Results for 'Cloud of Particle'

943 found
Order:
  1. Double Slit Experiment About Fuzzy time- Particle interpretation of Quantum Mechanics (It is not an innocent one!) Version two.Farzad Didehvar - manuscript
    The question of some of the friends is: -/- How is it possible to explain “Double slit experiment” by “Fuzzy time-Particle Interpretation”?
    Download  
     
    Export citation  
     
    Bookmark  
  2.  62
    Active Nano Diamond Particles, Having Special Electronic Features, Are The Founders Of Completely New Types Of High-power Nano Electronic Devices.Afshin Rashid - 2024 - Authorea 3.
    Nowadays, many semiconductors such as silicon are used in a wide range of nanoelectronic devices. However, due to the range of thermal changes and its extremely high speed, nano diamond is only compared to gold nanoparticles, which is the second best nano semiconductor in the world. Nano graphite and graphene nano strips are electrically conductive due to cloud scattering. Active nano diamond particles with such features, especially electronic ones, can be the foundation of completely new types of powerful nano (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  49
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), sulfur (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. On Cellular Automata Representation of Submicroscopic Physics: From Static Space to Zuse’s Calculating Space Hypothesis.Victor Christianto, Volodymyr Krasnoholovets & Florentin Smarandache - manuscript
    In some recent papers (G. ‘t Hooft and others), it has been argued that quantum mechanics can arise from classical cellular automata. Nonetheless, G. Shpenkov has proved that the classical wave equation makes it possible to derive a periodic table of elements, which is very close to Mendeleyev’s one, and describe also other phenomena related to the structure of molecules. Hence the classical wave equation complements Schrödinger’s equation, which implies the appearance of a cellular automaton molecular model starting from classical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Instead of Particles and Fields: A Micro Realistic Quantum "Smearon" Theory.Nicholas Maxwell - 1982 - Foundatioins of Physics 12 (6):607-631.
    A fully micro realistic, propensity version of quantum theory is proposed, according to which fundamental physical entities - neither particles nor fields - have physical characteristics which determine probabilistically how they interact with one another . The version of quantum "smearon" theory proposed here does not modify the equations of orthodox quantum theory: rather, it gives a radically new interpretation to these equations. It is argued that there are strong general reasons for preferring quantum "smearon" theory to orthodox quantum theory; (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  6.  76
    Swarm of particles moving at the speed of light in quantum entanglement: The Origin of conscious World.Zheng Huang - manuscript
    This paper primarily investigates the following questions: The first question:What is the basic structure of consciousness? I proposed that objects moving at the speed of light form the fundamental structure of consciousness. The second question:How is the unified field of the conscious self formed? The study suggests that countless particles moving at the speed of light, through quantum entanglement, form the unified field of each individual's consciousness. Each individual's unified field consists of countless particles originating from a source, which can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Supernatural Resurrection and its Incompatibility with the Standard Model of Particle Physics: Second Rejoinder to Stephen T. Davis.Robert Greg Cavin & Carlos A. Colombetti - 2021 - Socio-Historical Examination of Religion and Ministry 3 (2):253-277.
    In response to Stephen Davis’s criticism of our previous essay, we revisit and defend our arguments that the Resurrection hypothesis is logically incompatible with the Standard Model of particle physics—and thus is maximally implausible—and that it cannot explain the sensory experiences of the Risen Jesus attributed to various witnesses in the New Testament—and thus has low explanatory power. We also review Davis’s reply, noting that he evades our arguments, misstates their conclusions, and distracts the reader with irrelevancies regarding, e.g., (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  53
    The Particle of Haag's Local Quantum Physics: A critical assessment.Gregg Jaeger - 2024 - Entropy 26:748.
    Rudolf Haag’s Local Quantum Physics (LQP) is an alternative framework to conventional relativistic quantum field theory for combining special relativity and quantum theory based on first principles, making it of great interest for the purposes of conceptual analysis despite currently being relatively limited as a tool for making experimental predictions. In LQP, the elementary particles are defined as species of causal link between interaction events, together with which they comprise its most fundamental entities. This notion of particle has yet (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10. Gauge Symmetry and Invariant Features of Particles and Photons: Insights into Duality, Time’s Arrow and Nonlocality.Paul Klevgard - manuscript
    Particles and photons appear to be total opposites; the former has rest mass which requires space to exist; the latter has kinetic energy which requires time to occur (oscillate). But they do share certain properties (e.g., quantization) that remain invariant when one is transformed (swapped) for the other. This gauge invariance is developed in some detail. The symmetry between particle and photon turns out to be one of inversion. It is the equalities of special relativity that support this inversion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. The Elementary Particles of Quantum Fields.Gregg Jaeger - 2021 - Entropy 11 (23):1416.
    The elementary particles of relativistic quantum field theory are not simple field quanta, as has long been assumed. Rather, they supplement quantum fields, on which they depend but to which they are not reducible, as shown here with particles defined instead as a unified collection of properties that appear in both physical symmetry group representations and field propagators. This notion of particle provides consistency between the practice of particle physics and its basis in quantum field theory.
    Download  
     
    Export citation  
     
    Bookmark  
  14. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Effects of Cloud Mobile Learning and Creative Environment on Student’s Creative Performances.Chen Si Yi - unknown
    The Purpose of this study was to investigate the effect of cloud mobile learning and creative environment on college student’s creativity performance. A nonequivalent pretest-posttest quasi-experimental design was used in this research. The objects were two freshman classes selected from a public university and randomly assigned to the experimental group and the control group. A learning activity named Amphibious Mechanical Beast was conducted in this teaching experiment. The experimental was taught using cloud mobile learning, while the control group (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  28
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Localizability and Elementary Particles.Gregg Jaeger - 2020 - Journal of Physics: Conference Series 1638:012010.
    The well-definedness of particles of any kind depends on the limits, approximations, or other conditions that may or may not be involved, for example, whether there are interactions and whether ostensibly related energy is localizable. In particular, their theoretical status differs between its non-relativistic and relativistic versions: One can properly define interacting elementary particles in single-system non-relativistic quantum mechanics, at least in the case of non-zero mass systems; by contrast, one is severely challenged to define even these properly in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   162 citations  
  19. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  37
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Manifestly Covariant Lagrangians, Classical Particles with Spin, and the Origins of Gauge Invariance.Jacob Barandes - manuscript
    In this paper, we review a general technique for converting the standard Lagrangian description of a classical system into a formulation that puts time on an equal footing with the system's degrees of freedom. We show how the resulting framework anticipates key features of special relativity, including the signature of the Minkowski metric tensor and the special role played by theories that are invariant under a generalized notion of Lorentz transformations. We then use this technique to revisit a classification of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Effects of Cloud-based M-learning on Student Motivation and Creative Performance: A Case Study on Computer illustration Course.I.-Fan Tsai - unknown
    This study was conducted to explore the effects of cloud-based m- learning on students’ motivation and creative performance in computer illustration course. Variables of motivation, creative behavior, creative process and creative product were conducted to understand the situations, differences, and the predictive power cloud-based m-learning had in creative performance. A nonequivalent pretest–posttest design was adopted, and 123 university students from Taipei City, Taiwan,were recruited as research participants in the study during 10-weeks experiment. They were asked to complete a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Unobservability of short-lived particles: ground for skepticism about observational claims in elementary particle physics.Marcoen J. T. F. Cabbolet - manuscript
    The physics literature contains many claims that elementary particles have been observed: such observational claims are, of course, important for the development of existential knowledge. Regarding claimed observations of short-lived unstable particles in particular, the use of the word 'observation' is based on the convention in physics that the observation of a short-lived unstable particle can be claimed when its predicted decay products have been observed with a significance of 5 sigma. This paper, however, shows that this 5 sigma (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Outlines of Rutherford’s α-Particles Scattering Experiment.Arjun Dahal & Nikita Parajuli - 2018 - Journal of St.Xavier's Physics Council.
    Rutherford’s α-particles scattering experiment was one of the milestone for the physics community as it provided an insight to an atom thus discarding the previously prevailed Thomson’s model. Through this article we shall examine the theoretical formulation of Rutherford’s experiment and how it helped to shape the modern physics.
    Download  
     
    Export citation  
     
    Bookmark  
  26. SINGULARITIES About Fuzzy time- Particle interpretation of Quantum Mechanics (It is not an innocent one!) Version two.Farzad Didehvar - manuscript
    Here, we show that by accepting Fuzzy time-Particle interpretation of Quantum Mechanics, the singularities in the new Model are vanished.
    Download  
     
    Export citation  
     
    Bookmark  
  27. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  28. Persistence and Nonpersistence as Complementary Models of Identical Quantum Particles.Philip Goyal - 2019 - New Journal of Physics 21.
    According to our understanding of the everyday physical world, observable phenomena are underpinned by persistent objects that can be reidentified across time by observation of their distinctive properties. This understanding is reflected in classical mechanics, which posits that matter consists of persistent, reidentifiable particles. However, the mathematical symmetrization procedures used to describe identical particles within the quantum formalism have led to the widespread belief that identical quantum particles lack either persistence or reidentifiability. However, it has proved difficult to reconcile these (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Avoiding reification: Heuristic effectiveness of mathematics and the prediction of the omega minus particle.Michele Ginammi - 2016 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 53:20-27.
    According to Steiner (1998), in contemporary physics new important discoveries are often obtained by means of strategies which rely on purely formal mathematical considerations. In such discoveries, mathematics seems to have a peculiar and controversial role, which apparently cannot be accounted for by means of standard methodological criteria. M. Gell-Mann and Y. Ne׳eman׳s prediction of the Ω− particle is usually considered a typical example of application of this kind of strategy. According to Bangu (2008), this prediction is apparently based (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Does accepting Fuzzy Time-Particle interpretation of Quantum Mechanics, refute the other interpretations? (Is fuzziness of time checkable experimentally?).Farzad Didehvar - manuscript
    Throughout this paper, in a nutshell we try to show a way to check Fuzzy time in general and Fuzzy time-Particle interpretation of Quantum Mechanics, experimentally. . -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  32. About Fuzzy time-Particle interpretation of Quantum Mechanics (it is not an innocent one!) version one.Farzad Didehvar - manuscript
    The major point in [1] chapter 2 is the following claim: “Any formalized system for the Theory of Computation based on Classical Logic and Turing Model of Computation leads us to a contradiction.” So, in the case we wish to save Classical Logic we should change our Computational Model. As we see in chapter two, the mentioned contradiction is about and around the concept of time, as it is in the contradiction of modified version of paradox. It is natural to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  34
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Information particle.Minh-Hoang Nguyen & Tam-Tri Le - manuscript
    We propose an approach of treating information as an intermediate (or medium). The intermediate can be thought of as an information particle. That particle has three main properties.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  83
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Quantum propensiton theory: A testable resolution of the wave/particle dilemma.Nicholas Maxwell - 1988 - British Journal for the Philosophy of Science 39 (1):1-50.
    In this paper I put forward a new micro realistic, fundamentally probabilistic, propensiton version of quantum theory. According to this theory, the entities of the quantum domain - electrons, photons, atoms - are neither particles nor fields, but a new kind of fundamentally probabilistic entity, the propensiton - entities which interact with one another probabilistically. This version of quantum theory leaves the Schroedinger equation unchanged, but reinterprets it to specify how propensitons evolve when no probabilistic transitions occur. Probabilisitic transitions occur (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  39. Clock System or Cloud System?: Applying Popper's Metaphor to the Study of Human Consciousness.Hillary S. Webb - 2012 - Paranthropology 3 (4).
    The question of what human consciousness “is,” how it “works,” and what it “does” is currently being approached by myriad fields of study, each with their own particular goals and research techniques. But despite the undeniably complex nature of this enigmatic phenomenon, the prevailing scientific and institutional paradigm seems to imply that only quantitative, experimentally focused approaches are a worthy means of illuminating “truth” about human consciousness. -/- In this paper, I begin by borrowing Popper’s metaphor of “clock systems” versus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  36
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  32
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. On the angular momentum of a system of quantum particles.O. Chavoya-Aceves - manuscript
    The properties of angular momentum and its connection to magnetic momentum are explored, based on a reconsideration of the Stern-Gerlach experiment and gauge invariance. A possible way to solve the so called spin crisis is proposed. The separation of angular momentum of a quantum system of particles into orbital angular momentum plus intrinsic angular momentum is reconsidered, within the limits of the Schr\"odinger theory. A proof is given that, for systems of more than two particles, unless all of them have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. On the angular momentum of a system of quantum particles.Oscar Chavoya Aceves - manuscript
    The properties of angular momentum and its connection to magnetic momentum are explored, based on a reconsideration of the Stern-Gerlach experiment and gauge invariance. A possible way to solve the so called spin crisis is proposed. The separation of angular momentum of a quan- tum system of particles into orbital angular momentum plus intrinsic angular momentum is reconsidered, within the limits of the Schrodinger theory. A proof is given that, for systems of more than two particles, un- less all of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  22
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Triple-Aspect Monism and the Ontology of Quantum Particles.Gilbert B. Côté - 2013 - Open Journal of Philosophy 3 (4):451.
    An analysis of the physical implications of abstractness reveals the reality of three interconnected modes of existence: abstract, virtual and concrete, corresponding in physics to information, energy and matter. This triple-aspect monism clarifies the ontological status of subatomic quantum particles. It also provides a non-spooky solution to the weirdness of quantum physics and a new outlook for the mind-body problem. The ontological implications are profound for both physics and philosophy.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. (1 other version)Louise Amoore: Cloud Ethics. Algorithms and the Attributes of Ourselves and Others.Anna-Verena Nosthoff & Felix Maschewski - 2021 - Behemoth. A Journal on Civilisation 14 (2).
    Download  
     
    Export citation  
     
    Bookmark  
  49. Gauge Invariance for Classical Massless Particles with Spin.Jacob A. Barandes - 2021 - Foundations of Physics 51 (1):1-14.
    Wigner's quantum-mechanical classification of particle-types in terms of irreducible representations of the Poincaré group has a classical analogue, which we extend in this paper. We study the compactness properties of the resulting phase spaces at fixed energy, and show that in order for a classical massless particle to be physically sensible, its phase space must feature a classical-particle counterpart of electromagnetic gauge invariance. By examining the connection between massless and massive particles in the massless limit, we also (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. (UN)FOLDING TIME A PHILOSOPHICAL ANALYSIS OF “CLOUD ATLAS” (2012).Gustavo Ruiz da Silva & Eberval Gadelha Figueiredo Jr - 2024 - Paralaxe 9 (1):18-33.
    This paper examines the film "Cloud Atlas" (2012), directed by Lana Wachowski, Tom Tykwer, and Lilly Wachowski, through a philosophical lens. It explores the narrative structure and creative choices of the film, comparing it to the original book by David Mitchell. The analysis focuses on the film's editing and its impact on the portrayal of time, while drawing on Gilles Deleuze's concept of “the fold” and Pierre Klossowski's notion of “vicious circle”. By investigating these philosophical ideas, the paper offers (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 943