Results for 'Cloud services'

999 found
Order:
  1. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  3. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  58
    Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary to structure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  84
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  15. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected over a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  58
    Single Valued Neutrosophic HyperSoft Set based on VIKOR Method for 5G Architecture Selection.Florentin Smarandache, M. Ali Ahmed & Ahmed Abdelhafeez - 2024 - International Journal of Neutrosophic Science 23 (2):42-52.
    This work introduces the framework for selecting architecture in 5G networks, considering various technological, performance, economic, and operational factors. With the emergence of 5G technology, the architecture selection process has become pivotal in meeting diverse requirements for ultra-high-speed connectivity, low latency, scalability, and diverse service demands. The evaluation comprehensively analyses different architecture options, including centralized, distributed, cloud-based, and virtualized architectures. Factors such as network performance, scalability, cost-effectiveness, security, and compatibility are considered within a multi-criteria decision-making framework. Findings reveal each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter provides a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  78
    MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works of domestic and foreign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice command given (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  68
    Public service ethics from the perspective of digitalization / Этика государственной службы в ракурсе цифровизации.Pavel Simashenkov - 2023 - In Социальные коммуникации: философские, политические, религиозные, культурно-исторические измерения. Сборник статей III Всероссийской научно-практической конференции с международным участием. Под общей редакцией О.Ф. Гаврилова, О.И. Жуковой, С.Н. Чируна. Ке. pp. 368-372.
    The article analyzes approaches to the ethicalization of officialdom in the realities of digitalization. The author believe that demonstrative behavior harms the authority of public service. Administrative ethics should be based on traditional values, the main of which are deemed to be integrity and loyalty to the Motherland. В статье анализируются подходы к этизации чиновничества в реалиях цифровизации. Автор полагает, что демонстративность поведения вредит авторитету государственной службы. Административная этика должна базироваться на традиционных ценностях, главными из которых почитаются принципиальность и верность (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Ontology as Product-Service System: Lessons Learned from GO, BFO and DOLCE.Barry Smith - 2019 - In David Limbaugh, David Kasmier, Werner Ceusters & Barry Smith (eds.), Proceedings of the International Conference on Biomedical Ontology (ICBO), Buffalo, NY. Buffalo:
    This paper defends a view of the Gene Ontology (GO) and of Basic Formal Ontology (BFO) as examples of what the manufacturing industry calls product-service systems. This means that they are products (the ontologies) bundled with a range of ontology services such as updates, training, help desk, and permanent identifiers. The paper argues that GO and BFO are contrasted in this respect with DOLCE, which approximates more closely to a scientific theory or a scientific publication. The paper provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Services de renseignement.Nicolae Sfetcu - manuscript
    Les services de renseignement sont des agences gouvernementales chargées de la collecte et de l'analyse du renseignement sensible afin de garantir la sécurité et la défense nationales. Les méthodes d'obtenir le renseignement peuvent inclure l'espionnage, l'interception de communications, l'analyse cryptographique, la coopération avec d'autres institutions et l'évaluation des sources publiques. Les services de renseignement se concentrent actuellement sur la lutte contre le terrorisme, ne laissant que relativement peu de ressources pour surveiller les autres menaces à la sécurité. DOI: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  98
    The Cloud.Victor Adelino Ausina Mota - manuscript
    from monasticism to modern life, via Saint Francis and Buonaventura, euqating some purposes anda deliberations of an ideal and happy life on this complex world, even so you're not a social scientist or a social worker.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   161 citations  
  34. In Service to Others: A New Evolutionary Perspective on Human Enhancement.Hugh Desmond - 2021 - Hastings Center Report 51 (6):33-43.
    In enhancement ethics, evolutionary theory has been largely perceived as supporting liberal views on enhancement, where decisions to enhance are predominantly regulated by the principle of individual autonomy. In this paper I critique this perception in light of recent scientific developments. Cultural evolutionary theory suggests a picture where individual interests are entangled with community interests, and this undermines the applicability of the principle of autonomy. This is particularly relevant for enhancement ethics, given how – I argue – decisions to enhance (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  74
    NUVEM (Cloud).Mota Victor - manuscript
    knowing and not knowing in a regular social context and the emergente of monastic revolution of the self and its owner.
    Download  
     
    Export citation  
     
    Bookmark  
  36. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  37. Service and Status Competition May Help Explain Perceived Ethical Acceptability.Hugh Desmond - 2020 - American Journal of Bioethics Neuroscience 11 (4):258-260.
    The dominant view on the ethics of cognitive enhancement (CE) is that CE is beholden to the principle of autonomy. However, this principle does not seem to reflect commonly held ethical judgments about enhancement. Is the principle of autonomy at fault, or should common judgments be adjusted? Here I argue for the first, and show how common judgments can be justified as based on a principle of service.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Consulting Services in Agriculture.Nadiia Serskykh & Igor Britchenko - unknown
    At the paper the dynamics of the development of the services market in Ukraine and its structure are analized. The influence of global economic processes on the services market has been studied. The concepts of "services" and "outsourcing" are characterized. Attention is paid to the development of services in the field of informatization and consulting. The main functions of information and consulting services in agriculture are defined. The purpose of the paper is to study and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  99
    Beyond the Goods-Services Continuum.Peter Koch & Barry Smith - 2023 - Proceedings of the International Conference on Biomedical Ontologies (Icbo).
    Governments standardly deploy a distinction between goods and services in assessing economic health and tracking national income statistics, of which medical goods and services carry significant importance. In what follows we draw on Basic Formal Ontology (BFO) to introduce a third kind of entity called patterns, which help capture the various ways in which goods and services are intertwined and help also to show how many services generate a new kind of non-goods-related products. Patterns are an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Learner Support Services and Business Education Students' Readiness for Online Learning at the University of Calabar.Stephen Bepeh Undie, Jenny Ojobi Ibiang, Otu Francis Ejue, Omini Lekam Ibiang & Ezekiel Usip Mfon - 2023 - Prestige Journal of Education 6 (1):93-105.
    This study investigated how learner support services at the University of Calabar predict business education students' preparation for online learning. Two specific objectives were established, two research questions were posed, and two null hypotheses were developed and tested at a significant level of .05. Pertinent literature was reviewed. The population consisted of 147 University of Calabar 400-level business education students. This population also formed the sample using a census process. Data were gathered using a structured questionnaire with 40 items (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Assessing Service Quality in the Ghanaian Private Healthcare Sector: The Case of Comboni Hospital.Fortune Afi Agbi - 2020 - International Journal of Scientific Research and Management (IJSRM) 8 (2).
    The healthcare industry has become a paramount concern for most people in Ghana and the quality of services rendered to the patients in the private hospitals cannot be overemphasized. Patients need quality of services most and are willing to seek better services. The government has been the main provider of health care services in Ghana but recently, some Non-Governmental Organization’s (NGO’s), private individuals and stakeholders also provide health care services which has surged the competitiveness in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Counseling Services as Determinants of Senior Secondary 2 Anti-Social Behaviour in Calabar Education Zone of Cross River State, Nigeria.J. Juan - 2022 - Behaviour and Health 3 (1):183-202.
    This study aims to examine counseling services as determinants of senior secondary 2 students’ anti-social behaviour in Calabar Education Zone of Cross River State, Nigeria. The main independent variable of the study was counseling services which includes informative counseling services, rehabilitation while the dependent variable is anti-social behaviours. Two hypotheses were formulated to direct the study. Ex-post facto research design was adopted for the study. The population of the study consisted of 2686 senior secondary 2 students in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Opening the Door to Cloud-Cuckoo-Land: Hempel and Kuhn on Rationality.Alexander George - 2012 - Journal for the History of Analytical Philosophy 1 (4).
    A reading is offered of Carl Hempel’s and Thomas Kuhn’s positions on, and disagreements about, rationality in science that relates these issues to the debate between W.V. Quine and Rudolf Carnap on the analytic/synthetic distinction.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Option Value, Substitutable Species, and Ecosystem Services.Erik Persson - 2016 - Environmental Ethics 38 (2):165-181.
    The concept of ecosystem services is a way of visualizing the instrumental value that nature has for human beings. Most ecosystem services can be performed by more than one species. This fact is sometimes used as an argument against the preservation of species. However, even though substitutability does detract from the instrumental value of a species, it also adds option value to it. The option value cannot make a substitutable species as instrumentally valuable as a non-substitutable species, but (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Contextualism, Moral Disagreement, and Proposition Clouds.Jussi Suikkanen - 2019 - In Russ Shafer-Landau (ed.), Oxford Studies in Metaethics 14. Oxford: Oxford University Press. pp. 47-69.
    According to contextualist theories in metaethics, when you use a moral term in a context, the context plays an ineliminable part in determining what natural property will be the semantic value of the term. Furthermore, on subjectivist and relativist versions of these views, it is either the speaker's own moral code or her moral community's moral code that constitutes the reference-fixing context. One standard objection to views of this type is that they fail to enable us to disagree in ordinary (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. Effects of Cloud-based M-learning on Student Motivation and Creative Performance: A Case Study on Computer illustration Course.I.-Fan Tsai - unknown
    This study was conducted to explore the effects of cloud-based m- learning on students’ motivation and creative performance in computer illustration course. Variables of motivation, creative behavior, creative process and creative product were conducted to understand the situations, differences, and the predictive power cloud-based m-learning had in creative performance. A nonequivalent pretest–posttest design was adopted, and 123 university students from Taipei City, Taiwan,were recruited as research participants in the study during 10-weeks experiment. They were asked to complete a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Louise Amoore: Cloud Ethics. Algorithms and the Attributes of Ourselves and Others.Anna-Verena Nosthoff & Felix Maschewski - 2021 - Behemoth. A Journal on Civilisation 14 (2).
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999