Results for ' Real-Time Data Analysis'

963 found
Order:
  1.  34
    Low-Power IoT Sensors for Real-Time Outdoor Environmental Pollution Measurement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):430-440.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  49
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  47
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  53
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. PREDICTION OF EDUCATIONAL DATA USING DEEP CONVOLUTIONAL NEURAL NETWORK.K. Vijayalakshmi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):93-111.
    : One of the most active study fields in natural language processing, web mining, and text mining is sentiment analysis. Big data is an important research component in education that is used to advance the value of education by watching students' performance and understanding their learning habits. Real-time student feedback will enable teachers and students to understand teaching and learning challenges in the most user-friendly manner for students. By linking learning analytics to grounded theory, the proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Predictive Modeling of Smoke Potential Using Neural Networks and Environmental Data.Abu Al-Reesh Kamal Ali, Al-Safadi Muhammad Nidal, Al-Tanani Waleed Sami & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):38-46.
    This study presents a neural network-based model for predicting smoke potential in a specific area using a Kaggle-derived dataset with 15 environmental features and 62,631 samples. Our five-layer neural network achieved an accuracy of 89.14% and an average error of 0.000715, demonstrating its effectiveness. Key influential features, including temperature, humidity, crude ethanol, pressure, NC1.0, NC2.5, SCNT, and PM2.5, were identified, providing insights into smoke occurrence. This research aids in proactive smoke mitigation and public health protection. The model's accuracy and feature (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  67
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in (...)-time analytics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  36
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Spotify Status Dataset.Mohammad Ayman Mattar & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):14-21.
    Abstract: The Spotify Status Dataset is a valuable resource that provides real-time insights into the operational status and performance of Spotify, a popular music streaming platform. This dataset contains a wide array of information related to server uptime, user activity, service disruptions, and more, serving as a critical tool for both Spotify's internal monitoring and the broader data analysis community. As digital services like Spotify continue to play a central role in music consumption, understanding the platform's (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Towards Pedagogy supporting Ethics in Analysis.Marie Oldfield - 2022 - Journal of Humanistic Mathematics 12 (2).
    Over the past few years we have seen an increasing number of legal proceedings related to inappropriately implemented technology. At the same time career paths have diverged from the foundation of statistics out to Data Scientist, Machine Learning and AI. All of these new branches being fundamentally branches of statistics and mathematics. This has meant that formal training has struggled to keep up with what is required in the plethora of new roles. Mathematics as a taught subject is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  42
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Predictive Analysis of Lottery Outcomes Using Deep Learning and Time Series Analysis.Asil Mustafa Alghoul & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):1-6.
    Abstract: Lotteries have long been a source of fascination and intrigue, offering the tantalizing prospect of unexpected fortunes. In this research paper, we delve into the world of lottery predictions, employing cutting-edge AI techniques to unlock the secrets of lottery outcomes. Our dataset, obtained from Kaggle, comprises historical lottery draws, and our goal is to develop predictive models that can anticipate future winning numbers. This study explores the use of deep learning and time series analysis to achieve this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Transforming Data Analysis through AI-Powered Data Science.Mathan Kumar - 2023 - Proceedings of IEEE 2 (2):1-5.
    AI-powered records science is revolutionizing the way facts are analyzed and understood. It can significantly improve the exceptional of information evaluation and boost its speed. AI-powered facts technological know-how enables access to more extensive, extra complicated information sets, faster insights, faster trouble solving, and higher choice making. Using the use of AI-powered information technological know-how techniques and tools, organizations can provide more accurate outcomes with shorter times to choices. AI-powered facts technology also offers more correct predictions of activities and developments (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  55
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  43
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. ‘I like to run to feel’: Embodiment and wearable mobile tracking devices in distance running.John Toner, Jacquelyn Allen-Collinson, Patricia Jackman, Luke Jones & Joe Addrison - 2023 - Qualitative Research in Sport, Exercise and Health 15.
    Many experienced runners consider the use of wearable devices an important element of the training process. A key techno-utopic promise of wearables lies in the use of proprietary algorithms to identify training load errors in real-time and alert users to risks of running-related injuries. Such real-time ‘knowing’ is claimed to obviate the need for athletes’ subjective judgements by telling runners how they have deviated from a desired or optimal training load or intensity. This realist-contoured perspective is, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Real Kinds in Real Time: On Responsible Social Modeling.Theodore Bach - 2019 - The Monist 102 (2):236-258.
    There is broad agreement among social researchers and social ontologists that the project of dividing humans into social kinds should be guided by at least two methodological commitments. First, a commitment to what best serves moral and political interests, and second, a commitment to describing accurately the causal structures of social reality. However, researchers have not sufficiently analyzed how these two commitments interact and constrain one another. In the absence of that analysis, several confusions have set in, threatening to (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  20. Reciprocal Ethics: The Formal Science of Ethics.Stein Michael Hansen - manuscript
    Reciprocal Ethics is a novel ethical framework rooted in praxeology, the study of purposeful action. It represents an entirely new paradigm in moral philosophy, placing interaction at the core of universal ethics. Traditional ethical theories often divorce thought from action. Reciprocal Ethics contends that they are two aspects of the same phenomenon in the human experience, removing the traditional boundary between theoretical and practical ethics. The system categorizes all social interaction as either “self-directed” or “other-directed”, and by introducing the concept (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Jacques Lacan’s Registers of the Psychoanalytic Field, Applied using Geometric Data Analysis to Edgar Allan Poe’s “The Purloined Letter”.Fionn Murtagh & Giuseppe Iurato - manuscript
    In a first investigation, a Lacan-motivated template of the Poe story is fitted to the data. A segmentation of the storyline is used in order to map out the diachrony. Based on this, it will be shown how synchronous aspects, potentially related to Lacanian registers, can be sought. This demonstrates the effectiveness of an approach based on a model template of the storyline narrative. In a second and more Comprehensive investigation, we develop an approach for revealing, that is, uncovering, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Enrolment patterns in Federal universities based on three criteria (2010-2031): A time series analysis.Valentine Joseph Owan, Eyiene Ameh & Mary Chinelo Ubabudu - 2021 - Journal of Educational Research in Developing Areas (JEREDA) 2 (1):34-51.
    Introduction: There is a general agreement among previous studies that gender, merit and catchment area criteria allows for access to university education, but the pattern of these variables over the years has not been proven in these studies. Purpose: This study used a times series approach to evaluate the enrolment patterns in federally owned universities in South-South Zone, Nigeria, based on the gender, merit and catchment area criteria. Methodology: The descriptive survey design was adopted for this study. A purposive sampling (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  35
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  46
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Inclusive Education and Epistemic Value in the Praxis of Ethical Change.Ignace Haaz - 2019 - In Obiora F. Ike, Justus Mbae & Chidiehere Onyia (eds.), Mainstreaming Ethics in Higher Education Research Ethics in Administration, Finance, Education, Environment and Law Vol. 1. Globethics. net. pp. 259-290.
    In many universities and related knowledge transmission organisations, professional focus on empirical data shows as in vocational education that preparation for real life technical work is important, as one would expect from “career education”. University is as the name shows on the contrary focusing on the universality of some sort of education, which is neither a technical one, nor much concerned by preparing oneself for a career. The scope of this chapter is to propose an analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Five Dialogues on Knowledge and Reality.Robert Elliott Allinson - 1972 - Dissertation, The University of Texas at Austin
    This dissertation investigates that which can only be known with the following criteria of knowledge: (i) it is unchangeable; (ii) it cannot be mistaken; (iii) it is identical with its object. It begins by addressing the following questions: what can and cannot exist in solely this sense? Can anything exist in this sense? A further thesis it explores is that the split between the subject of knowledge and the object of knowledge which has given rise to the unexplained and inexplicable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  31
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Ethical and social reflections on the proposed European Health Data Space.Ciara Staunton, Mahsa Shabani, Deborah Mascalzoni, Signe Mezinska & Santa Slokenberga - 2024 - European Journal of Human Genetics 1 (1):1-9.
    The COVID-19 pandemic demonstrated the benefits of international data sharing. Data sharing enabled the health care policy makers to make decisions based on real-time data, it enabled the tracking of the virus, and importantly it enabled the development of vaccines that were crucial to mitigating the impact of the virus. This data sharing is not the norm as data sharing needs to navigate complex ethical and legal rules, and in particular, the fragmented application (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Exploring Environmental Kuznets Curves of Kitakyushu: 50-year Time-series Data of the OECD SDGs Pilot City.Quan-Hoang Vuong, Ho Manh Tung, Nguyen To Hong Kong & Nguyen Minh Hoang - manuscript
    Can green growth policies help protect the environment while keeping the industry growing and infrastructure expanding? The City of Kitakyushu, Japan, has actively implemented eco-friendly policies since 1967 and recently inspired the pursuit of sustainable development around the world, especially in the Global South region. However, empirical studies on the effects of green growth policies are still lacking. This study explores the relationship between road infrastructure development and average industrial firm size with air pollution in the city through the Environmental (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. OBJECTS OF KNOWLEDGE IN SCIENCE AND RELIGION.Avik Mukherjee - 2014 - SPECIAL COLLECTIONS RESEARCH CENTRE, MORRIS LIBRARY, SOUTHERN ILLINOIS UNIVERSITY CARBONDALE.
    If science disputes the validity or authenticity of religious knowledge it is because both the scientist and the rational man assume that every object of knowledge there is or can be exists as a material percept in time and space. If we assume that knowledge of material objects is definite knowledge – an assumption itself suspect considering that the latest WMAP data indicates that 95.4% of the total matter in our universe is dark matter and dark energy – (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. A Counterexample t o All Future Dynamic Systems Theories of Cognition.Eric Dietrich - 2000 - J. Of Experimental and Theoretical AI 12 (2):377-382.
    Years ago, when I was an undergraduate math major at the University of Wyoming, I came across an interesting book in our library. It was a book of counterexamples t o propositions in real analysis (the mathematics of the real numbers). Mathematicians work more or less like the rest of us. They consider propositions. If one seems to them to be plausibly true, then they set about to prove it, to establish the proposition as a theorem. Instead (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Comparative views on research productivity differences between major social science fields in Vietnam: Structured data and Bayesian analysis, 2008-2018.Quan-Hoang Vuong, La Viet Phuong, Vuong Thu Trang, Ho Manh Tung, Nguyen Minh Hoang & Manh-Toan Ho - manuscript
    Since Circular 34 from the Ministry of Science and Technology of Vietnam required the head of the national project to have project results published in ISI/Scopus journals in 2014, the field of economics has been dominating the number of nationally-funded projects in social sciences and humanities. However, there has been no scientometric study that focuses on the difference in productivity among fields in Vietnam. Thus, harnessing the power of the SSHPA database, a comprehensive dataset of 1,564 Vietnamese authors (854 males, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Overdetermination of theories by empirical models: A realist interpretation of empirical choices.Emma Ruttkamp - 2005 - Poznan Studies in the Philosophy of the Sciences and the Humanities 84 (1):409-436.
    A model-theoretic realist account of science places linguistic systems and their corresponding non-linguistic structures at different stages or different levels of abstraction of the scientific process. Apart from the obvious problem of underdetermination of theories by data, philosophers of science are also faced with the inverse (and very real) problem of overdetermination of theories by their empirical models, which is what this article will focus on. I acknowledge the contingency of the factors determining the nature – and choice (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. W poszukiwaniu ontologicznych podstaw prawa. Arthura Kaufmanna teoria sprawiedliwości [In Search for Ontological Foundations of Law: Arthur Kaufmann’s Theory of Justice].Marek Piechowiak - 1992 - Instytut Nauk Prawnych PAN.
    Arthur Kaufmann is one of the most prominent figures among the contemporary philosophers of law in German speaking countries. For many years he was a director of the Institute of Philosophy of Law and Computer Sciences for Law at the University in Munich. Presently, he is a retired professor of this university. Rare in the contemporary legal thought, Arthur Kaufmann's philosophy of law is one with the highest ambitions — it aspires to pinpoint the ultimate foundations of law by explicitly (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  33
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Research Data Preservation Practices of Library and Information Science Faculties.A. Subaveerapandiyan & Anuradha Maurya - 2022 - Defence Journal of Library and Information Science Technology 42 (4):259-264.
    Digitisation of research data is widely increasing all around the world because it needs more and development of enormous digital technologies. Data curation services are starting to offer many libraries. Research data curation is the collective invaluable and reusable information of the researchers. Collected data preservation is more important. The majority of the higher education institutes preserved the research data for their students and researchers. It is stored for a long time using various formats. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Consistency Maintenance of Group/Ungroup Operations in Object-based Collaborative Graphical Editing Systems.Liping Gao & Fangyu Yu - 2015 - International Journal of Signal Processing, Image Processing and Pattern Recognition 8.
    In real-time collaborative graphical editing systems, Object-based Group/Ungroup operations are frequently accessible and practically useful. However, the existing research on these operations of the graphical editing is rare and defective. In this paper, based on Multi-Version strategy and Address Space Transformation method, a new MVSDR algorithm, which is not only applied to simple operations (such as Create, Delete, ChangeATT, etc.), but also suitable for Group/Ungroup ones, is proposed to solve the consistency maintenance problem. The proposed algorithm abandons previous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Ethics of identity in the time of big data.James Brusseau - 2019 - First Monday 24 (5-6):00-11.
    Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. No wisdom in the crowd: genome annotation at the time of big data - current status and future prospects.Antoine Danchin - 2018 - Microbial Biotechnology 11 (4):588-605.
    Science and engineering rely on the accumulation and dissemination of knowledge to make discoveries and create new designs. Discovery-driven genome research rests on knowledge passed on via gene annotations. In response to the deluge of sequencing big data, standard annotation practice employs automated procedures that rely on majority rules. We argue this hinders progress through the generation and propagation of errors, leading investigators into blind alleys. More subtly, this inductive process discourages the discovery of novelty, which remains essential in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. PROSPECTS OF USING GPT CHAT IN MARKETING.Oleksandr P. Krupskyi, Valeriia Vorobiova & Yuliya Stasiuk - 2023 - Time Description of Economic Reforms 3 (51):89-97.
    Problem statement. Modern marketing requires effective tools to attract and retain customers, as well as improve communication with the audience. In this context, the use of artificial intelligence, in particular, ChatGPT (Generative Pre-trained Transformer), can be a promising innovative solution. However, the conclusions about the potential benefits and limitations of using ChatGPT in marketing are ambiguous, due to the little experience gained in this area. The purpose of the study is to assess the potential of using ChatGPT in marketing strategies, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Advances and Analysis on Reducing Webpage Response Time with Effect of Edge Computing.N. Kamiyama, Y. Nakano, K. Shiomoto, G. Hasegawa, Masayuki Murata & Hideo Miyahara - 2018 - 2016 IEEE Global Communications Conference (GLOBECOM) 4.
    Modern webpages consist of many rich objects dynamically produced by servers and client terminals at diverse locations, so we face an increase in web response time. To reduce the time, edge computing, in which dynamic objects are generated and delivered from edge nodes, is effective. For ISPs and CDN providers, it is desirable to estimate the effect of reducing the web response time when introducing edge computing. Therefore, in this paper, we derive a simple formula that estimates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  50
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Introduction to Hard and Soft Data Fusion via Conceptual Spaces Modeling for Space Event Characterization.Jeremy Chapman, David Kasmier, John L. Crassidis, James L. Llinas, Barry Smith & Alex P. Cox - 2021 - In Jeremy Chapman, David Kasmier, John L. Crassidis, James L. Llinas, Barry Smith & Alex P. Cox (eds.), National Symposium on Sensor & Data Fusion (NSSDF), Military Sensing Symposia (MSS).
    This paper describes an AFOSR-supported basic research program that focuses on developing a new framework for combining hard with soft data in order to improve space situational awareness. The goal is to provide, in an automatic and near real-time fashion, a ranking of possible threats to blue assets (assets trying to be protected) from red assets (assets with hostile intentions). The approach is based on Conceptual Spaces models, which combine features from traditional associative and symbolic cognitive models. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  44
    Smart Homes with Augmented Reality and IoT Integration for Enhanced User Experience and Automation.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The proposed system allows users to monitor and control various home appliances, security systems, and environmental controls through AR interfaces, which overlay digital information on the physical environment. IoT devices communicate with each other and with the AR system, providing real-time data and enabling automated responses based on user preferences or environmental conditions. This synergy between AR and IoT facilitates a more responsive and intelligent home environment that adapts to the needs of its occupants.
    Download  
     
    Export citation  
     
    Bookmark  
  46. The real presence.H. E. Baber - 2013 - Religious Studies 49 (1):19-33.
    The doctrine that Christ is really present in the Eucharist appears to entail that Christ's body is not only multiply located but present in different ways at different locations. Moreover, the doctrine poses an even more difficult meta-question: what makes a theological explanation of the Eucharist a ‘real presence’ account? Aquinas's defence of transubstantiation, perhaps the paradigmatic account, invokes Aristotelian metaphysics and the machinery of Scholastic philosophy. My aim is not to produce a ‘rational reconstruction’ of his analysis (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  47. Can Real Social Epistemic Networks Deliver the Wisdom of Crowds?Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2014 - In Tania Lombrozo, Joshua Knobe & Shaun Nichols (eds.), Oxford Studies in Experimental Philosophy, Volume 1. Oxford, GB: Oxford University Press UK.
    In this paper, we explain and showcase the promising methodology of testimonial network analysis and visualization for experimental epistemology, arguing that it can be used to gain insights and answer philosophical questions in social epistemology. Our use case is the epistemic community that discusses vaccine safety primarily in English on Twitter. In two studies, we show, using both statistical analysis and exploratory data visualization, that there is almost no neutral or ambivalent discussion of vaccine safety on Twitter. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  32
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Data and Afrofuturism: an emancipated subject?Aisha Paulina Lami Kadiri - 2021 - Internet Policy Review 10 (4):1-26.
    The concept of an individual, liberal data subject, who was traditionally at the centre of data protection efforts has recently come under scrutiny. At the same time, the particularly destructive effect of digital technology on Black people establishes the need for an analysis that not only considers but brings racial dimensions to the forefront. I argue that because Afrofuturism situates the Black struggle in persistent, yet continuously changing structural disparities and power relations, it offers a powerful (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 963