Results for 'Cloud computing, Smart home, Home automation, Arduino ESP, GSM, Android'

997 found
Order:
  1. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure (...) home automation system based on a cloud computing system with an ESP Arduino system. The security of home had been improved by adding a complete camera system with a GSM communication technique to connect the Arduino output data to an external specified number if there is no internet provider. We used three sensors for temperature, gas, and motion measurements. The ESP8226 Wi-Fi device programmed the sensors to maintain the sensors measurements and transfer them to the cloud server database which is programmed to the web server via Appatshy and Mysql formats. The system implemented with high time response so that all readings updated and appeared spontaneously. The designed system should be effective, a secure, and rapid response real-time smart home system should be achieved. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Minds in the Matrix: Embodied Cognition and Virtual Reality (2nd edition).Paul Smart - 2014 - In Lawrence A. Shapiro (ed.), The Routledge Handbook of Embodied Cognition. New York: Routledge.
    The present chapter discusses the implications of virtual reality for the theory and practice of embodied cognitive science. The chapter discusses how recent technological innovations are poised to reshape our understanding of the materially-embodied and environmentally-situated mind, providing us with a new means of studying the mechanisms responsible for intelligent behavior. The chapter also discusses how a synthetically-oriented shift in our approach to embodied intelligence alters our view of familiar problems, most notably the distinction between embedded and extended cognition. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Classification of Smart Home Applications’ Requirements for the MAC Layer.Yasmeen Altujjar & Hala Mokhtar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):13-21.
    Abstract—Smart homes and Wireless Home Automation Networks (WHAN) face several challenges in terms of cost, scalability, reliability, delay, energy consumption and many others. Smart homes typically have huge number of communicating devices. Efficient management of network resources is a major challenge in such environments. This paper provides insights on how to improve the MAC layer in smart home networks to fulfil the requirements of the different smart home applications. It provides a classification of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking an embedded (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  7. Extended Computation: Wide Computationalism in Reverse.Paul Smart, Wendy Hall & Michael Boniface - 2021 - Proceedings of the 13th ACM Web Science Conference (Companion Volume).
    Arguments for extended cognition and the extended mind are typically directed at human-centred forms of cognitive extension—forms of cognitive extension in which the cognitive/mental states/processes of a given human individual are subject to a form of extended or wide realization. The same is true of debates and discussions pertaining to the possibility of Web-extended minds and Internet-based forms of cognitive extension. In this case, the focus of attention concerns the extent to which the informational and technological elements of the online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Minds in the Metaverse: Extended Cognition Meets Mixed Reality.Paul Smart - 2022 - Philosophy and Technology 35 (4):1–29.
    Examples of extended cognition typically involve the use of technologically low-grade bio-external resources (e.g., the use of pen and paper to solve long multiplication problems). The present paper describes a putative case of extended cognizing based around a technologically advanced mixed reality device, namely, the Microsoft HoloLens. The case is evaluated from the standpoint of a mechanistic perspective. In particular, it is suggested that a combination of organismic (e.g., the human individual) and extra-organismic (e.g., the HoloLens) resources form part of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  9. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter provides a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Designing the Smart Operator 4.0 for Human Values: A Value Sensitive Design Approach.Steven Umbrello, Antonio Padovano & Lucia Gazzaneo - 2020 - Procedia Manufacturing 42:219-226.
    Emerging technologies such as cloud computing, augmented and virtual reality, artificial intelligence and robotics, among others, are transforming the field of manufacturing and industry as a whole in unprecedent ways. This fourth industrial revolution is consequentially changing how operators that have been crucial to industry success go about their practices in industrial environments. This short paper briefly introduces the notion of the Operator 4.0 as well as how this novel way of conceptualizing the human operator necessarily implicates human values (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Modern Automated System for Traffic Signals.Senbaga Ganesh - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):111-119.
    This work has been designed to develop an a dynamic road signal based on an emergency with density. The sync signal automatically switches to detecting traffic density at the intersection. Traffic congestion is a serious problem in many large cities around the world and has become a nightmare for travelers in these cities. The conventional traffic light system is based on the concept of fixed time assigned to each side of the join that cannot be varied by varying traffic density. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Meaningful Human Control over Smart Home Systems: A Value Sensitive Design Approach.Steven Umbrello - 2020 - Humana.Mente Journal of Philosophical Studies 13 (37):40-65.
    The last decade has witnessed the mass distribution and adoption of smart home systems and devices powered by artificial intelligence systems ranging from household appliances like fridges and toasters to more background systems such as air and water quality controllers. The pervasiveness of these sociotechnical systems makes analyzing their ethical implications necessary during the design phases of these devices to ensure not only sociotechnical resilience, but to design them for human values in mind and thus preserve meaningful human (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  16. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Automating Leibniz’s Theory of Concepts.Paul Edward Oppenheimer, Jesse Alama & Edward N. Zalta - 2015 - In Felty Amy P. & Middeldorp Aart (eds.), Automated Deduction – CADE 25: Proceedings of the 25th International Conference on Automated Deduction (Lecture Notes in Artificial Intelligence: Volume 9195), Berlin: Springer. Springer. pp. 73-97.
    Our computational metaphysics group describes its use of automated reasoning tools to study Leibniz’s theory of concepts. We start with a reconstruction of Leibniz’s theory within the theory of abstract objects (henceforth ‘object theory’). Leibniz’s theory of concepts, under this reconstruction, has a non-modal algebra of concepts, a concept-containment theory of truth, and a modal metaphysics of complete individual concepts. We show how the object-theoretic reconstruction of these components of Leibniz’s theory can be represented for investigation by means of automated (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  35. Representation and Reality by Language: How to make a home quantum computer?Vasil Penchev - 2020 - Philosophy of Science eJournal (Elsevier: SSRN) 13 (34):1-14.
    A set theory model of reality, representation and language based on the relation of completeness and incompleteness is explored. The problem of completeness of mathematics is linked to its counterpart in quantum mechanics. That model includes two Peano arithmetics or Turing machines independent of each other. The complex Hilbert space underlying quantum mechanics as the base of its mathematical formalism is interpreted as a generalization of Peano arithmetic: It is a doubled infinite set of doubled Peano arithmetics having a remarkable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Computational logic. Vol. 1: Classical deductive computing with classical logic. 2nd ed.Luis M. Augusto - 2022 - London: College Publications.
    This is the 3rd edition. Although a number of new technological applications require classical deductive computation with non-classical logics, many key technologies still do well—or exclusively, for that matter—with classical logic. In this first volume, we elaborate on classical deductive computing with classical logic. The objective of the main text is to provide the reader with a thorough elaboration on both classical computing – a.k.a. formal languages and automata theory – and classical deduction with the classical first-order predicate calculus with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Effects of Cloud-based M-learning on Student Motivation and Creative Performance: A Case Study on Computer illustration Course.I.-Fan Tsai - unknown
    This study was conducted to explore the effects of cloud-based m- learning on students’ motivation and creative performance in computer illustration course. Variables of motivation, creative behavior, creative process and creative product were conducted to understand the situations, differences, and the predictive power cloud-based m-learning had in creative performance. A nonequivalent pretest–posttest design was adopted, and 123 university students from Taipei City, Taiwan,were recruited as research participants in the study during 10-weeks experiment. They were asked to complete a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. ヒューマノイドまたはAndroidは地球を破壊しますか? -「心を作成する方法」のレビュー (How to Create a mind) by Ray Kurzweil (2012) (レビュー改訂2019).Michael Richard Starks - 2020 - In 地獄へようこそ 赤ちゃん、気候変動、ビットコイン、カルテル、中国、民主主義、多様性、ディスジェニックス、平等、ハッカー、人権、イスラム教、自由主義、繁栄、ウェブ、カオス、飢餓、病気、暴力、人工知能、戦争. Las Vegas,NV , USA: Reality Press. pp. 145-157.
    数年前、私は本のタイトルから、あるいは少なくとも章のタイトルから、どのような哲学的な間違いが起こり、どのくらいの頻度で分かることができるところまで達しました。名目上の科学的な研究の場合、これらは主に哲 学的なワックスや作品の意味または長期的な意義に関する一般的な結論を引き出そうとする特定の章に制限される可能性があります-。しかし、通常、事実の科学的な問題は、これらの事実が何を意味するのかについて、哲 学的なちんぷんかんぷんと寛大に絡み合っています。ヴィトゲンシュタインが約80年前に科学的な問題と様々な言語ゲームによる記述の間で述べた明確な区別はめったに考慮されないので、1つは交互に科学に驚き、その 支離滅裂な分析に失望しています。だから、このボリュームです。 多かれ少なかれ私たちのような心を作るのであれば、合理性と思考の2つのシステム(二重プロセス理論)の理解のための論理的な構造を持っている必要があります。このことについて哲学するならば、事実の科学的問題と 、問題となっている文脈における言語の仕組みの哲学的問題と、還元主義とサイエンティズムの落とし穴を避ける方法の区別を理解する必要がありますが、カーツワイルは、ほとんどの行動学生と同様に、ほとんど手がかり がない。彼はモデル、理論、概念、そして説明したいという衝動に魅了されていますが、ヴィトゲンシュタインは、私たちが記述する必要があり、理論、概念などは、明確なテストを持っている限り価値のある言語(言語ゲ ーム)を使用する方法にすぎないことを示しました(明確な真実主義者、またはジョン・サール(AIの最も有名な批評家)が言うのが好きです。私は最近の著作でこれに関するスタートを提供しようとしました。 現代の2つのシス・エムスの見解から人間の行動のための包括的な最新の枠組みを望む人は、私の著書「ルートヴィヒ・ヴィトゲンシュタインとジョン・サールの第2回(2019)における哲学、心理学、ミンと言語の論 理的構造」を参照することができます。私の著作の多くにご興味がある人は、運命の惑星における「話す猿--哲学、心理学、科学、宗教、政治―記事とレビュー2006-2019 第3回(2019)」と21世紀4日(2019年)の自殺ユートピア妄想st Century 4th ed (2019)などを見ることができます。 .
    Download  
     
    Export citation  
     
    Bookmark  
  43. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Traducere şi traducători.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    Include Ghidul Comisiei Europene pentru traducătorii din Uniunea Europeană Despre traducere şi traducători, teorii ale traducerilor, traducerea asistată pe calculator, şi software utilizat în traduceri. Include Ghidul Comisiei Europene pentru traducătorii din Uniunea Europeană şi legislaţia specifică traducerilor şi traducătorilor. Fidelitatea (sau loialitatea) şi transparenţa, idealurile duale în traducere, sunt de multe ori în conflict. Problema fidelităţii versus transparenţă a fost formulată şi în termeni de “echivalenţă formală” şi ” echivalenţă dinamică, sau funcţională“. Cele din urmă expresii sunt asociate cu (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Automated Theorem Proving and Its Prospects. [REVIEW]Desmond Fearnley-Sander - 1995 - PSYCHE: An Interdisciplinary Journal of Research On Consciousness 2.
    REVIEW OF: Automated Development of Fundamental Mathematical Theories by Art Quaife. (1992: Kluwer Academic Publishers) 271pp. Using the theorem prover OTTER Art Quaife has proved four hundred theorems of von Neumann-Bernays-Gödel set theory; twelve hundred theorems and definitions of elementary number theory; dozens of Euclidean geometry theorems; and Gödel's incompleteness theorems. It is an impressive achievement. To gauge its significance and to see what prospects it offers this review looks closely at the book and the proofs it presents.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Abstractions and Implementations.Russ Abbott - manuscript
    Fundamental to Computer Science is the distinction between abstractions and implementations. When that distinction is applied to various philosophical questions it yields the following conclusions. -/- • EMERGENCE. It isn’t as mysterious as it’s made out to be; the possibility of strong emergence is not a threat to science. -/- • INTERACTIONS BETWEEN HIGHER-LEVEL ENTITIES. Physical interaction among higher-level entities is illusory. Abstract interactions are the source of emergence, new domains of knowledge, and complex systems. -/- • PHYSICS and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Virtue theory of mathematical practices: an introduction.Andrew Aberdein, Colin Jakob Rittberg & Fenner Stanley Tanswell - 2021 - Synthese 199 (3-4):10167-10180.
    Until recently, discussion of virtues in the philosophy of mathematics has been fleeting and fragmentary at best. But in the last few years this has begun to change. As virtue theory has grown ever more influential, not just in ethics where virtues may seem most at home, but particularly in epistemology and the philosophy of science, some philosophers have sought to push virtues out into unexpected areas, including mathematics and its philosophy. But there are some mathematicians already there, ready (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 997