Results for 'Computational efficiency'

972 found
Order:
  1. A Comprehensive Evaluation and Methodology on Enhancing Computational Efficiency through Accelerated Computing.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):517-525.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  2. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst client and resources. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, energy consumption has a positive correlation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. EXPLORING SERVER-LESS COMPUTING FOR EFFICIENT RESOURCE MANAGEMENT IN CLOUD ARCHITECTURES.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):77-83.
    Server-less computing, also known as Function as a Service (FaaS), revolutionizes cloud architecture by allowing developers to focus on code and functionality without managing underlying infrastructure. This paradigm enhances resource management efficiency by dynamically allocating resources only when needed, thus optimizing cost and performance. Server-less models, epitomized by platforms like AWS Lambda, Google Cloud Functions, and Azure Functions, provide automatic scaling and fine-grained billing, making them ideal for applications with variable workloads. While challenges such as cold start latency and (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  5. Parallel Processing Techniques for Optimizing Data-Intensive Applications on Accelerated Computing Platforms.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-550.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Dynamic Resource Allocation in Accelerated Computing Architectures for Improved Computational Throughput.Prabaharan Manoj - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-545.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Hybrid Accelerated Computing Architecture for Real-Time Data Processing Applications.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):525-535.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Morphological Computation: Nothing but Physical Computation.Marcin Miłkowski - 2018 - Entropy 10 (20):942.
    The purpose of this paper is to argue against the claim that morphological computation is substantially different from other kinds of physical computation. I show that some (but not all) purported cases of morphological computation do not count as specifically computational, and that those that do are solely physical computational systems. These latter cases are not, however, specific enough: all computational systems, not only morphological ones, may (and sometimes should) be studied in various ways, including their energy (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  10. Optimized Workload Distribution Frameworks for Accelerated Computing Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):550-560.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  37
    Efficiency and fairness trade-offs in two player bargaining games.David Freeborn - 2023 - European Journal for Philosophy of Science 13 (4):1-23.
    Recent work on the evolution of social contracts and conventions has often used models of bargaining games, with reinforcement learning. A recent innovation is the requirement that every strategy must be invented either through through learning or reinforcement. However, agents frequently get stuck in highly-reinforced “traps” that prevent them from arriving at outcomes that are efficient or fair to the both players. Agents face a trade-off between exploration and exploitation, i.e. between continuing to invent new strategies and reinforcing strategies that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  76
    Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with Boosting principles. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Equality, Efficiency, and Sufficiency: Responding to Multiple Parameters of Distributive Justice During Charitable Distribution.Colin J. Palmer, Bryan Paton, Linda Barclay & Jakob Hohwy - 2013 - Review of Philosophy and Psychology 4 (4):659-674.
    Distributive justice decision making tends to require a trade off between different valued outcomes. The present study tracked computer mouse cursor movements in a forced-choice paradigm to examine for tension between different parameters of distributive justice during the decision-making process. Participants chose between set meal distributions, to third parties, that maximised either equality (the evenness of the distribution) or efficiency (the total number of meals distributed). Across different formulations of these dilemmas, responding was consistent with the notion that individuals (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Computational capacity of pyramidal neurons in the cerebral cortex.Danko D. Georgiev, Stefan K. Kolev, Eliahu Cohen & James F. Glazebrook - 2020 - Brain Research 1748:147069.
    The electric activities of cortical pyramidal neurons are supported by structurally stable, morphologically complex axo-dendritic trees. Anatomical differences between axons and dendrites in regard to their length or caliber reflect the underlying functional specializations, for input or output of neural information, respectively. For a proper assessment of the computational capacity of pyramidal neurons, we have analyzed an extensive dataset of three-dimensional digital reconstructions from the NeuroMorphoOrg database, and quantified basic dendritic or axonal morphometric measures in different regions and layers (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Tractability and the computational mind.Rineke Verbrugge & Jakub Szymanik - 2018 - In Mark Sprevak & Matteo Colombo, The Routledge Handbook of the Computational Mind. Routledge. pp. 339-353.
    We overview logical and computational explanations of the notion of tractability as applied in cognitive science. We start by introducing the basics of mathematical theories of complexity: computability theory, computational complexity theory, and descriptive complexity theory. Computational philosophy of mind often identifies mental algorithms with computable functions. However, with the development of programming practice it has become apparent that for some computable problems finding effective algorithms is hardly possible. Some problems need too much computational resource, e.g., (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  30
    Advancing Synergy of Computing and Artificial Intelligence with Innovations Challenges and Future Prospects.Maroju Praveen Kumar - 2024 - Fmdb Transactions on Sustainable Intelligent Networks 1 (1):1-14.
    As the systematic revolution converges computing technologies with Artificial Intelligence (AI) applications, various industries have been transformed, ranging from healthcare to finance. This paper presents an extensive review of the progress achieved through this synergy, alongside the challenges and possible future perspectives. The methodology used in this study is a literature review supported by a theoretical model illustrating the integration of AI with computing. The findings reveal that computational capabilities, data processing speeds, and AI model efficiencies have drastically improved. (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  18. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then,cloud desktop for oil (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small applications and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  87
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Epistemic virtues, metavirtues, and computational complexity.Adam Morton - 2004 - Noûs 38 (3):481–502.
    I argue that considerations about computational complexity show that all finite agents need characteristics like those that have been called epistemic virtues. The necessity of these virtues follows in part from the nonexistence of shortcuts, or efficient ways of finding shortcuts, to cognitively expensive routines. It follows that agents must possess the capacities – metavirtues –of developing in advance the cognitive virtues they will need when time and memory are at a premium.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  22. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can deny it and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. On the computational complexity of ethics: moral tractability for minds and machines.Jakob Stenseke - 2024 - Artificial Intelligence Review 57 (105):90.
    Why should moral philosophers, moral psychologists, and machine ethicists care about computational complexity? Debates on whether artificial intelligence (AI) can or should be used to solve problems in ethical domains have mainly been driven by what AI can or cannot do in terms of human capacities. In this paper, we tackle the problem from the other end by exploring what kind of moral machines are possible based on what computational systems can or cannot do. To do so, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  19
    A Survey Paper on Profit Maximization of Cloud Broker in Cloud Computing.Karan Zaveri Sanket Magar - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (2):26-31.
    Today’s world cloud computing becoming so popular because of an effective and efficient way to provide computing resources and services to customers on demand. Cloud computing being an information technology paradigm enables access to shared pools of configurable system resources and higher-level services often over the Internet. The objective of providers is to maximize profits by their price schemes, while the main purpose of clients is to have quality of services for a reasonable price. Thus the vital aim is to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. From Analog to Digital Computing: Is Homo sapiens’ Brain on Its Way to Become a Turing Machine?Antoine Danchin & André A. Fenton - 2022 - Frontiers in Ecology and Evolution 10:796413.
    The abstract basis of modern computation is the formal description of a finite state machine, the Universal Turing Machine, based on manipulation of integers and logic symbols. In this contribution to the discourse on the computer-brain analogy, we discuss the extent to which analog computing, as performed by the mammalian brain, is like and unlike the digital computing of Universal Turing Machines. We begin with ordinary reality being a permanent dialog between continuous and discontinuous worlds. So it is with computing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  28
    How Cloud Computing Revolutionizes Human Capital Management.Harish Kumar Reddy Kommera - 2019 - Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10 (2):2018-2031.
    The advent of cloud computing has fundamentally transformed various business operations, with Human Capital Management (HCM) standing out as a significant beneficiary. Cloud-based HCM solutions offer unparalleled scalability, accessibility, and integration capabilities, enabling organizations to manage their workforce more efficiently and strategically. This paper explores the revolutionary impact of cloud computing on HCM, highlighting key advancements such as enhanced data analytics, improved employee engagement, cost-effectiveness, and support for remote and hybrid work models. Through a comprehensive literature review and analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management complexities in optimizing (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  29. Taxonomy for Humans or Computers? Cognitive Pragmatics for Big Data.Beckett Sterner & Nico M. Franz - 2017 - Biological Theory 12 (2):99-111.
    Criticism of big data has focused on showing that more is not necessarily better, in the sense that data may lose their value when taken out of context and aggregated together. The next step is to incorporate an awareness of pitfalls for aggregation into the design of data infrastructure and institutions. A common strategy minimizes aggregation errors by increasing the precision of our conventions for identifying and classifying data. As a counterpoint, we argue that there are pragmatic trade-offs between precision (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30.  39
    Generative AI in Graph-Based Spatial Computing: Techniques and Use Cases.Sankara Reddy Thamma Sankara Reddy Thamma - 2024 - International Journal of Scientific Research in Science and Technology 11 (2):1012-1023.
    Generative AI has proven itself as an efficient innovation in many fields including writing and even analyzing data. For spatial computing, it provides a potential solution for solving such issues related to data manipulation and analysis within the spatial computing domain. This paper aims to discuss the probabilities of applying generative AI to graph-based spatial computing; to describe new approaches in detail; to shed light on their use cases; and to demonstrate the value that they add. This technique thus incorporates (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  33
    Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
    Cloud computing has revolutionized data management for businesses and individuals a like, ushering in an era of unprecedented accessibility and scalability. As demand for cloud services continues to surge, the imperative for efficient and secure systems becomes paramount. One approach to meeting this challenge is the consolidation of virtual machines onto fewer physical servers, optimizing resource utilization and yielding significant energy savings. Moreover, this consolidation strategy bolsters overall security by enabling more effective monitoring and control of virtual machine instances. Through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Support-Neutrosophic Set: A New Concept in Soft Computing.Nguyen Xuan Thao, Florentin Smarandache & Nguyen Van Dinh - 2017 - Neutrosophic Sets and Systems 16:93-98.
    Today, soft computing is a field that is used a lot in solving real-world problems, such as problems in economics, finance, banking... With the aim to serve for solving the real problem, many new theories and/or tools which were proposed, improved to help soft computing used more efficiently. We can mention some theories as fuzzy sets theory (L. Zadeh, 1965), intuitionistic fuzzy set (K Atanasov, 1986), neutrosophic set (F. Smarandache 1999). In this paper, we introduce a new notion of sup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Developing an Expert System to Computer Troubleshooting.Faten El Kahlout & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (6):16-26.
    There is no doubt that Computer troubleshooting is important for organizations and companies and for personal use level. Sound cards troubles is one of the most annoying problems in computers. It causes damage and troubles in computers to persons, organizations and firms. Correctly, expert systems can greatly help to avoid damage to these computers. designed to diagnose and troubleshoot issues related to sound cards in computer systems. The expert system is developed using a combination of rule-based and machine learning approaches, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. Assyrian Merchants meet Nuclear Physicists: History of the Early Contributions from Social Sciences to Computer Science. The Case of Automatic Pattern Detection in Graphs (1950s-1970s).Sébastien Plutniak - 2021 - Interdisciplinary Science Reviews 46 (4):547-568.
    Community detection is a major issue in network analysis. This paper combines a socio-historical approach with an experimental reconstruction of programs to investigate the early automation of clique detection algorithms, which remains one of the unsolved NP-complete problems today. The research led by the archaeologist Jean-Claude Gardin from the 1950s on non-numerical information and graph analysis is retraced to demonstrate the early contributions of social sciences and humanities. The limited recognition and reception of Gardin's innovative computer application to the humanities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Development of an Offline Computer- Based Assessment Tool in Statistics and Probability Utilizing MS PowerPoint and MS Excel.Cherry Mae Cabrera & Jupeth Pentang - 2023 - International Journal of Science, Technology, Engineering and Mathematics 3 (4):73-100.
    This capstone project aimed to develop an offline computer-based assessment (CBA) tool that uses a computer instead of a traditional paper test in evaluating student learning. This addresses the difficulties faced by teachers in administering quarterly assessments. Incorporating technology into student assessment can increase student interest because of the immediate feedback generated automatically and can help teachers improve their work performance. This capstone project employed a developmental approach and utilized a modified ADDIE (Analysis, Design, and Development) model to design the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Theory of Fuzzy Time Computation (2) (TC+CON(〖TC*〗)ͰP≠NP).Didehvar Farzad - manuscript
    Throughout this paper, we prove TC+CON(〖TC*〗 )ͰP≠NP. To do that, firstly, we introduce the definition of scope*. This definition is based on the practical situation of computation in the real world. In the real world and real computational activities, we face a finite number of efficiently computable functions which work in a limited time. Inspired by this fact and considering time as a fuzzy concept, we have the definition. By employing this definition, we reach a world of computation in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  30
    A Review of the Scope_ of Cloud Computing In Education (7th edition).Prof Mahendra Kumar B. Hritik Raj, - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (7):13230-13234.
    With the capability of using virtualized resources as a service, over the Internet, and having dynamic scalability, cloud computing has started to gain momentum across many types of enterprises. It is probably going to have a big effect on the future of schooling. Cloud computing, hence, offers a great opportunity for learning institutions, especially the less privileged ones, to efficiently manage their information system without having to spend additional money purchasing more computers and networking equipment. The universities make use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  18
    Heart Disease Prediction and Suggestion in Efficient Way through Machine Learning Method.I. Krishna Mohan Reddy D. Lakshmi Narayana - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (3):229-233.
    The Healthcare industry generally clinical diagnosis is done mostly by doctor’s expertise and experience. Computer Aided Decision Support System plays a major role in medical field. Data mining techniques and machine learning algorithms play a very important role in this area. The researchers accelerating their research works to develop a software with the help machine learning algorithm which can help doctors to take decision regarding both prediction and diagnosing of heart disease. The main objective of this research paper is predicting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  22
    POST-QUANTUM CRYPTOGRAPHY: PREPARING FOR A QUANTUM COMPUTING ERA.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-6.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  63
    Advancements in AI-Driven Communication Systems: Enhancing Efficiency and Security in Next-Generation Networks (13th edition).Palakurti Naga Ramesh - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):28-36.
    The increasing complexity and demands of next-generation networks necessitate the integration of Artificial Intelligence (AI) to enhance their efficiency and security. This article explores advancements in AI-driven communication systems, focusing on optimizing network performance, ensuring robust security measures, and addressing the challenges of scalability and real-time adaptability. By analyzing case studies, emerging technologies, and recent research, this study highlights AI's transformative potential in redefining communication systems for future applications.
    Download  
     
    Export citation  
     
    Bookmark  
  47.  28
    Survey on Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.Dr Uma Godase Megha Shah - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 9 (7):7987-7991.
    Data shared in the cloud allows many numerous people exchange their data in a group that helps improve environmental work efficiency. It is a challenging task today how we can assure data security in a single group and also how to share the data with multiple group members, and for it we use a key agreement protocol to share our data in a safe group. In this article we demonstrate a new conceptual agreement protocol, which contributes to the participation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Optimized Energy Numbers Continued.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:12.
    In this paper, we explore the properties and optimization techniques related to polyhedral cones and energy numbers with a focus on the cone of positive semidefinite matrices and efficient computation strategies for kernels. In Part (a), we examine the polyhedral nature of the cone of positive semidefinite matrices, , establishing that it does not form a polyhedral cone for due to its infinite dimensional characteristics. In Part (b), we present an algorithm for efficiently computing the kernel function on-the-fly, leveraging a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  96
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 972