Results for 'Hybrid Cloud'

684 found
Order:
  1.  40
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  67
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  37
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  43
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  57
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  48
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. How to Do Philosophy with Sci-Fiction: A Case of Hybrid Textuality.Giacomo Pezzano & Stefano Gualeni - 2024 - Filosofia 69:249-264.
    The fictional worlds of science fiction can stimulate philosophical speculation towards socio-technical scenarios and trends that are extrapolated from our physical reality. This widely accepted observation highlights but one of the ways to pursue philosophy with the aid of fiction and science fiction in particular. In this paper, we argue that fiction can in itself constitute a philosophical, academic work and need not merely represent the subject about which such work speculates. This idea questions the currently predominant, institutional paradigm which (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary to structure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Is Captain Kirk a natural blonde? Do X-ray crystallographers dream of electron clouds? Comparing model-based inferences in science with fiction.Ann-Sophie Barwich - 2017 - In Otávio Bueno, Steven French, George Darby & Dean Rickles (eds.), Thinking About Science, Reflecting on Art: Bringing Aesthetics and Philosophy of Science Together. New York: Routledge.
    Scientific models share one central characteristic with fiction: their relation to the physical world is ambiguous. It is often unclear whether an element in a model represents something in the world or presents an artifact of model building. Fiction, too, can resemble our world to varying degrees. However, we assign a different epistemic function to scientific representations. As artifacts of human activity, how are scientific representations allowing us to make inferences about real phenomena? In reply to this concern, philosophers of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Empirically-Informed Modal Rationalism.Tuomas Tahko - 2016 - In Bob Fischer & Felipe Leon (eds.), Modal Epistemology After Rationalism. Cham: Springer. pp. 29-45.
    In this chapter, it is suggested that our epistemic access to metaphysical modality generally involves rationalist, a priori elements. However, these a priori elements are much more subtle than ‘traditional’ modal rationalism assumes. In fact, some might even question the ‘apriority’ of these elements, but I should stress that I consider a priori and a posteriori elements especially in our modal inquiry to be so deeply intertwined that it is not easy to tell them apart. Supposed metaphysically necessary identity statements (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  13. A Comparative Analysis of the Acquisition Transaction of Management Information Systems through Virtual and Face-to-Face Negotiations—The Perspective of Green IT Industry in Poland.Bartosz Wachnik, Aleksandra Krupa & Krzysztof Santarek - 2022 - Sustainability 14 (15):9531.
    The COVID-19 pandemic that began in 2020 has significantly impacted businesses, regardless of size or industry. The hybrid and remote working models have moved all meetings with potential and existing suppliers to an online environment. This also applies to small- and medium-sized enterprises (SMEs), which have had to adapt themselves to the new situation and implement the solutions necessary to survive on the market. On the other hand, clients have become more aware of the environment and its changes. Customers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  16. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Grounding practical normativity: going hybrid.Ruth Chang - 2013 - Philosophical Studies 164 (1):163-187.
    In virtue of what is something a reason for action? That is, what makes a consideration a reason to act? This is a metaphysical or meta-normative question about the grounding of reasons for action. The answer to the grounding question has been traditionally given in ‘pure’, univocal terms. This paper argues that there is good reason to understand the ground of practical normativity as a hybrid of traditional ‘pure’ views. The paper 1) surveys the three leading ‘pure’ answers to (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  18. Hybrid Theories.Christopher Woodard - 2015 - In Guy Fletcher (ed.), The Routledge Handbook of Philosophy of Well-Being. New York,: Routledge. pp. 161-174.
    This chapter surveys hybrid theories of well-being. It also discusses some criticisms, and suggests some new directions that philosophical discussion of hybrid theories might take.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  19. Hybrid Accounts of Ethical Thought and Talk.Teemu Toppinen - 2017 - In Tristram Colin McPherson & David Plunkett (eds.), The Routledge Handbook of Metaethics. New York: Routledge. pp. 243-259.
    This is a draft of a chapter for the Routledge Handbook of Metaethics, edited by David Plunkett and Tristram McPherson. I offer an overview of hybrid views in metaethics, with main focus on hybrid cognitivist views such as those defended by Daniel Boisvert and David Copp, and on hybrid expressivist views such as those defended by Michael Ridge and myself.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  20. Hybrid Expressivism: Virtues and Vices.Mark Schroeder - 2009 - Ethics 119 (2):257-309.
    This paper is a survey of recent ‘hybrid’ approaches to metaethics, according to which moral sentences, in some sense or other, express both beliefs and desires. I try to show what kinds of theoretical issues come up at the different choice points we encounter in developing such a view, to raise some problems and explain where they come from, and to begin to get a sense for what the payoff of such views can be, and what they will need (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  21. Hybridizing Moral Expressivism and Moral Error Theory.Toby Svoboda - 2011 - Journal of Value Inquiry 45 (1):37-48.
    Philosophers should consider a hybrid meta-ethical theory that includes elements of both moral expressivism and moral error theory. Proponents of such an expressivist-error theory hold that all moral utterances are either expressions of attitudes or expressions of false beliefs. Such a hybrid theory has two advantages over pure expressivism, because hybrid theorists can offer a more plausible account of the moral utterances that seem to be used to express beliefs, and hybrid theorists can provide a simpler (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  81
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  75
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Hybrids and the Boundaries of Moral Considerability or Revisiting the Idea of Non-Instrumental Value.Magdalena Holy-Luczaj & Vincent Blok - 2019 - Philosophy and Technology 34 (2):223-242.
    The transgressive ontological character of hybrids—entities crossing the ontological binarism of naturalness and artificiality, e.g., biomimetic projects—calls for pondering the question of their ethical status, since metaphysical and moral ideas are often inextricably linked. The example of it is the concept of “moral considerability” and related to it the idea of “intrinsic value” understood as a non-instrumentality of a being. Such an approach excludes hybrids from moral considerations due to their instrumental character. In the paper, we revisit the boundaries of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  25.  89
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Hybrid collective intentionality.Thomas Brouwer, Roberta Ferrario & Daniele Porello - 2020 - Synthese 199 (1-2):3367-3403.
    The theory of collective agency and intentionality is a flourishing field of research, and our understanding of these phenomena has arguably increased greatly in recent years. Extant theories, however, are still ill-equipped to explain certain aspects of collective intentionality. In this article we draw attention to two such underappreciated aspects: the failure of the intentional states of collectives to supervene on the intentional states of their members, and the role of non-human factors in collective agency and intentionality. We propose a (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  27. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Hybrid Theory of Legal Statements and Disagreement on the Content of Law.M. Wieczorkowski - manuscript
    Disagreement is a pervasive feature of human discourse and a crucial force in shaping our social reality. From mundane squabbles about matters of taste to high-stakes disputes about law and public policy, the way we express and navigate disagreement plays a central role in both our personal and political lives. Legal discourse, in particular, is rife with disagreement - it is the very bread and butter of courtroom argument and legal scholarship alike. Consider a debate between two legal philosophers, Ronald (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Hybridity in Agriculture.Catherine Kendig - 2012 - In Paul B. Thompson & David M. Kaplan (eds.), Encyclopedia of Food and Agricultural Ethics. New York: Springer Verlag.
    In a very general sense, hybrid can be understood to be any organism that is the product of two (or more) organisms where each parent belongs to a different kind. For example; the offspring from two or more parent organisms, each belonging to a separate species (or genera), is called a “hybrid”. “Hybridity” refers to the phenomenal character of being a hybrid. And “hybridization ” refers to both natural and artificial processes of generating hybrids. These processes include (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The hybrid contents of memory.André Sant’Anna - 2020 - Synthese 197 (3):1263-1290.
    This paper proposes a novel account of the contents of memory. By drawing on insights from the philosophy of perception, I propose a hybrid account of the contents of memory designed to preserve important aspects of representationalist and relationalist views. The hybrid view I propose also contributes to two ongoing debates in philosophy of memory. First, I argue that, in opposition to eternalist views, the hybrid view offers a less metaphysically-charged solution to the co-temporality problem. Second, I (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  32.  72
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  66
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Visual Hybrids and Nonconceptual Aesthetic Perception.Michalle Gal - 2023 - Poetics Today 44 (:4 ( December 2023)):545-570.
    This essay characterizes the perception of the visual hybrid as nonconceptual, introducing the terminology of nonconceptual content theory to aesthetics. The visual hybrid possesses a radical but nonetheless exemplary aesthetic composition and is well established in culture, art, and even design. The essay supplies a philosophical analysis of the results of cross-cultural experiments, showing that while categorization or conceptual hierarchization kicks in when the visual hybrids are juxtaposed with linguistic descriptions, no conceptual scheme takes effect when participants are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  37. On Hybrid Expressivism about Aesthetic Judgments.Sanna Hirvonen, Natalia Karczewska & Michał P. Sikorski - 2019 - Grazer Philosophische Studien 96 (4):541-568.
    Contextualist accounts of aesthetic predicates have difficulties explaining why we feel that speakers are disagreeing when they make true and compatible but superficially contradictory aesthetic judgments. One possible way to account for the disagreement is hybrid expressivism, which holds that the disagreement happens at the level of pragmatically conveyed, clashing contents about the speakers’ conative states. Marques defends such a strategy, combining dispositionalism about value, contextualism, and hybrid expressivism. This paper critically evaluates the plausibility of the suggested pragmatic (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Hybrid Views in Meta‐ethics: Pragmatic Views.Guy Fletcher - 2014 - Philosophy Compass 9 (12):848-863.
    A common starting point for ‘going hybrid’ is the thought that moral discourse somehow combines belief and desire-like aspects, or is both descriptive and expressive. Hybrid meta-ethical theories aim to give an account of moral discourse that is sufficiently sensitive to both its cognitive and its affective, or descriptive and expressive, dimensions. They hold at least one of the following: moral thought: moral judgements have belief and desire-like aspects or elements; moral language: moral utterances both ascribe properties and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. A hybrid marketplace of ideas.Tomer Jordi Chaffer, Dontrail Cotlage & Justin Goldston - manuscript
    The convergence of humans and artificial intelligence (AI) systems introduces new dynamics into the cultural and intellectual landscape. Complementing emerging cultural evolution concepts such as machine culture, AI agents represent a significant techno-sociological development, particularly within the anthropological study of Web3 as a community focused on decentralization through blockchain. Despite their growing presence, the cultural significance of AI agents remains largely unexplored in academic literature. Toward this end, we conceived hybrid netnography, a novel interdisciplinary approach that examines the cultural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  65
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Pure versus Hybrid Expressivism and the Enigma of Conventional Implicature.Stephen Barker - 2014 - In Guy Fletcher & Michael R. Ridge (eds.), Having It Both Ways: Hybrid Theories and Modern Metaethics. New York: Oxford University Press. pp. 199-222.
    Can hybridism about moral claims be made to work? I argue it can if we accept the conventional implicature approach developed in Barker (Analysis 2000). However, this kind of hybrid expressivism is only acceptable if we can make sense of conventional implicature, the kind of meaning carried by operators like ‘even’, ‘but’, etc. Conventional implictures are a form of pragmatic presupposition, which involves an unsaid mode of delivery of content. I argue that we can make sense of conventional implicatures, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. Towards the Phenomenology of Hybrids as Regenerative Design and Use -A Post-Heideggerian Account.Magdalena Hoły-Łuczaj & Vincent Blok - 2022 - Environmental Values 1 (4):469-491.
    Grasping the identity of hybrids, that is beings which cross the binarism of nature and technology (e.g. genetically-modified organisms (GMOs), syn-bio inventions, biomimetic projects), is problematic since it is still guided by self-evident dualistic categories, either as artefacts or as natural entities. To move beyond the limitations of such a one-sided understanding of hybrids, we suggest turning towards the categories of affordances and the juxtaposition of needs and patterns of proper use, as inspired by the Heideggerian version of phenomenology. Drawing (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Hybrid Power-Sharing in Indonesia.Krzysztof Trzcinski - 2017 - Polish Political Science Yearbook 46 (1):168–185.
    The aim of this study is to demonstrate the validity of the thesis that in Indonesia one can find institutions that characterize two power-sharing models which are considered opposites of one another in political theory – centripetalism and consociationalism. In consequence, the Indonesian power-sharing system should be viewed as a hybrid, or mixed, system, and not a typically centripetal system as is usually the case in the literature. At the beginning of this article, a short analysis of Indonesia’s political (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  85
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  27
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  48. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A Hybrid Theory of Ethical Thought and Discourse.Drew Johnson - 2022 - Dissertation, University of Connecticut
    What is it that we are doing when we make ethical claims and judgments, such as the claim that we morally ought to assist refugees? This dissertation introduces and defends a novel theory of ethical thought and discourse. I begin by identifying the surface features of ethical thought and discourse to be explained, including the realist and cognitivist (i.e. belief-like) appearance of ethical judgments, and the apparent close connection between making a sincere ethical judgment and being motivated to act on (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 684