Results for 'Data Based System'

905 found
Order:
  1. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  2. Developing a Knowledge-Based System for Diagnosis and Treatment Recommendation of Neonatal Diseases Using CLIPS.Nida D. Wishah, Abed Elilah Elmahmoum, Husam A. Eleyan, Walid F. Murad & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (6):38-50.
    A newborn baby is an infant within the first 28 days of birth. Diagnosis and treatment of infant diseases require specialized medical resources and expert knowledge. However, there is a shortage of such professionals globally, particularly in low-income countries. To address this challenge, a knowledge-based system was designed to aid in the diagnosis and treatment of neonatal diseases. The system utilizes both machine learning and health expert knowledge, and a hybrid data mining process model was used (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Knowledge-based systems that determine the appropriate students major: In the faculty of engineering and information technology.Samy S. Abu Naser & Ihab S. Zaqout - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (10):26-34.
    In this paper a Knowledge-Based System (KBS) for determining the appropriate students major according to his/her preferences for sophomore student enrolled in the Faculty of Engineering and Information Technology in Al-Azhar University of Gaza was developed and tested. A set of predefined criterions that is taken into consideration before a sophomore student can select a major is outlined. Such criterion as high school score, score of subject such as Math I, Math II, Electrical Circuit I, and Electronics I (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. AI training data, model success likelihood, and informational entropy-based value.Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    Since the release of OpenAI's ChatGPT, the world has entered a race to develop more capable and powerful AI, including artificial general intelligence (AGI). The development is constrained by the dependency of AI on the model, quality, and quantity of training data, making the AI training process highly costly in terms of resources and environmental consequences. Thus, improving the effectiveness and efficiency of the AI training process is essential, especially when the Earth is approaching the climate tipping points and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  72
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Ontology-based fusion of sensor data and natural language.Erik Thomsen & Barry Smith - 2018 - Applied ontology 13 (4):295-333.
    We describe a prototype ontology-driven information system (ODIS) that exploits what we call Portion of Reality (POR) representations. The system takes both sensor data and natural language text as inputs and composes on this basis logically structured POR assertions. The goal of our prototype is to represent both natural language and sensor data within a single framework that is able to support both axiomatic reasoning and computation. In addition, the framework should be capable of discovering and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. OmniSearch: a semantic search system based on the Ontology for MIcroRNA Target Gene Interaction data.Huang Jingshan, Gutierrez Fernando, J. Strachan Harrison, Dou Dejing, Huang Weili, A. Blake Judith, Barry Smith, Eilbeck Karen, A. Natale Darren & Lin Yu - 2016 - Journal of Biomedical Semantics 7 (1):1.
    In recent years, sequencing technologies have enabled the identification of a wide range of non-coding RNAs (ncRNAs). Unfortunately, annotation and integration of ncRNA data has lagged behind their identification. Given the large quantity of information being obtained in this area, there emerges an urgent need to integrate what is being discovered by a broad range of relevant communities. To this end, the Non-Coding RNA Ontology (NCRO) is being developed to provide a systematically structured and precisely defined controlled vocabulary for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Web-Based Complaints Service Information System at Dewantara District Office.Aslam Amrina, Khoirul Islam, I. Ketut Sutapa, Kurniawansyah Kurniawansyah, Dahlan Abdullah & Zalfie Ardian - 2024 - International Journal of Engineering, Science and Informationtechnology 4 (1):33-38.
    The Complaint Service Information System is a web-based platform designed for the Dewantara District Office. The title Complaint Service Information System is based on the need for technological solutions to improve the quality of public services, especially in han-dling public complaints. This system was chosen because it facilitates more efficient complaint reporting, increases transparency, and speeds up responses to issues raised by the public. By applying information technology in handling complaints, it is hoped that we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A Semantics-Based Common Operational Command System for Multiagency Disaster Response.Linda Elmhadhbi, Mohamed-Hedi Karray, Bernard Archimède, J. Neil Otte & Barry Smith - 2022 - IEEE Transactions on Engineering Management 69 (6):3887 - 3901.
    Disaster response is a highly collaborative and critical process that requires the involvement of multiple emergency responders (ERs), ideally working together under a unified command, to enable a rapid and effective operational response. Following the 9/11 and 11/13 terrorist attacks and the devastation of hurricanes Katrina and Rita, it is apparent that inadequate communication and a lack of interoperability among the ERs engaged on-site can adversely affect disaster response efforts. Within this context, we present a scenario-based terrorism case study (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Level of Practice in the Implementation of DepEd’s Results-Based Performance Management System (RPMS).Deo Urbano & Melanie Gurat - 2023 - International Journal of Research Publication and Reviews 4 (8):1078-1090.
    This quantitative study assessed the implementation of the Results-based Performance Management System (RPMS) in evaluating teachers' performance in the Department of Education (DepEd) Schools Division of Nueva Vizcaya. Data were gathered through a survey, and the findings revealed that coaches and raters implemented RPMS to a very great extent, likely motivated by the Performance-Based Incentive System (PBIS). However, certain indicators showed incomplete implementation. The study highlights the importance of orientation, training, and strengthening recognition programs to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Intelligent Neurtosophic Diagnostic System for Cardiotcography data.Belal Amin, A. A. Salama, Mona G. Gafar & Khaled Mahfouz, - 2021 - Computational Intelligence and Neuroscience 2021:15-21.
    Cardiotocography data uncertainty is a critical task for the classification in biomedical field. Constructing good and efficient classifier via machine learning algorithms is necessary to help doctors in diagnosing the state of fetus heart rate. *e proposed neutrosophic diagnostic system is an Interval Neutrosophic Rough Neural Network framework based on the backpropagation algorithm. It benefits from the advantages of neutrosophic set theory not only to improve the performance of rough neural networks but also to achieve a better (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Design of Interface System With Hmi (Human Machine Interface) Based For Monitoring System of Generator With 3dr Telemetry 433mhz Communication. Sudjadi, Sumardi & Wildan Abdul Jabbar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 4 (2):11-18.
    Abstract—Generator set (genset) is a backup power supply which is used when the PLN supply is off. With such an important function, the generator set maintenance must be taken care of for long life durability. Monitoring activity is usually conducted on a regular basis, but still run manually by relying on operators who go directly to the plant. This research goes over the making of HMI remote control system for generator set in order to produce effective and continuous reporting. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  66
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Werner Ceusters, Barry Smith & James Matthew Fielding (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Homing in on consciousness in the nervous system: An action-based synthesis.Ezequiel Morsella, Christine A. Godwin, Tiffany K. Jantz, Stephen C. Krieger & Adam Gazzaley - 2016 - Behavioral and Brain Sciences 39:1-70.
    What is the primary function of consciousness in the nervous system? The answer to this question remains enigmatic, not so much because of a lack of relevant data, but because of the lack of a conceptual framework with which to interpret the data. To this end, we have developed Passive Frame Theory, an internally coherent framework that, from an action-based perspective, synthesizes empirically supported hypotheses from diverse fields of investigation. The theory proposes that the primary function (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  19.  76
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  52
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. ITS for Data Manipulation Language (DML) Commands Using SQLite.Mahmoud Jamal Abu Ghali & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):57-92.
    In many areas, technology has facilitated many things, diagnosing diseases, regulating traffic and teaching students in schools rely on Intelligent systems to name a few. At present, traditional classroom-based education is no longer the most appropriate in schools. From here, the idea of intelligent e-learning for students to increase their culture and keep them updated in life began. E-learning has become an ideal solution, relying on artificial intelligence, which has a footprint in this through the development of systems (...) on education without a teacher taking into account the individual differences of students. This study describes intelligent tutoring system for teaching the Data Manipulation Language (DML) Commands Using SQLite to non IT students to overcome the difficulties they face. The System was built as education system by using the researcher own authoring tool that based on mobile and web App. The basic idea of this system is a systematic introduction into the concept of Database and its DML query. The system presents the topic of DML Commands, help student to execute what they are learn from the system content using the practical part of the system and administers automatically adapted at run time to the student’s individual growth. The system was assessed by a group of teachers and students and the outcome showed as 91% from the database specialists, 94% from Diploma students group and 89% from the secondary school students group. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. From System Exchange to Globalization.María G. Navarro - 2012 - In Manfred Kohler Philipp Strobl (ed.), The Phenomenon of Globalization: a Collection of Interdisciplinary Globalization Research Essays. Peter Lang Publishing House.
    The objective of this paper is to analyse, from a philosophical perspective, the 16th and 17th Century models of currency, as well as their influence on the types of society in which the models developed. For this, the author values the study by the French philosopher Michael Foucault Words and Things on this matter and the principal foundations of Ludwig von Bertalanffy´s systems theory. The 17th Century model of currency is based on the notion of a system of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Asking about data: exploring different realities of data via the social data flow network methodology.Brian Ballsun-Stanton - unknown
    What is data? That question is the fundamental investigation of this dissertation. I have developed a methodology from social-scientific processes to explore how different people understand the concept of data, rather than to rely on my own philosophical intuitions or thought experiments about the “nature” of data. The evidence I have gathered as to different individuals' constructions of data can be used to inform further inquiry of data and the design of information systems. My research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A Game-Based Tool for Freshmen Design Students During the Pandemic Distance Learning.Sepehr Vaez Afshar, Sarvin Eshaghi & Muhammed Ali Ornek - 2021 - In Sepehr Vaez Afshar, Sarvin Eshaghi & Muhammed Ali Ornek (eds.), 4th International Symposium on Art and Design Education: Art and design during and after the Covid- 19 Period. Başkent University: pp. 77-83.
    The emergence of the need for orientation since the past times led the universities to invent innovative ways to prepare their students for the activities and courses they will face. Hence, various types of orientation have been provided during history. However, today with the outbreak of the Covid-19 and the closure of the schools, most of the students are continuing their studies as distance learning. While this situation is very disappointing for all freshmen students who do not know the university's (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  28
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning- (...) duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and traceability. This study concludes with an evaluation of the deduplication framework's impact on cost efficiency, system performance, and potential scalability. Future enhancements aim to integrate multi-cloud interoperability and advanced compression algorithms to further refine storage management. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  89
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  61
    Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Information Based Hierarchical Brain Organization/Evolution from the Perspective of the Informational Model of Consciousness.Florin Gaiseanu - 2020 - Archives in Neurology and Neuroscience 7 (5):1-9.
    Introduction: This article discusses the brain hierarchical organization/evolution as a consequence of the information-induced brain development, from the perspective of the Informational Model of Consciousness. Analysis: In the frame of the Informational Model of Consciousness, a detailed info-neural analysis ispresented, concerning the specific properties/functions of the informational system of the human body composed by the Center of Acquisition and Storing of Information, Center of Decision and Command, Info-Emotional Center, Maintenance Informational System, Genetic Transmission System, Info Genetic Generator (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  29
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Benefits of Realist Ontologies to Systems Engineering.Eric Merrell, Robert M. Kelly, David Kasmier, Barry Smith, Marc Brittain, Ronald Ankner, Evan Maki, Curtis W. Heisey & Kevin Bush - 2021 - 8th International Workshop on Ontologies and Conceptual Modelling (OntoCom).
    Applied ontologies have been used more and more frequently to enhance systems engineering. In this paper, we argue that adopting principles of ontological realism can increase the benefits that ontologies have already been shown to provide to the systems engineering process. Moreover, adopting Basic Formal Ontology (BFO), an ISO standard for top-level ontologies from which more domain specific ontologies are constructed, can lead to benefits in four distinct areas of systems engineering: (1) interoperability, (2) standardization, (3) testing, and (4) (...) exploitation. Reaping these benefits in a model-based systems engineering (MBSE) context requires utilizing an ontology’s vocabulary when modeling systems and entities within those systems. If the chosen ontology abides by the principles of ontological realism, a semantic standard capable of uniting distinct domains, using BFO as a hub, can be leveraged to promote greater interoperability among systems. As interoperability and standardization increase, so does the ability to collect data during the testing and implementation of systems. These data can then be reasoned over by computational reasoners using the logical axioms within the ontology. This, in turn, generates new data that would have been impossible or too inefficient to generate without the aid of computational reasoners. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  33. A Proposed Expert System for Diagnosis of Migraine.Malak S. Hammad, Raja E. N. Altarazi, Rawan N. Al Banna, Dina F. Al Borno & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (6):1-8.
    Migraine is a complex neurological disorder characterized by recurrent moderate to severe headaches, accompanied by additional symptoms such as nausea, sensitivity to light and sound, and visual disturbances. Accurate and timely diagnosis of migraines is crucial for effective management and treatment. However, the diverse range of symptoms and overlapping characteristics with other headache disorders pose challenges in the diagnostic process. In this research, we propose the development of an expert system for migraine diagnosis using artificial intelligence and the CLIPS (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. GEO BASED CUSTOMER INSIGHT 360 APPROACH.Praveen Kumar & Mohit Gangwar - 2024 - Wesleyan Journal of Research 17 (12):224-234.
    Location analytics is key to get into the current market. It deals with movements data of customer which tells about the customer’s lifestyle, their behavior through understanding the visiting pattern. A geo-fence is a virtual boundary for a real-world geographic area. A geo-fence can be generated as per user’s need by considering different radius, or a geo-fence can be a predefined set of boundaries. Geo-fencing is use of geo-fence. Geo fencing is a feature that uses the global positioning (...) (GPS) to define geographical boundaries. It has widely increasing scope. Very few applications are dealing with geo-notifications that are intended to inform the mobile/stationary user proactively about location specific information. The technology behind proactive location-based services is called Geo-fencing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Attention, Consciousness, and Data Display.Ronald A. Rensink - 2006 - In 2006 Proceedings of the American Statistical Association, Statistical Graphics Section.
    Recent advances in our understanding of visual perception have shown it to be a far more complex and counterintuitive process than previously believed. Several important consequences follow from this. First, the design of an effective statistical graphics system is unlikely to succeed based on intuition alone; instead, it must rely on a more sophisticated, systematic approach. The basic elements of such an approach are outlined here, along with several design principles. An overview is then given of recent advances (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Complex Systems Biology.Roberto Serra - 2012 - In Vincenzo Fano, Enrico Giannetto, Giulia Giannini & Pierluigi Graziani (eds.), Complessità e Riduzionismo. ISONOMIA - Epistemologica Series Editor. pp. 100-107.
    The term “Complex Systems Biology” was introduced a few years ago [Kaneko, 2006] and, although not yet of widespread use, it seems particularly well suited to indicate an approach to biology which is well rooted in complex systems science. Although broad generalizations are always dangerous, it is safe to state that mainstream biology has been largely dominated by a gene-centric view in the last decades, due to the success of molecular biology. So the one gene - one trait approch, which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith (eds.), Integration of Intelligence Data through Semantic Enhancement. CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  38. BFO-based ontology enhancement to promote interoperability in BIM.Justine Flore Tchouanguem, Mohamed Hedi Karray, Bernard Kamsu Foguem, Camille Magniont, F. Henry Abanda & Barry Smith - 2021 - Applied ontology 16 (4):1–27.
    Building Information Modelling (BIM) is a process for managing construction project information in such a way as to provide a basis for enhanced decision-making and for collaboration in a construction supply chain. One impediment to the uptake of BIM is the limited interoperability of different BIM systems. To overcome this problem, a set of Industry Foundation Classes (IFC) has been proposed as a standard for the construction industry. Building on IFC, the ifcOWL ontology was developed in order to facilitate representation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Ontology based annotation of contextualized vital signs.Goldfain Albert, Xu Min, Bona Jonathan & Barry Smith - 2013 - In Albert Goldfain, Min Xu, Jonathan Bona & Smith Barry (eds.), Proceedings of the Fourth International Conference on Biomedical Ontology (ICBO). pp. 28-33.
    Representing the kinetic state of a patient (posture, motion, and activity) during vital sign measurement is an important part of continuous monitoring applications, especially remote monitoring applications. In contextualized vital sign representation, the measurement result is presented in conjunction with salient measurement context metadata. We present an automated annotation system for vital sign measurements that uses ontologies from the Open Biomedical Ontology Foundry (OBO Foundry) to represent the patient’s kinetic state at the time of measurement. The annotation system (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  34
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning- (...) duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and traceability. This study concludes with an evaluation of the deduplication framework's impact on cost efficiency, system performance, and potential scalability. Future enhancements aim to integrate multi-cloud interoperability and advanced compression algorithms to further refine storage management. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Wholes and parts in general systems methodology.Martin Zwick - 2000 - In Günter P. Wagner (ed.), The Character Concept in Evolutionary Biology. Academic Press. pp. 237--56.
    Reconstructability analysis (RA) decomposes wholes, namely data in the form either of set theoretic relations or multivariate probability distributions, into parts, namely relations or distributions involving subsets of variables. Data is modeled and compressed by variable-based decomposition, by more general state-based decomposition, or by the use of latent variables. Models, which specify the interdependencies among the variables, are selected to minimize error and complexity.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Android Based Diet Consultant using Rule Pattern-based algorithm.M. Dhurgadevi - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):120-127.
    The proposed project is based on a Dietitian app. The proposed app lets us discover what should we eat based on our weight, height, age, sex, and physical activity. It calculates BMI and BMR and tells us how many calories should we ideally need to intake per day. The calories we should intake will be feed in and based on the RETE algorithm the amount of food intake for the day will be decided. The proposed application is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  24
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Ontology of language, with applications to demographic data.S. Clint Dowland, Barry Smith, Matthew A. Diller, Jobst Landgrebe & William R. Hogan - 2023 - Applied ontology 18 (3):239-262.
    Here we present what we believe is a novel account of what languages are, along with an axiomatically rich representation of languages and language-related data that is based on this account. We propose an account of languages as aggregates of dispositions distributed across aggregates of persons, and in doing so we address linguistic competences and the processes that realize them. This paves the way for representing additional types of language-related entities. Like demographic data of other sorts, (...) about languages may be of use to researchers in a number of areas, including biomedical research. Data on the languages used in clinical encounters are typically included in medical records, and capture an important factor in patient-provider interactions. Like many types of patient and demographic data, data on a person’s preferred and primary languages are organized in different ways by different systems. This can be a barrier to data integration. We believe that a robust framework for representing language in general and preferred and primary language in particular – which has been lacking in ontologies thus far – can promote more successful integration of language-related data from disparate data sources. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  46. ‘Silent Pandemic’: Evidence-Based Environmental and Public Health Practices to Respond to the COVID-19 Crisis.Morufu Olalekan Raimi, Aziba-Anyam Gift Raimi & Teddy Charles Adias - 2021 - London, UK: IntechOpen.
    Given the unprecedented novel nature and scale of coronavirus and the global nature of this public health crisis, which upended many public/environmental research norms almost overnight. However, with further waves of the virus expected and more pandemics anticipated. The COVID-19 pandemic of 2020 opened our eyes to the ever-changing conditions and uncertainty that exists in our world today, particularly with regards to environmental and public health practices disruption. This paper explores environmental and public health evidence-based practices toward responding to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Color may be the phenomenal dual aspect of two-state quantum systems in a mixed state.Tal Hendel - manuscript
    Panmicropsychism is the view that the fundamental physical ingredients of our universe are also its fundamental phenomenal ingredients. Since there is only a limited number of fundamental physical ingredients, panmicropsychism seems to imply that there exists only a small set (palette) of basic phenomenal qualities. How does this limited palette of basic phenomenal qualities give rise to our rich set of experiences? This is known as ‘the palette problem’. One class of solutions to this problem, large-palette solutions, simply denies that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The Algorithmic Leviathan: Arbitrariness, Fairness, and Opportunity in Algorithmic Decision-Making Systems.Kathleen Creel & Deborah Hellman - 2022 - Canadian Journal of Philosophy 52 (1):26-43.
    This article examines the complaint that arbitrary algorithmic decisions wrong those whom they affect. It makes three contributions. First, it provides an analysis of what arbitrariness means in this context. Second, it argues that arbitrariness is not of moral concern except when special circumstances apply. However, when the same algorithm or different algorithms based on the same data are used in multiple contexts, a person may be arbitrarily excluded from a broad range of opportunities. The third contribution is (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  49. SNOMED CT standard ontology based on the ontology for general medical science.Shaker El-Sappagh, Francesco Franda, Ali Farman & Kyung-Sup Kwak - 2018 - BMC Medical Informatics and Decision Making 76 (18):1-19.
    Background: Systematized Nomenclature of Medicine—Clinical Terms (SNOMED CT, hereafter abbreviated SCT) is acomprehensive medical terminology used for standardizing the storage, retrieval, and exchange of electronic healthdata. Some efforts have been made to capture the contents of SCT as Web Ontology Language (OWL), but theseefforts have been hampered by the size and complexity of SCT. Method: Our proposal here is to develop an upper-level ontology and to use it as the basis for defining the termsin SCT in a way that will (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. On Probability and Cosmology: Inference Beyond Data?Martin Sahlen - 2017 - In Khalil Chamcham, John Barrow, Simon Saunders & Joe Silk (eds.), The Philosophy of Cosmology. Cambridge, United Kingdom: Cambridge University Press.
    Modern scientific cosmology pushes the boundaries of knowledge and the knowable. This is prompting questions on the nature of scientific knowledge. A central issue is what defines a 'good' model. When addressing global properties of the Universe or its initial state this becomes a particularly pressing issue. How to assess the probability of the Universe as a whole is empirically ambiguous, since we can examine only part of a single realisation of the system under investigation: at some point, (...) will run out. We review the basics of applying Bayesian statistical explanation to the Universe as a whole. We argue that a conventional Bayesian approach to model inference generally fails in such circumstances, and cannot resolve, e.g., the so-called 'measure problem' in inflationary cosmology. Implicit and non-empirical valuations inevitably enter model assessment in these cases. This undermines the possibility to perform Bayesian model comparison. One must therefore either stay silent, or pursue a more general form of systematic and rational model assessment. We outline a generalised axiological Bayesian model inference framework, based on mathematical lattices. This extends inference based on empirical data (evidence) to additionally consider the properties of model structure (elegance) and model possibility space (beneficence). We propose this as a natural and theoretically well-motivated framework for introducing an explicit, rational approach to theoretical model prejudice and inference beyond data. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 905