Results for 'AES Encryption'

49 found
Order:
  1. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Ambiguous encryption implies that consciousness cannot be simulated.Anna Wegloop & Peter Vach - manuscript
    Here we show, based on a simplified version of fully homomorphic encryption, that it is not possible to simulate conscious experience, in the sense of using a computer algorithm to generate experiences that are indistinguishable from those of a particular typical human being. This seems to have important implications for questions in the context of future developments in artificial intelligence. For example, the proposed process of mind-uploading will in general not generate a virtual consciousness similar to the consciousness of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  55
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  62
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  61
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. AE Galeotti, La tolleranza. Una proposta pluralista. [REVIEW]Sergio Volodia Marcello Cremaschi - 1997 - Rivista di Filosofia Neo-Scolastica 89 (2-3):493-495.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re- (...) keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  74
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  65
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  75
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  56
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  81
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  15.  99
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  63
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  60
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  68
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  20. (1 other version)Artificial evil and the foundation of computer ethics.L. Floridi & J. Sanders - 2000 - Etica E Politica 2 (2).
    Moral reasoning traditionally distinguishes two types of evil: moral and natural. The standard view is that ME is the product of human agency and so includes phenomena such as war, torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  21. A Refutation of Goodman's Type‐Token Theory of Notation.John Dilworth - 2003 - Dialectica 57 (3):330-336.
    In Languages of Art, Nelson Goodman presents a general theory of symbolic notation. However, I show that his theory could not adequately explain possible cases of natural language notational uses, and argue that this outcome undermines, not only Goodman's own theory, but any broadly type versus token based account of notational structure.Given this failure, an alternative representational theory is proposed, in which different visual or perceptual aspects of a given physical inscription each represent a different letter, word, or other notational (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. Conscientious Refusal of Abortion in Emergency Life-Threatening Circumstances and Contested Judgments of Conscience.Wojciech Ciszewski & Tomasz Żuradzki - 2018 - American Journal of Bioethics 18 (7):62-64.
    Lawrence Nelson (2018) criticizes conscientious objection (CO) to abortion statutes as far as they permit health care providers to escape criminal liability for what would otherwise be the legally wrongful taking of a pregnant woman’s life by refusing treatment (i.e. abortion). His key argument refers to the U.S. Supreme Court judgment (Roe v. Wade 1973) that does not treat the unborn as constitutional persons under the Fourteenth Amendment. Therefore, Nelson claims that within the U.S. legal system any vital interests of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  57
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  65
    Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication.Mohit Gangwar - 2024 - International Journal of Intelligent Systems and Applications in Engineering 12 (2):29-41.
    This work focuses on enhancing security for transmitted e-documents, such as e-stamp papers, within wireless environments through dynamic authentication using variable circular concealment of multiple invisible signature images. This method is driven by encrypted secret keys and session-based random numbers, alongside a region-specific bit casting strategy and dynamic bit sequencing for multiple signatures to bolster security and robustness. Multi-copy signature marking on non-overlapping document areas, coupled with varied bit encoding strategies for each modified pixel byte coefficient in cover image sub-blocks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Relativized Essentialism about Modalities.Salim Hirèche - 2022 - Argumenta 7 (2):463-484.
    On what I call absolutist essentialism about modality (AE), the metaphysical necessities are the propositions that are true in virtue of the essence (i.e. Aristotelian, absolute essence) of some entities. Other kinds of necessity can then be defined by restriction – e.g. the conceptual necessities are the propositions that are true in virtue of the essence of conceptual entities specifically. As an account of metaphysical modality and some other kinds (e.g. logical, conceptual), AE may have important virtues. However, when it (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
    Moral reasoning traditionally distinguishes two types of evil:moral (ME) and natural (NE). The standard view is that ME is the product of human agency and so includes phenomena such as war,torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  28. An Asymmetry in the Raven Paradox.Beppe Brivec - manuscript
    Peter Godfrey-Smith writes in the section 3.3 “The Ravens Problem” of his book “Theory and Reality” [chapter “Induction and Confirmation”]: “First, the logical empiricists were concerned to deal with the case where generalizations cover an infinite number of instances. In that case, as we see each raven we are not reducing the number of ways in which the hypothesis might fail”. Infinite sets and finite sets have different properties and follow different rules. For example: let’s call “bag X” a specific (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Un problema abierto de independencia en la teoría de conjuntos relacionado con ultrafiltros no principales sobre el conjunto de los números naturales N, y con Propiedades Ramsey.Franklin Galindo - manuscript
    En el ámbito de la lógica matemática existe un problema sobre la relación lógica entre dos versiones débiles del Axioma de elección (AE) que no se ha podido resolver desde el año 2000 (aproximadamente). Tales versiones están relacionadas con ultrafiltros no principales y con Propiedades Ramsey (Bernstein, Polarizada, Subretículo, Ramsey, Ordinales flotantes, etc). La primera versión débil del AE es la siguiente (A): “Existen ultrafiltros no principales sobre el conjunto de los números naturales (ℕ)”. Y la segunda versión débil del (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. OAE: The Ontology of Adverse Events.Yongqun He, Sirarat Sarntivijai, Yu Lin, Zuoshuang Xiang, Abra Guo, Shelley Zhang, Desikan Jagannathan, Luca Toldo, Cui Tao & Barry Smith - 2014 - Journal of Biomedical Semantics 5 (29):1-13.
    A medical intervention is a medical procedure or application intended to relieve or prevent illness or injury. Examples of medical interventions include vaccination and drug administration. After a medical intervention, adverse events (AEs) may occur which lie outside the intended consequences of the intervention. The representation and analysis of AEs are critical to the improvement of public health. Description: The Ontology of Adverse Events (OAE), previously named Adverse Event Ontology (AEO), is a community-driven ontology developed to standardize and integrate data (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  31. The Flying Termite.Laszlo Katona (ed.) - 2014 - Vernon Press.
    ABSTRACT of The Flying Termite by L.L. Katona -/- In this book I would like to show the term “intelligence“ has a universal, non-anthropomorphic meaning. We can perceive intelligence in dogs, dolphins or gorillas without understanding of it, but intelligence can be also seen in many other things from insects and the Solar System to elementary particles or the rules of a triangle. But that doesn’t mean intelligence comes from Intelligent Design, yet alone a Designer, they seems to be the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Importance of Alternative Solar Energy Sources and the Advantages and Disadvantages of Using Solar Panels in this Process.Tulakov Jakhongir Turakul Ugli - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):70-78.
    Abstract: This article reviews and analyzes the advantages and disadvantages of alternative solar energy and the use of solar panels in this process. The solar energy that is falling on the photoelements under a certain angle depends on environmental climax, season, and location. Atmospheric changes also lead to changes in the transverse and direct rays of light, which does not change the light, spectrum and intensity of falling light. These changes will change the principle of operation of the QES. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Droit de la robotique: Livre blanc.Alain Bensoussan & Renaud Champion - 2016 - SYMOP.
    Histoire et utilisation du robot Bien que la robotique soit un marché économique relativement jeune et en pleine croissance, la genèse des robots remonte à l’Antiquité. Le premier robot à être déployé sur des lignes d’assemblage est Unimate, utilisé dès 1961 par General Motors. La robotique, en se di usant dans tous les pans de notre économie, va impacter les business modèles de nombreuses industries comme l’automobile et l’aéronautique mais aussi la construction ou l’agriculture. Aujourd’hui les robots industriels et de (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Role of Information in Consciousness.Harry Haroutioun Haladjian - forthcoming - Psychology of Consciousness: Theory, Research, and Practice.
    This article comprehensively examines how information processing relates to attention and consciousness. We argue that no current theoretical framework investigating consciousness has a satisfactory and holistic account of their informational relationship. Our key theoretical contribution is showing how the dissociation between consciousness and attention must be understood in informational terms in order to make the debate scientifically sound. No current theories clarify the difference between attention and consciousness in terms of information. We conclude with two proposals to advance the debate. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. “Chosenness, Agapism, and the Search for Moderation between Nationhood and Universalism”.S. Berman Nadav - 2024 - da'at 92:7-36.
    Chosenness, Agapism, and the Search for Moderation between Nationhood and Universalism -/- Abstract The idea of collective Chosenness (nivḥarut) was interpreted by Jewish thinkers in two initial ways: Chosenness as a divine gift which is somehow encrypted in the body of each Jewish individual, and Chosenness as a normatively acquired (rather than inherited) property. Numerous attempts were made to defend these approaches, and to mediate between them. This paper examine the idea of Chosenness from a novel perspective, by interrogating it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Whispers and Shouts. The measurement of the human act.Fernando Flores Morador & Luis de Marcos Ortega (eds.) - 2021 - Alcalá de Henares, Madrid: Departement of Computational Sciences. University of Alcalá; Madrid.
    The 20th Century is the starting point for the most ambitious attempts to extrapolate human life into artificial systems. Norbert Wiener’s Cybernetics, Claude Shannon’s Information Theory, John von Neumann’s Cellular Automata, Universal Constructor to the Turing Test, Artificial Intelligence to Maturana and Varela’s Autopoietic Organization, all shared the goal of understanding in what sense humans resemble a machine. This scientific and technological movement has embraced all disciplines without exceptions, not only mathematics and physics but also biology, sociology, psychology, economics etc. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. (1 other version)The Necessity of Exosomatic Knowledge for Civilization and a Revision to our Epistemology.Ray Scott Percival - 2012 - In Norbert-Bertrand Barbe (ed.), LE NÉANT DANS LA PENSÉE CONTEMPORAINE. Publications du Centre Fran. pp. 136-150.
    The traditional conception of knowledge is justified, true belief. This located knowledge within the person's mind. I argue that due to the explosive growth of what I like to call "exosomatic knowledge," knowledge outside the mind, the traditional conception has outlived its relevance. On the other hand, Karl Popper's (1934) Falsificationism, with its emphasis on the objective character of knowledge, is not only a sounder, but also a more appropriate theory of knowledge for understanding the nature and growth of civilization. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  58
    History of the Heavens.Mark Julyan (ed.) - 2024 - New York: Barnes and Noble Press.
    This is the first chapter of Mark Julyan's 'History of the Heavens' which, as a whole, focuses on the many different interpretational problems that emerge within the controversial and previously unavailable appendix to Kant's 'Universal Natural History and Theory of the Heavens'. The first chapter makes the contention that we should interpret J.L. Austin's curious and otherwise eccentric capitalization of the font in the word KANT (twice on pp.2-3) of his 'How to do Things with Words' (1962), through pp.13-14 of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  73
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  53
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  43.  61
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Getting It: On Jokes and Art.Steven Burns & Alice MacLachlan - 2004 - AE: Journal of the Canadian Society of Aesthetics 10.
    “What is appreciation?” is a basic question in the philosophy of art, and the analogy between appreciating a work of art and getting a joke can help us answer it. We first propose a subjective account of aesthetic appreciation (I). Then we consider jokes (II). The difference between getting a joke and not, or what it is to get it right, can often be objectively articulated. Such explanations cannot substitute for the joke itself, and indeed may undermine the very power (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Greenberg, Kant, and Aesthetic Judgments of Modernist Art.Robert R. Clewis - 2008 - AE: Canadian Aesthetics Journal 18.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Does Contemporary Art Have Cognitive Value?Sherri Irvin - 2003 - AE: Canadian Aesthetics Journal 8.
    In his book Art and Knowledge, James O. Young suggests that avant-garde and contemporary art, because it tends to eschew the resources of illustrative representation, lacks cognitive value. Because he regards cognitive value as a necessary condition for a high degree of aesthetic value, he concludes that contemporary works tend to have little aesthetic value and thus do not deserve to be regarded as valuable artworks (or, in many cases, as artworks at all). In this paper, I mount a defense (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Lying as a scalar phenomenon.Neri Marsili - 2014 - In Sibilla Cantarini, Werner Abraham & Elisabeth Leiss (eds.), Certainty-Uncertainty Âe and the Attitudinal Space in Between. John Benjamins Publishing.
    In the philosophical debate on lying, there has generally been agreement that either the speaker believes that his statement is false, or he believes that his statement is true. This article challenges this assumption, and argues that lying is a scalar phenomenon that allows for a number of intermediate cases – the most obvious being cases of uncertainty. The first section shows that lying can involve beliefs about graded truth values (fuzzy lies) and graded beliefs (graded-belief lies). It puts forward (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  49. The Dynamics of Argumentative Discourse.Carlotta Pavese & Alexander W. Kocurek - 2021 - Journal of Philosophical Logic 51 (2):413-456.
    Arguments have always played a central role within logic and philosophy. But little attention has been paid to arguments as a distinctive kind of discourse, with its own semantics and pragmatics. The goal of this essay is to study the mechanisms by means of which we make arguments in discourse, starting from the semantics of argument connectives such as `therefore'. While some proposals have been made in the literature, they fail to account for the distinctive anaphoric behavior of `therefore', as (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations