Results for 'Cloud Database'

319 found
Order:
  1. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected over a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Traducere şi traducători.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    Include Ghidul Comisiei Europene pentru traducătorii din Uniunea Europeană Despre traducere şi traducători, teorii ale traducerilor, traducerea asistată pe calculator, şi software utilizat în traduceri. Include Ghidul Comisiei Europene pentru traducătorii din Uniunea Europeană şi legislaţia specifică traducerilor şi traducătorilor. Fidelitatea (sau loialitatea) şi transparenţa, idealurile duale în traducere, sunt de multe ori în conflict. Problema fidelităţii versus transparenţă a fost formulată şi în termeni de “echivalenţă formală” şi ” echivalenţă dinamică, sau funcţională“. Cele din urmă expresii sunt asociate cu (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A definition, benchmark and database of AI for social good initiatives.Josh Cowls, Andreas Tsmadaos, Mariarosaria Taddeo & Luciano Floridi - 2021 - Nature Machine Intelligence 3:111–⁠115.
    Initiatives relying on artificial intelligence (AI) to deliver socially beneficial outcomes—AI for social good (AI4SG)—are on the rise. However, existing attempts to understand and foster AI4SG initiatives have so far been limited by the lack of normative analyses and a shortage of empirical evidence. In this Perspective, we address these limitations by providing a definition of AI4SG and by advocating the use of the United Nations’ Sustainable Development Goals (SDGs) as a benchmark for tracing the scope and spread of AI4SG. (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   159 citations  
  14. Formal inconsistency and evolutionary databases.Walter A. Carnielli, João Marcos & Sandra De Amo - 2000 - Logic and Logical Philosophy 8 (2):115-152.
    This paper introduces new logical systems which axiomatize a formal representation of inconsistency (here taken to be equivalent to contradictoriness) in classical logic. We start from an intuitive semantical account of inconsistent data, fixing some basic requirements, and provide two distinct sound and complete axiomatics for such semantics, LFI1 and LFI2, as well as their first-order extensions, LFI1* and LFI2*, depending on which additional requirements are considered. These formal systems are examples of what we dub Logics of Formal Inconsistency (LFI) (...)
    Download  
     
    Export citation  
     
    Bookmark   53 citations  
  15. An open database of productivity in Vietnam's social sciences and humanities for public use.Quan-Hoang Vuong, Viet-Phuong La, Thu-Trang Vuong, Manh-Toan Ho, Hong K. T. Nguyen, Viet-Ha T. Nguyen, Hiep-Hung Pham & Manh-Tung Ho - 2018 - Scientific Data (Nature) 5 (180188):1-15.
    This study presents a description of an open database on scientific output of Vietnamese researchers in social sciences and humanities, one that corrects for the shortcomings in current research publication databases such as data duplication, slow update, and a substantial cost of doing science. Here, using scientists’ self-reports, open online sources and cross-checking with Scopus database, we introduce a manual system and its semi-automated version of the database on the profiles of 657 Vietnamese researchers in social sciences (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  16. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  64
    NUVEM (Cloud).Mota Victor - manuscript
    knowing and not knowing in a regular social context and the emergente of monastic revolution of the self and its owner.
    Download  
     
    Export citation  
     
    Bookmark  
  18. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  21.  90
    The Cloud.Victor Adelino Ausina Mota - manuscript
    from monasticism to modern life, via Saint Francis and Buonaventura, euqating some purposes anda deliberations of an ideal and happy life on this complex world, even so you're not a social scientist or a social worker.
    Download  
     
    Export citation  
     
    Bookmark  
  22. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  82
    The Face Image Meta-Database (fIMDb) & ChatLab Facial Anomaly Database (CFAD): Tools for research on face perception and social stigma.Clifford Ian Workman & Anjan Chatterjee - 2021 - Methods in Psychology 5 (100063):1-9.
    Investigators increasingly need high quality face photographs that they can use in service of their scholarly pursuits—whether serving as experimental stimuli or to benchmark face recognition algorithms. Up to now, an index of known face databases, their features, and how to access them has not been available. This absence has had at least two negative repercussions: First, without alternatives, some researchers may have used face databases that are widely known but not optimal for their research. Second, a reliance on databases (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Opening the Door to Cloud-Cuckoo-Land: Hempel and Kuhn on Rationality.Alexander George - 2012 - Journal for the History of Analytical Philosophy 1 (4).
    A reading is offered of Carl Hempel’s and Thomas Kuhn’s positions on, and disagreements about, rationality in science that relates these issues to the debate between W.V. Quine and Rudolf Carnap on the analytic/synthetic distinction.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26. Defeasible argumentation over relational databases.Cristhian Ariel David Deagustini, Santiago Emanuel Fulladoza Dalibón, Sebastián Gottifredi, Marcelo Alejandro Falappa, Carlos Iván Chesñevar & Guillermo Ricardo Simari - 2017 - Argument and Computation 8 (1):35-59.
    Defeasible argumentation has been applied successfully in several real-world domains in which it is necessary to handle incomplete and contradictory information. In recent years, there have been interesting attempts to carry out argumentation processes supported by massive repositories developing argumentative reasoning applications. One of such efforts builds arguments by retrieving information from relational databases using the DBI-DeLP framework; this article presents eDBI-DeLP, which extends the original DBI-DeLP framework by providing two novel aspects which refine the interaction between DeLP programs and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Louise Amoore: Cloud Ethics. Algorithms and the Attributes of Ourselves and Others.Anna-Verena Nosthoff & Felix Maschewski - 2021 - Behemoth. A Journal on Civilisation 14 (2).
    Download  
     
    Export citation  
     
    Bookmark  
  28. Effects of Cloud-based M-learning on Student Motivation and Creative Performance: A Case Study on Computer illustration Course.I.-Fan Tsai - unknown
    This study was conducted to explore the effects of cloud-based m- learning on students’ motivation and creative performance in computer illustration course. Variables of motivation, creative behavior, creative process and creative product were conducted to understand the situations, differences, and the predictive power cloud-based m-learning had in creative performance. A nonequivalent pretest–posttest design was adopted, and 123 university students from Taipei City, Taiwan,were recruited as research participants in the study during 10-weeks experiment. They were asked to complete a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Contextualism, Moral Disagreement, and Proposition Clouds.Jussi Suikkanen - 2019 - In Russ Shafer-Landau (ed.), Oxford Studies in Metaethics 14. Oxford: Oxford University Press. pp. 47-69.
    According to contextualist theories in metaethics, when you use a moral term in a context, the context plays an ineliminable part in determining what natural property will be the semantic value of the term. Furthermore, on subjectivist and relativist versions of these views, it is either the speaker's own moral code or her moral community's moral code that constitutes the reference-fixing context. One standard objection to views of this type is that they fail to enable us to disagree in ordinary (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  30. The Planteome database: an integrated resource for reference ontologies, plant genomics and phenomics.Laurel Cooper, Austin Meier, Marie-Angélique Laporte, Justin L. Elser, Chris Mungall, Brandon T. Sinn, Dario Cavaliere, Seth Carbon, Nathan A. Dunn, Barry Smith, Botong Qu, Justin Preece, Eugene Zhang, Sinisa Todorovic, Georgios Gkoutos, John H. Doonan, Dennis W. Stevenson, Elizabeth Arnaud & Pankaj Jaiswal - 2018 - Nucleic Acids Research 46 (D1):D1168–D1180.
    The Planteome project provides a suite of reference and species-specific ontologies for plants and annotations to genes and phenotypes. Ontologies serve as common standards for semantic integration of a large and growing corpus of plant genomics, phenomics and genetics data. The reference ontologies include the Plant Ontology, Plant Trait Ontology, and the Plant Experimental Conditions Ontology developed by the Planteome project, along with the Gene Ontology, Chemical Entities of Biological Interest, Phenotype and Attribute Ontology, and others. The project also provides (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Ontology-assisted database integration to support natural language processing and biomedical data-mining.Jean-Luc Verschelde, Marianna C. Santos, Tom Deray, Barry Smith & Werner Ceusters - 2004 - Journal of Integrative Bioinformatics. Repr. In: Yearbook of Bioinformatics , 39–48 1:1-10.
    Successful biomedical data mining and information extraction require a complete picture of biological phenomena such as genes, biological processes, and diseases; as these exist on different levels of granularity. To realize this goal, several freely available heterogeneous databases as well as proprietary structured datasets have to be integrated into a single global customizable scheme. We will present a tool to integrate different biological data sources by mapping them to a proprietary biomedical ontology that has been developed for the purposes of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Knowledge-based Intelligent Tutoring System for Teaching Mongo Database.Mohanad M. Hilles & Samy S. Abu Naser - 2017 - European Academic Research 4 (10).
    Recently, Intelligent Tutoring Systems (ITS) got much attention from researchers even though ITS educational technology began in the late 1960s and ITS is just embryonic from laboratories into the field. In this paper we outline an intelligent tutoring system for teaching basics of the databases system called (MDB). The MDB was built as education system by using the authoring tool (ITSB). MDB contains learning materials as a group of lessons for beginner level which include relational database system and lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  34. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Behind the Clouds.Victor Mota - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  36. Clock System or Cloud System?: Applying Popper's Metaphor to the Study of Human Consciousness.Hillary S. Webb - 2012 - Paranthropology 3 (4).
    The question of what human consciousness “is,” how it “works,” and what it “does” is currently being approached by myriad fields of study, each with their own particular goals and research techniques. But despite the undeniably complex nature of this enigmatic phenomenon, the prevailing scientific and institutional paradigm seems to imply that only quantitative, experimentally focused approaches are a worthy means of illuminating “truth” about human consciousness. -/- In this paper, I begin by borrowing Popper’s metaphor of “clock systems” versus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Effects of Cloud Mobile Learning and Creative Environment on Student’s Creative Performances.Chen Si Yi - unknown
    The Purpose of this study was to investigate the effect of cloud mobile learning and creative environment on college student’s creativity performance. A nonequivalent pretest-posttest quasi-experimental design was used in this research. The objects were two freshman classes selected from a public university and randomly assigned to the experimental group and the control group. A learning activity named Amphibious Mechanical Beast was conducted in this teaching experiment. The experimental was taught using cloud mobile learning, while the control group (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. A reflection on the journey to build the first national science databases.Quan-Hoang Vuong - 2021 - Academia Letters.
    How a senior researcher from a developing country can build an organic academic enterprise. Drawing from childhood experience with nature, past works with the business sector, and philosophy of data-driven research, the essay presents a compelling case of letting young graduates work on big database-building projects: one on Vietnamese social sciences; the other is more than 80 years of the pioneer science in Vietnam—mathematics. Two national databases have enabled meaningful data-driven interactions with scientific policymakers.
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Marvelous Clouds: Toward a Philosophy of Elemental Media, by John Durham Peters, University of Chicago Press, 2015. [REVIEW]Paul Boshears - 2015 - ART PAPERS 39 (6):63.
    Download  
     
    Export citation  
     
    Bookmark  
  45. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Status of Educational Sciences In Vietnam: A Bibliometric Analysis From Clarivate Web Of Science Database Between 1991 And 2018.Quan-Hoang Vuong, Do Minh Trang, Pham Thi Van Anh, Thi-An Do, Phuong-Thuc Doan, Anh-Duc Hoang, Thu-Hang Ta, Quynh-Anh Le & Hiep-Hung Pham - 2020 - Problems of Education in the 21st Century 78 (4):644-662.
    Since 2013, Vietnam has implemented a plan to reform the whole education sector. However, there is little understanding on the status of educational research in Vietnam, which may lay the foundation for such plan. Thus, this research aims to analyze the whole picture of educational research from Vietnam, as seen from the Clarivate Web of Science (WOS) database: 215 publications were recorded, ranging from 1991 to 2018. These 215 publications were further analyzed from five perspectives: 1) number of publications (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Formal Ontology for Natural Language Processing and the Integration of Biomedical Databases.Jonathan Simon, James M. Fielding, Mariana C. Dos Santos & Barry Smith - 2005 - International Journal of Medical Informatics 75 (3-4):224-231.
    The central hypothesis of the collaboration between Language and Computing (L&C) and the Institute for Formal Ontology and Medical Information Science (IFOMIS) is that the methodology and conceptual rigor of a philosophically inspired formal ontology greatly benefits application ontologies. To this end r®, L&C’s ontology, which is designed to integrate and reason across various external databases simultaneously, has been submitted to the conceptual demands of IFOMIS’s Basic Formal Ontology (BFO). With this project we aim to move beyond the level of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Cryptophasia and the Question of Database.Ekin Erkan - 2019 - Triple Ampersand:1-29.
    Over the last thirty years, once staunchly historical cinema scholars such as Thomas Elsaesser, Jane Gaines, Siegfried Zielinski, and André Gaudreault have abandoned history for historiography and film studies for media archaeology. With increasing attention on the “database” as a symbolic metaphor for postmodernity and the decentered, networked tenants of the global present, cinema is taking on the characteristics of new media, existing in intertextual space. Thus, the term “post-cinema” has been co-opted as a viable intermediary that accounts for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 319