computation. I show that some (but not all) purported cases of morphological computation do not count as specifically computational, and that those that do are solely physical computational systems. These latter cases are not, however, specific enough: all computational systems, not only morphological ones, may (and sometimes should) be studied in various ways, including their energy (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  68
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Equality, Efficiency, and Sufficiency: Responding to Multiple Parameters of Distributive Justice During Charitable Distribution.Colin J. Palmer, Bryan Paton, Linda Barclay & Jakob Hohwy - 2013 - Review of Philosophy and Psychology 4 (4):659-674.
    Distributive justice decision making tends to require a trade off between different valued outcomes. The present study tracked computer mouse cursor movements in a forced-choice paradigm to examine for tension between different parameters of distributive justice during the decision-making process. Participants chose between set meal distributions, to third parties, that maximised either equality (the evenness of the distribution) or efficiency (the total number of meals distributed). Across different formulations of these dilemmas, responding was consistent with the notion that individuals (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  52
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  70
    Optimized Workload Distribution Frameworks for Accelerated Computing Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):550-560.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. On the computational complexity of ethics: moral tractability for minds and machines.Jakob Stenseke - 2024 - Artificial Intelligence Review 57 (105):90.
    Why should moral philosophers, moral psychologists, and machine ethicists care about computational complexity? Debates on whether artificial intelligence (AI) can or should be used to solve problems in ethical domains have mainly been driven by what AI can or cannot do in terms of human capacities. In this paper, we tackle the problem from the other end by exploring what kind of moral machines are possible based on what computational systems can or cannot do. To do so, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Computational capacity of pyramidal neurons in the cerebral cortex.Danko D. Georgiev, Stefan K. Kolev, Eliahu Cohen & James F. Glazebrook - 2020 - Brain Research 1748:147069.
    The electric activities of cortical pyramidal neurons are supported by structurally stable, morphologically complex axo-dendritic trees. Anatomical differences between axons and dendrites in regard to their length or caliber reflect the underlying functional specializations, for input or output of neural information, respectively. For a proper assessment of the computational capacity of pyramidal neurons, we have analyzed an extensive dataset of three-dimensional digital reconstructions from the NeuroMorphoOrg database, and quantified basic dendritic or axonal morphometric measures in different regions and layers (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small applications and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then,cloud desktop for oil (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Tractability and the computational mind.Rineke Verbrugge & Jakub Szymanik - 2018 - In Mark Sprevak & Matteo Colombo (eds.), The Routledge Handbook of the Computational Mind. Routledge. pp. 339-353.
    We overview logical and computational explanations of the notion of tractability as applied in cognitive science. We start by introducing the basics of mathematical theories of complexity: computability theory, computational complexity theory, and descriptive complexity theory. Computational philosophy of mind often identifies mental algorithms with computable functions. However, with the development of programming practice it has become apparent that for some computable problems finding effective algorithms is hardly possible. Some problems need too much computational resource, e.g., (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can deny it and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Epistemic virtues, metavirtues, and computational complexity.Adam Morton - 2004 - Noûs 38 (3):481–502.
    I argue that considerations about computational complexity show that all finite agents need characteristics like those that have been called epistemic virtues. The necessity of these virtues follows in part from the nonexistence of shortcuts, or efficient ways of finding shortcuts, to cognitively expensive routines. It follows that agents must possess the capacities – metavirtues –of developing in advance the cognitive virtues they will need when time and memory are at a premium.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  21. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management complexities in optimizing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. From Analog to Digital Computing: Is Homo sapiens’ Brain on Its Way to Become a Turing Machine?Antoine Danchin & André A. Fenton - 2022 - Frontiers in Ecology and Evolution 10:796413.
    The abstract basis of modern computation is the formal description of a finite state machine, the Universal Turing Machine, based on manipulation of integers and logic symbols. In this contribution to the discourse on the computer-brain analogy, we discuss the extent to which analog computing, as performed by the mammalian brain, is like and unlike the digital computing of Universal Turing Machines. We begin with ordinary reality being a permanent dialog between continuous and discontinuous worlds. So it is with computing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Development of an Offline Computer- Based Assessment Tool in Statistics and Probability Utilizing MS PowerPoint and MS Excel.Cherry Mae Cabrera & Jupeth Pentang - 2023 - International Journal of Science, Technology, Engineering and Mathematics 3 (4):73-100.
    This capstone project aimed to develop an offline computer-based assessment (CBA) tool that uses a computer instead of a traditional paper test in evaluating student learning. This addresses the difficulties faced by teachers in administering quarterly assessments. Incorporating technology into student assessment can increase student interest because of the immediate feedback generated automatically and can help teachers improve their work performance. This capstone project employed a developmental approach and utilized a modified ADDIE (Analysis, Design, and Development) model to design the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Developing an Expert System to Computer Troubleshooting.Faten El Kahlout & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (6):16-26.
    There is no doubt that Computer troubleshooting is important for organizations and companies and for personal use level. Sound cards troubles is one of the most annoying problems in computers. It causes damage and troubles in computers to persons, organizations and firms. Correctly, expert systems can greatly help to avoid damage to these computers. designed to diagnose and troubleshoot issues related to sound cards in computer systems. The expert system is developed using a combination of rule-based and machine learning approaches, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Taxonomy for Humans or Computers? Cognitive Pragmatics for Big Data.Beckett Sterner & Nico M. Franz - 2017 - Biological Theory 12 (2):99-111.
    Criticism of big data has focused on showing that more is not necessarily better, in the sense that data may lose their value when taken out of context and aggregated together. The next step is to incorporate an awareness of pitfalls for aggregation into the design of data infrastructure and institutions. A common strategy minimizes aggregation errors by increasing the precision of our conventions for identifying and classifying data. As a counterpoint, we argue that there are pragmatic trade-offs between precision (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. Assyrian Merchants meet Nuclear Physicists: History of the Early Contributions from Social Sciences to Computer Science. The Case of Automatic Pattern Detection in Graphs (1950s-1970s).Sébastien Plutniak - 2021 - Interdisciplinary Science Reviews 46 (4):547-568.
    Community detection is a major issue in network analysis. This paper combines a socio-historical approach with an experimental reconstruction of programs to investigate the early automation of clique detection algorithms, which remains one of the unsolved NP-complete problems today. The research led by the archaeologist Jean-Claude Gardin from the 1950s on non-numerical information and graph analysis is retraced to demonstrate the early contributions of social sciences and humanities. The limited recognition and reception of Gardin's innovative computer application to the humanities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  65
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Support-Neutrosophic Set: A New Concept in Soft Computing.Nguyen Xuan Thao, Florentin Smarandache & Nguyen Van Dinh - 2017 - Neutrosophic Sets and Systems 16:93-98.
    Today, soft computing is a field that is used a lot in solving real-world problems, such as problems in economics, finance, banking... With the aim to serve for solving the real problem, many new theories and/or tools which were proposed, improved to help soft computing used more efficiently. We can mention some theories as fuzzy sets theory (L. Zadeh, 1965), intuitionistic fuzzy set (K Atanasov, 1986), neutrosophic set (F. Smarandache 1999). In this paper, we introduce a new notion of sup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. (2 other versions)Theory of Fuzzy Time Computation (2, P vs NP problem).Didehvar Farzad - manuscript
    Throughout this paper, we prove TC + CON(TC*)ͰP ≠ NP. To do that, firstly we introduce the definition of scope∗ . This definition is based on the practical situation of computation in the real world. In the real world and real computational activities, we face finite number of efficient computable functions which work in a limited time. Inspired by this fact and considering time as a fuzzy concept, we have the definition. By employing this definition, we reach to a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. (2 other versions)Theory of Fuzzy Time Computation (2) (TC+CON(〖TC〗^*)ͰP≠NP).Didehvar Farzad - manuscript
    Throughout this paper, we prove TC+CON(〖TC〗^* )ͰP≠NP. To do that, firstly, we introduce the definition of scope_^*. This definition is based on the practical situation of computation in the real world. In the real world and real computational activities, we face a finite number of efficiently computable functions which work in a limited time. Inspired by this fact and considering time as a fuzzy concept, we have the definition. By employing this definition, we reach to a world of computation, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  63
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  38.  60
    Optimized Energy Numbers Continued.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:12.
    In this paper, we explore the properties and optimization techniques related to polyhedral cones and energy numbers with a focus on the cone of positive semidefinite matrices and efficient computation strategies for kernels. In Part (a), we examine the polyhedral nature of the cone of positive semidefinite matrices, , establishing that it does not form a polyhedral cone for due to its infinite dimensional characteristics. In Part (b), we present an algorithm for efficiently computing the kernel function on-the-fly, leveraging a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Language as an instrument of thought.Eran Asoulin - 2016 - Glossa: A Journal of General Linguistics 1 (1):1-23.
    I show that there are good arguments and evidence to boot that support the language as an instrument of thought hypothesis. The underlying mechanisms of language, comprising of expressions structured hierarchically and recursively, provide a perspective (in the form of a conceptual structure) on the world, for it is only via language that certain perspectives are avail- able to us and to our thought processes. These mechanisms provide us with a uniquely human way of thinking and talking about the world (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. Auditable Blockchain Randomization Tool.Julio Michael Stern & Olivia Saa - 2019 - Proceedings 33 (17):1-6.
    Randomization is an integral part of well-designed statistical trials, and is also a required procedure in legal systems. Implementation of honest, unbiased, understandable, secure, traceable, auditable and collusion resistant randomization procedures is a mater of great legal, social and political importance. Given the juridical and social importance of randomization, it is important to develop procedures in full compliance with the following desiderata: (a) Statistical soundness and computational efficiency; (b) Procedural, cryptographical and computational security; (c) Complete auditability and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Toward a theoretical account of strategy use and sense-making in mathematics problem solving.H. J. M. Tabachneck, K. R. Koedinger & M. J. Nathan - 1994 - In Ashwin Ram & Kurt Eiselt (eds.), Proceedings of the Sixteenth Annual Conference of the Cognitive Science Society: August 13 to 16, 1994, Georgia Institute of Technology. Erlbaum.
    Much problem solving and learning research in math and science has focused on formal representations. Recently researchers have documented the use of unschooled strategies for solving daily problems -- informal strategies which can be as effective, and sometimes as sophisticated, as school-taught formalisms. Our research focuses on how formal and informal strategies interact in the process of doing and learning mathematics. We found that combining informal and formal strategies is more effective than single strategies. We provide a theoretical account of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  24
    Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  67
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  68
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Web Application for Generating a Standard Coordinated Documentation for CS Students’ Graduation Project in Gaza Universities.Ibrahim M. Nasser & Samy S. Abu-Naser - 2017 - International Journal of Engineering and Information Systems (IJEAIS) 1 (6):155-167.
    The computer science (CS) graduated students suffered from documenting their projects and specially from coordinating it. In addition, students’ supervisors faced difficulties with guiding their students to an efficient process of documenting. In this paper, we will offer a suggestion as a solution to the mentioned problems; that is an application to make the process of documenting computer science (CS) student graduation project easy and time-cost efficient. This solution will decrease the possibility of human mistakes and reduce the effort of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Engineering Social Justice into Traffic Control for Self-Driving Vehicles?Milos N. Mladenovic & Tristram McPherson - 2016 - Science and Engineering Ethics 22 (4):1131-1149.
    The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
1 — 50 / 957