Results for 'Data Storage'

934 found
Order:
  1. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  99
    Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  63
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  49
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  55
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  64
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  7.  38
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  91
    Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. AI training data, model success likelihood, and informational entropy-based value.Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    Since the release of OpenAI's ChatGPT, the world has entered a race to develop more capable and powerful AI, including artificial general intelligence (AGI). The development is constrained by the dependency of AI on the model, quality, and quantity of training data, making the AI training process highly costly in terms of resources and environmental consequences. Thus, improving the effectiveness and efficiency of the AI training process is essential, especially when the Earth is approaching the climate tipping points and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Big data and their epistemological challenge.Luciano Floridi - 2012 - Philosophy and Technology 25 (4):435-437.
    Between 2006 and 2011, humanity accumulated 1,600 EB of data. As a result of this growth, there is now more data produced than available storage. This article explores the problem of “Big Data,” arguing for an epistemological approach as a possible solution to this ever-increasing challenge.
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  11. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  54
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  87
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  58
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  54
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud (...) system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  16. (1 other version)Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan & Francisca N. Odigwe - 2019 - In Charles A. Shoniregun (ed.), Proceedings of the London International Conference on Education (LICE-2019). pp. 86-94.
    The dishonest practices in the conduct of educational research in South-South region particularly, and Nigeria generally, has called for urgent intervention. This study assessed data management practices and educational research effectiveness of University Lecturers in South-South Nigeria. A sample of 602 lecturers that were accessible during data collection responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple regression was employed in the analysis of data. Findings revealed amongst (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  44
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  44
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Management of data in higher education and the quality of academic research of university lecturers : A case study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Surviving global risks through the preservation of humanity's data on the Moon.Alexey Turchin & D. Denkenberger - 2018 - Acta Astronautica:in press.
    Many global catastrophic risks are threatening human civilization, and a number of ideas have been suggested for preventing or surviving them. However, if these interventions fail, society could preserve information about the human race and human DNA samples in the hopes that the next civilization on Earth will be able to reconstruct Homo sapiens and our culture. This requires information preservation of an order of magnitude of 100 million years, a little-explored topic thus far. It is important that a potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith (eds.), Integration of Intelligence Data through Semantic Enhancement. CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of (...) sources, types, models, and modalities (including text, images, audio, and signals). The result of applying this strategy to a given body of data is an evolving Dataspace that allows the application of a variety of integration and analytic processes to diverse data contents. We conceive semantic enhancement (SE) as a lightweight and flexible process that leverages the richness of the structured contents of the Dataspace without adding storage and processing burdens to what, in the intelligence domain, will be an already storage- and processing-heavy starting point. SE works not by changing the data to which it is applied, but rather by adding an extra semantic layer to this data. We sketch how the semantic enhancement approach can be applied consistently and in cumulative fashion to new data and data-models that enter the Dataspace. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  24. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. “A Thousand Words”: How Shannon Entropy perspective provides link among exponential data growth, average temperature of the Earth, declining Earth magnetic field, and global consciousness.Victor Christianto & Florentin Smarandache - manuscript
    The sunspot data seems to indicate that the Sun is likely to enter Maunder Minimum, then it will mean that low Sun activity may cause low temperature in Earth. If this happens then it will cause a phenomenon which is called by some climatology experts as “The Little Ice Age” for the next 20-30 years, starting from the next few years. Therefore, the Earth climate in the coming years tend to be cooler than before. This phenomenon then causes us (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. UTILIZATION OF A DUAL-AXIS SOLAR TRACKER TO INCREASE THE EFFECTIVENESS OF SOLAR PANELS IN THE STORAGE OF POWER IN LITHIUM-ION BATTERIES.Geodizon Iman C. Bermudez, Joanna Patricia U. Develleres, Danniah Shamella N. Palao, Kate Aileen M. Gromia, Rainer Jade T. Daingan & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    This study was conducted to determine the effectiveness of utilizing the Dual-axis Solar Tracker in harnessing solar energy and storing it in lithium-ion batteries in terms of voltage and milliamps per hour gained. This study utilized two solar panel systems, the Static Solar Panel System and the Dual-Axis Solar Tracker and aimed to prove the significant difference generated by solar panel systems in terms of voltage and milliamps per hour. This study employed an Applied Experimental Research Design utilizing Arduino Uno, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  59
    Seamless Migration from Legacy Databases to Snowflake: A Comprehensive Case Study.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):600-610.
    Migrating legacy database applications to modern cloud-based solutions, such as Snowflake, is becoming essential for organizations aiming to leverage scalable, efficient, and cost-effective data solutions. Legacy databases, typically bound to on-premises infrastructure, often lack the flexibility required by contemporary data analytics and storage needs. Snowflake, a cloud-native data platform, provides a versatile environment that enables efficient data storage, sharing, and processing. This research examines a structured methodology for migrating legacy database applications to Snowflake, addressing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  56
    A Case Study on Transforming Legacy Databases Seamless Migration to Snowflake.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):560-580.
    Migrating legacy database applications to modern cloud-based solutions, such as Snowflake, is becoming essential for organizations aiming to leverage scalable, efficient, and cost-effective data solutions. Legacy databases, typically bound to on-premises infrastructure, often lack the flexibility required by contemporary data analytics and storage needs. Snowflake, a cloud-native data platform, provides a versatile environment that enables efficient data storage, sharing, and processing. This research examines a structured methodology for migrating legacy database applications to Snowflake, addressing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Without a Trace: Why did Corona Apps Fail?Lucie White & Philippe van Basshuysen - 2021 - Journal of Medical Ethics 47 (12):1-4.
    At the beginning of the COVID-19 pandemic, high hopes were put on digital contact tracing, using mobile phone apps to record and immediately notify contacts when a user reports as infected. Such apps can now be downloaded in many countries, but as second waves of COVID-19 are raging, these apps are playing a less important role than anticipated. We argue that this is because most countries have opted for app configurations that cannot provide a means of rapidly informing users of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. The Neoclassical Interpretation of Modern Physics and it Implications for an Information Based Interpretation of Spirituality.Shiva Meucci - 2015 - Cosmos and History 11 (2):8-27.
    The neoclassical interpretation of quantum mechanics which re-introduces older conceptual models of gravity and electromagnetism transformed by modern advancements in the field is discussed as a natural outcome from the interchangeability of quantum mechanics and fluid dynamics in light of recent macro-level experiments which show behaviors previously believed to be confined to the quantum world. This superfluid model of mechanics and the known behaviors of superfluids is suggested as a possible substrate and system for the storage and processing of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Superbimatrices and Their Generalizations.W. B. Vasantha Kandasamy & Florentin Smarandache - 2009 - Slatina, Romania: CuArt.
    The systematic study of supermatrices and super linear algebra has been carried out in 2008. These new algebraic structures find their applications in fuzzy models, Leontief economic models and data-storage in computers.
    Download  
     
    Export citation  
     
    Bookmark  
  37. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Design of Interface System With Hmi (Human Machine Interface) Based For Monitoring System of Generator With 3dr Telemetry 433mhz Communication. Sudjadi, Sumardi & Wildan Abdul Jabbar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 4 (2):11-18.
    Abstract—Generator set (genset) is a backup power supply which is used when the PLN supply is off. With such an important function, the generator set maintenance must be taken care of for long life durability. Monitoring activity is usually conducted on a regular basis, but still run manually by relying on operators who go directly to the plant. This research goes over the making of HMI remote control system for generator set in order to produce effective and continuous reporting. HMI (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Islands as refuges for surviving global catastrophes.Alexey Turchin & Brian Patrick Green - 2018 - Foresight.
    Purpose Islands have long been discussed as refuges from global catastrophes; this paper will evaluate them systematically, discussing both the positives and negatives of islands as refuges. There are examples of isolated human communities surviving for thousands of years on places like Easter Island. Islands could provide protection against many low-level risks, notably including bio-risks. However, they are vulnerable to tsunamis, bird-transmitted diseases, and other risks. This article explores how to use the advantages of islands for survival during global catastrophes. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. The Neurological Disease Ontology.Mark Jensen, Alexander P. Cox, Naveed Chaudhry, Marcus Ng, Donat Sule, William Duncan, Patrick Ray, Bianca Weinstock-Guttman, Barry Smith, Alan Ruttenberg, Kinga Szigeti & Alexander D. Diehl - 2013 - Journal of Biomedical Semantics 4 (42):42.
    We are developing the Neurological Disease Ontology (ND) to provide a framework to enable representation of aspects of neurological diseases that are relevant to their treatment and study. ND is a representational tool that addresses the need for unambiguous annotation, storage, and retrieval of data associated with the treatment and study of neurological diseases. ND is being developed in compliance with the Open Biomedical Ontology Foundry principles and builds upon the paradigm established by the Ontology for General Medical (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  45
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  45.  49
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. (1 other version)The science of belief: A progress report.Nicolas Porot & Eric Mandelbaum - forthcoming - WIREs Cognitive Science 1.
    The empirical study of belief is emerging at a rapid clip, uniting work from all corners of cognitive science. Reliance on belief in understanding and predicting behavior is widespread. Examples can be found, inter alia, in the placebo, attribution theory, theory of mind, and comparative psychological literatures. Research on belief also provides evidence for robust generalizations, including about how we fix, store, and change our beliefs. Evidence supports the existence of a Spinozan system of belief fixation: one that is automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  47. (1 other version)Referent Tracking for Command and Control Messaging Systems.Shahid Manzoor, Werner Ceusters & Barry Smith - 2009 - CEUR, Volume 555.
    The Joint Battle Management Language (JBML) is an XML-based language designed to allow Command and Control (C2) systems to interface easily with Modeling and Simulation (M&S) systems. While some of the XML-tags defined in this language correspond to types of entities that exist in reality, others are mere syntactic artifacts used to structure the messages themselves. Because these two kinds of tags are not formally distinguishable, JBML messages in effect confuse data with what the data represent. In this (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. SNOMED CT standard ontology based on the ontology for general medical science.Shaker El-Sappagh, Francesco Franda, Ali Farman & Kyung-Sup Kwak - 2018 - BMC Medical Informatics and Decision Making 76 (18):1-19.
    Background: Systematized Nomenclature of Medicine—Clinical Terms (SNOMED CT, hereafter abbreviated SCT) is acomprehensive medical terminology used for standardizing the storage, retrieval, and exchange of electronic healthdata. Some efforts have been made to capture the contents of SCT as Web Ontology Language (OWL), but theseefforts have been hampered by the size and complexity of SCT. Method: Our proposal here is to develop an upper-level ontology and to use it as the basis for defining the termsin SCT in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Ethical pitfalls for natural language processing in psychology.Mark Alfano, Emily Sullivan & Amir Ebrahimi Fard - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    Knowledge is power. Knowledge about human psychology is increasingly being produced using natural language processing (NLP) and related techniques. The power that accompanies and harnesses this knowledge should be subject to ethical controls and oversight. In this chapter, we address the ethical pitfalls that are likely to be encountered in the context of such research. These pitfalls occur at various stages of the NLP pipeline, including data acquisition, enrichment, analysis, storage, and sharing. We also address secondary uses of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Review of: "Nano electrical memories and testing Nickel nanoparticles NI_nanoparticle Strong conductors of electric current".Afshin Rashid - 2023 - Qeios 5 (78484_8637):1 _ 3.
    Note: NI_nanoparticle nickel nanoparticles is a strong conductor of electric current and its surface is shiny and polished. This element belongs to the group of iron and cobalt elementsUsing particles from the microscale to the nanoscale provides benefits for various scientific fields, but because a large percentage of their atoms is on the surface, nanomaterials can be highly reactive and pose risks. have a potential for humans. Nanoparticles are of great interest due to their wide application, both in industry and (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 934