Results for 'Doug Cloud'

181 found
Order:
  1.  35
    Questioning the Consensus on Placebo and Nocebo Effects.Doug Hardman, Phil Hutchinson & Giulio Ongaro - 2021 - Psychotherapy and Psychosomatics 90 (3):211–212.
    Download  
     
    Export citation  
     
    Bookmark  
  2.  56
    Where the ethical action is.Doug Hardman & Phil Hutchinson - 2022 - Journal of Medical Ethics 49 (1):45–48.
    It is common to think of medical and ethical modes of thought as different in kind. In such terms, some clinical situations are made more complicated by an additional ethical component. Against this picture, we propose that medical and ethical modes of thought are not different in kind, but merely different aspects of what it means to be human. We further propose that clinicians are uniquely positioned to synthesise these two aspects without prior knowledge of philosophical ethics.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  3. Investigative Ordinary Language Philosophy.Doug Hardman & Phil Hutchinson - 2022 - Philosophical Investigations 45 (4):453-470.
    In this paper, we explicate the method of Investigative Ordinary Language Philosophy (IOLP). The term was coined by John Cook to describe the unique philosophical approach of Frank Ebersole. We argue that (i) IOLP is an overlooked yet valuable philosophical method grounded in our everyday experiences and concerns; and (ii) as such, Frank Ebersole is an important but neglected figure in the history of ordinary language philosophy.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Deficient virtue in the Phaedo.Doug Reed - 2020 - Classical Quarterly 70 (1):119-130.
    Plato seems to have been pessimistic about how most people stand with regard to virtue. However, unlike the Stoics, he did not conclude that most people are vicious. Rather, as we know from discussions across several dialogues, he countenanced decent ethical conditions that fall short of genuine virtue, which he limited to the philosopher. Despite Plato's obvious interest in this issue, commentators rarely follow his lead by investigating in detail such conditions in the dialogues. When scholars do investigate what kind (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  5. Narrative Self-Constitution and Recovery from Addiction.Doug McConnell - 2016 - American Philosophical Quarterly 53 (3):307-322.
    Why do some addicted people chronically fail in their goal to recover, while others succeed? On one established view, recovery depends, in part, on efforts of intentional planning agency. This seems right, however, firsthand accounts of addiction suggest that the agent’s self-narrative also has an influence. This paper presents arguments for the view that self-narratives have independent, self-fulfilling momentum that can support or undermine self-governance. The self-narrative structures of addicted persons can entrench addiction and alienate the agent from practically feasible (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  6. Degrees of Virtue in the Nicomachean Ethics.Doug Reed - 2017 - Ancient Philosophy 37 (1):91-112.
    I argue that Aristotle believes that virtue comes in degrees. After dispatching with initial concerns for the view, I argue that we should accept it because Aristotle conceives of heroic virtue as the highest degree of virtue. I support this interpretation of heroic virtue by considering and rejecting alternative readings, then showing that heroic virtue characterized as the highest degree of virtue is consistent with the doctrine of the mean.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  58
    Whose models? Which representations? A response to Wagner.Doug Hardman & Phil Hutchinson - 2023 - Journal of Medical Ethics 49 (12):850-851.
    InWhere the Ethical Action Is,we argued that medical and ethical modes of thought are not different in kind but different aspects of a situation. One of the consequences of this argument is that the requirement for or benefits of normative moral theorising in bioethics is undercut. In response, Wagner has argued that normative moral theories should be reconceived as models. Wagner’s argument seems to be that once reconceived as models, the rationale for moral theorising, undercut by our arguments inWhere the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Objects of Stoic Eupatheiai.Doug Reed - 2017 - History of Philosophy Quarterly 34 (3):195-212.
    The Stoics claim that the sage is free from emotions, experiencing instead εὐπάθειαι (‘good feelings’). It is, however, unclear whether the sage experiences εὐπάθειαι about virtue/vice only, indifferents only, or both. Here, I argue that εὐπάθειαι are exclusively about virtue/vice by showing that this reading alone accommodates the Stoic claim that there is not a εὐπάθειαι corresponding to emotional pain. I close by considering the consequences of this view for the coherence and viability of Stoic ethics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. DBS, Personal Identity, and Diachronic Value.Doug McConnell - 2013 - American Journal of Bioethics Neuroscience 4 (2):47-49.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Narrating Truths Worth Living: Addiction Narratives.Doug McConnell & Anke Snoek - 2012 - American Journal of Bioethics Neuroscience 3 (4):77-78.
    Self-narrative is often, perhaps primarily, a tool of self- constitution, not of truth representation. We explore this theme with reference to our own recent qualitative interviews of substance-dependent agents. Narrative self- constitution, the process of realizing a valued narrative projection of oneself, depends on one’s narrative tracking truth to a certain extent. Therefore, insofar as narratives are successfully realized, they have a claim to being true, although a certain amount of self-deception typically comes along for the ride. We suggest that, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Reasons, reflection, and repugnance.Doug McConnell & Jeanette Kennett - 2016 - In Steve Clarke, Julian Savulescu, C. A. J. Coady, Alberto Giubilini & Sagar Sanyal (eds.), The Ethics of Human Enhancement: Understanding the Debate. Oxford, United Kingdom: Oxford University Press.
    In this chapter we draw comparisons between Kass’ views on the normative authority of repugnance and social intuitionist accounts of moral judgement which are similarly sceptical about the role of reasoned reflection in moral judgement. We survey the empirical claims made in support of giving moral primacy to intuitions generated by emotions such as repugnance, as well as some common objections. We then examine accounts which integrate intuition and reflection, and argue that plausible accounts of wisdom are in tension with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Platonic Personal Immortality.Doug Reed - 2019 - Pacific Philosophical Quarterly 100 (3):812-836.
    I argue that Plato distinguishes between personal immortality and immortality of the soul. I begin by criticizing the consensus view that Plato identifies the person and the soul. I then turn to the issue of immortality. By considering passages from 'Symposium' and 'Timaeus', I make the case that Plato thinks that while the soul is immortal by nature, if a person is going to be immortal, they must become so. Finally, I argue that Plato has a psychological continuity approach to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  42
    Rules, Practices and Principles.Phil Hutchinson & Doug Hardman - 2023 - Journal of Evaluation in Clinical Practice 29 (7):1095-1099.
    Bioethics seems preoccupied with establishing, debating, promoting and sometimes debunking principles. While these tasks trade on the status of the word ‘principle’ in our ordinary language, scant attention is paid to the way principles operate in language. In this paper, we explore how principles relate to rules and practices so as to better understand their logic. We argue that principles gain their sense and power from the practices which give them sense. While general principles can be, and are, establishable in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Why the extended mind is nothing special but is central.Giulio Ongaro, Doug Hardman & Ivan Deschenaux - 2024 - Phenomenology and the Cognitive Sciences 23 (4):841-863.
    The extended mind thesis states that the mind is not brain-bound but extends into the physical world. The philosophical debate around the thesis has mostly focused on extension towards epistemic artefacts, treating the phenomenon as a special capacity of the human organism to recruit external physical resources to solve individual tasks. This paper argues that if the mind extends to artefacts in the pursuit of individual tasks, it extends to other humans in the pursuit of collective tasks. Mind extension to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. (1 other version)Growing up with expectations. Better understanding the expectations of community partners in participatory action research projects.Doug Ragan & Clarissa Wilkinson - 2009 - Les ateliers de l'éthique/The Ethics Forum 4 (1):127-139.
    This paper challenges the assumption that youth and youth agencies are in a condition of equa- lity when entering a participatory action research (PAR). By asserting that it is not a state of equality that practitioners nor youth should assume nor be immediately striving for, but a consis- tently equitable process, this article draws from and reflects on the relationship between young people and researchers who have used a PAR methodology in action oriented projects. Using the UNESCO Growing up in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Reactive attitudes, relationships, and addiction.Jeanette Kennett, Doug McConnell & Anke Snoek - 2018 - In Hanna Pickard & Serge H. Ahmed (eds.), The Routledge Handbook of Philosophy and Science of Addiction. Routledge.
    In this chapter we focus on the structure of close personal relations and diagnose how these relationships are disrupted by addiction. We draw upon Peter Strawson’s landmark paper ‘Freedom and Resentment’ (2008, first published 1962) to argue that loved ones of those with addiction veer between, (1) reactive attitudes of blame and resentment generated by disappointed expectations of goodwill and reciprocity, and (2) the detached objective stance from which the addicted person is seen as less blameworthy but also as less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Editorial Introduction: Praxeological Gestalts – Philosophy, Cognitive Science and Sociology Meet Gestalt Psychology.Phil Hutchinson, Anna C. Zielinska & Doug Hardman - 2022 - Philosophia Scientiae 26 (3):5-19.
    1 Context The idea for the current issue of _Philosophia Scientiæ_ emerged from discussions which took place in the Manchester Ethnomethodology Reading Group. This reading group has its origins in Wes Sharrock’s weekly discussion groups, which have taken place in Manchester (UK) since the early 1970s. As the global Covid-19 pandemic hit in early 2020, the reading group moved online, facilitated by Phil Hutchinson and Alex Holder. Being an online reading group opened up participation to people beyond Northwest UK and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  19.  63
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  49
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  57
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  56
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  49
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  29. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  64
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  31.  55
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  53
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  87
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   162 citations  
  39.  59
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  40. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  50
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  59
    Efficient Cloud-Enabled Cardiovascular Disease Risk Prediction and Management through Optimized Machine Learning.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-475.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  45. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  49
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Contextualism, Moral Disagreement, and Proposition Clouds.Jussi Suikkanen - 2019 - In Russ Shafer-Landau (ed.), Oxford Studies in Metaethics Volume 14. Oxford University Press. pp. 47-69.
    According to contextualist theories in metaethics, when you use a moral term in a context, the context plays an ineliminable part in determining what natural property will be the semantic value of the term. Furthermore, on subjectivist and relativist versions of these views, it is either the speaker's own moral code or her moral community's moral code that constitutes the reference-fixing context. One standard objection to views of this type is that they fail to enable us to disagree in ordinary (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. CONTEMPORARY DEVOPS STRATEGIES FOR AUGMENTING SCALABLE AND RESILIENT APPLICATION DEPLOYMENT ACROSS MULTI-CLOUD ENVIRONMENTS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):54-60.
    Containerization in a multi-cloud environment facilitates workload portability and optimized resource uti-lization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of containerization in multi-cloud environment. We conducted the Systematic Mapping Study (SMS) on the literature published between January (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 181