Results for 'Hybrid Cloud'

659 found
Order:
  1.  16
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  50
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  12
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  14
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  13
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  16
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  98
    How to Do Philosophy with Sci-Fiction: A Case of Hybrid Textuality.Giacomo Pezzano & Stefano Gualeni - 2024 - Filosofia 69:249-264.
    The fictional worlds of science fiction can stimulate philosophical speculation towards socio-technical scenarios and trends that are extrapolated from our physical reality. This widely accepted observation highlights but one of the ways to pursue philosophy with the aid of fiction and science fiction in particular. In this paper, we argue that fiction can in itself constitute a philosophical, academic work and need not merely represent the subject about which such work speculates. This idea questions the currently predominant, institutional paradigm which (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Is Captain Kirk a natural blonde? Do X-ray crystallographers dream of electron clouds? Comparing model-based inferences in science with fiction.Ann-Sophie Barwich - 2017 - In Otávio Bueno, Steven French, George Darby & Dean Rickles (eds.), Thinking About Science, Reflecting on Art: Bringing Aesthetics and Philosophy of Science Together. New York: Routledge.
    Scientific models share one central characteristic with fiction: their relation to the physical world is ambiguous. It is often unclear whether an element in a model represents something in the world or presents an artifact of model building. Fiction, too, can resemble our world to varying degrees. However, we assign a different epistemic function to scientific representations. As artifacts of human activity, how are scientific representations allowing us to make inferences about real phenomena? In reply to this concern, philosophers of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary to structure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Empirically-Informed Modal Rationalism.Tuomas Tahko - 2016 - In Bob Fischer & Felipe Leon (eds.), Modal Epistemology After Rationalism. Cham: Springer. pp. 29-45.
    In this chapter, it is suggested that our epistemic access to metaphysical modality generally involves rationalist, a priori elements. However, these a priori elements are much more subtle than ‘traditional’ modal rationalism assumes. In fact, some might even question the ‘apriority’ of these elements, but I should stress that I consider a priori and a posteriori elements especially in our modal inquiry to be so deeply intertwined that it is not easy to tell them apart. Supposed metaphysically necessary identity statements (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  13. A Comparative Analysis of the Acquisition Transaction of Management Information Systems through Virtual and Face-to-Face Negotiations—The Perspective of Green IT Industry in Poland.Bartosz Wachnik, Aleksandra Krupa & Krzysztof Santarek - 2022 - Sustainability 14 (15):9531.
    The COVID-19 pandemic that began in 2020 has significantly impacted businesses, regardless of size or industry. The hybrid and remote working models have moved all meetings with potential and existing suppliers to an online environment. This also applies to small- and medium-sized enterprises (SMEs), which have had to adapt themselves to the new situation and implement the solutions necessary to survive on the market. On the other hand, clients have become more aware of the environment and its changes. Customers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  57
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  55
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  18. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  50
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  70
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), sulfur (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. (1 other version)Hybrid Dispositionalism and the Law.Teresa Marques - 2019 - In Toh Kevin, Plunkett David & Shapiro Scott (eds.), Dimensions of Normativity: New Essays on Metaethics and Jurisprudence. New York: Oxford University Press.
    Dworkin’s famous argument from legal disagreements poses a problem for legal positivism by undermining the idea that the law can be (just) the result of the practice and attitudes of norm-applying officials. In recent work, the chapter author argued that a hybrid contextualist theory paired with a dispositional theory of value—a hybrid dispositionalism, for short—offers the resources to respond to similar disagreement- based arguments in other evaluative and normative domains. This chapter claims that the theory the author advocates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  64
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. (1 other version)Hybrid Theories.Christopher Woodard - 2015 - In Guy Fletcher (ed.), The Routledge Handbook of Philosophy of Well-Being. New York,: Routledge. pp. 161-174.
    This chapter surveys hybrid theories of well-being. It also discusses some criticisms, and suggests some new directions that philosophical discussion of hybrid theories might take.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  25.  49
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  53
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Hybrid Accounts of Ethical Thought and Talk.Teemu Toppinen - 2018 - In Tristram Colin McPherson & David Plunkett (eds.), The Routledge Handbook of Metaethics. New York: Routledge. pp. 243-259.
    This is a draft of a chapter for the Routledge Handbook of Metaethics, edited by David Plunkett and Tristram McPherson. I offer an overview of hybrid views in metaethics, with main focus on hybrid cognitivist views such as those defended by Daniel Boisvert and David Copp, and on hybrid expressivist views such as those defended by Michael Ridge and myself.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28. Hybrids and the Boundaries of Moral Considerability or Revisiting the Idea of Non-Instrumental Value.Magdalena Holy-Luczaj & Vincent Blok - 2019 - Philosophy and Technology 34 (2):223-242.
    The transgressive ontological character of hybrids—entities crossing the ontological binarism of naturalness and artificiality, e.g., biomimetic projects—calls for pondering the question of their ethical status, since metaphysical and moral ideas are often inextricably linked. The example of it is the concept of “moral considerability” and related to it the idea of “intrinsic value” understood as a non-instrumentality of a being. Such an approach excludes hybrids from moral considerations due to their instrumental character. In the paper, we revisit the boundaries of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  29. Hybrid Expressivism: Virtues and Vices.Mark Schroeder - 2009 - Ethics 119 (2):257-309.
    This paper is a survey of recent ‘hybrid’ approaches to metaethics, according to which moral sentences, in some sense or other, express both beliefs and desires. I try to show what kinds of theoretical issues come up at the different choice points we encounter in developing such a view, to raise some problems and explain where they come from, and to begin to get a sense for what the payoff of such views can be, and what they will need (...)
    Download  
     
    Export citation  
     
    Bookmark   90 citations  
  30.  87
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Hybrid collective intentionality.Thomas Brouwer, Roberta Ferrario & Daniele Porello - 2020 - Synthese 199 (1-2):3367-3403.
    The theory of collective agency and intentionality is a flourishing field of research, and our understanding of these phenomena has arguably increased greatly in recent years. Extant theories, however, are still ill-equipped to explain certain aspects of collective intentionality. In this article we draw attention to two such underappreciated aspects: the failure of the intentional states of collectives to supervene on the intentional states of their members, and the role of non-human factors in collective agency and intentionality. We propose a (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  32. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The hybrid contents of memory.André Sant’Anna - 2020 - Synthese 197 (3):1263-1290.
    This paper proposes a novel account of the contents of memory. By drawing on insights from the philosophy of perception, I propose a hybrid account of the contents of memory designed to preserve important aspects of representationalist and relationalist views. The hybrid view I propose also contributes to two ongoing debates in philosophy of memory. First, I argue that, in opposition to eternalist views, the hybrid view offers a less metaphysically-charged solution to the co-temporality problem. Second, I (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  34. Visual Hybrids and Nonconceptual Aesthetic Perception.Michalle Gal - 2023 - Poetics Today 44 (:4 ( December 2023)):545-570.
    This essay characterizes the perception of the visual hybrid as nonconceptual, introducing the terminology of nonconceptual content theory to aesthetics. The visual hybrid possesses a radical but nonetheless exemplary aesthetic composition and is well established in culture, art, and even design. The essay supplies a philosophical analysis of the results of cross-cultural experiments, showing that while categorization or conceptual hierarchization kicks in when the visual hybrids are juxtaposed with linguistic descriptions, no conceptual scheme takes effect when participants are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Grounding practical normativity: going hybrid.Ruth Chang - 2013 - Philosophical Studies 164 (1):163-187.
    In virtue of what is something a reason for action? That is, what makes a consideration a reason to act? This is a metaphysical or meta-normative question about the grounding of reasons for action. The answer to the grounding question has been traditionally given in ‘pure’, univocal terms. This paper argues that there is good reason to understand the ground of practical normativity as a hybrid of traditional ‘pure’ views. The paper 1) surveys the three leading ‘pure’ answers to (...)
    Download  
     
    Export citation  
     
    Bookmark   110 citations  
  37. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  66
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Hybridizing Moral Expressivism and Moral Error Theory.Toby Svoboda - 2011 - Journal of Value Inquiry 45 (1):37-48.
    Philosophers should consider a hybrid meta-ethical theory that includes elements of both moral expressivism and moral error theory. Proponents of such an expressivist-error theory hold that all moral utterances are either expressions of attitudes or expressions of false beliefs. Such a hybrid theory has two advantages over pure expressivism, because hybrid theorists can offer a more plausible account of the moral utterances that seem to be used to express beliefs, and hybrid theorists can provide a simpler (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  41. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Hybridity in Agriculture.Catherine Kendig - 2012 - In Paul B. Thompson & David M. Kaplan (eds.), Encyclopedia of Food and Agricultural Ethics. New York: Springer Verlag.
    In a very general sense, hybrid can be understood to be any organism that is the product of two (or more) organisms where each parent belongs to a different kind. For example; the offspring from two or more parent organisms, each belonging to a separate species (or genera), is called a “hybrid”. “Hybridity” refers to the phenomenal character of being a hybrid. And “hybridization ” refers to both natural and artificial processes of generating hybrids. These processes include (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  89
    Hybrid Theory of Legal Statements and Disagreement on the Content of Law.M. Wieczorkowski - manuscript
    Disagreement is a pervasive feature of human discourse and a crucial force in shaping our social reality. From mundane squabbles about matters of taste to high-stakes disputes about law and public policy, the way we express and navigate disagreement plays a central role in both our personal and political lives. Legal discourse, in particular, is rife with disagreement - it is the very bread and butter of courtroom argument and legal scholarship alike. Consider a debate between two legal philosophers, Ronald (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  60
    Efficient Cloud-Enabled Cardiovascular Disease Risk Prediction and Management through Optimized Machine Learning.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-475.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  52
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  59
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  49
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Towards the Phenomenology of Hybrids as Regenerative Design and Use -A Post-Heideggerian Account.Magdalena Hoły-Łuczaj & Vincent Blok - 2022 - Environmental Values 1 (4):469-491.
    Grasping the identity of hybrids, that is beings which cross the binarism of nature and technology (e.g. genetically-modified organisms (GMOs), syn-bio inventions, biomimetic projects), is problematic since it is still guided by self-evident dualistic categories, either as artefacts or as natural entities. To move beyond the limitations of such a one-sided understanding of hybrids, we suggest turning towards the categories of affordances and the juxtaposition of needs and patterns of proper use, as inspired by the Heideggerian version of phenomenology. Drawing (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. NUVEM (Cloud).Mota Victor - manuscript
    knowing and not knowing in a regular social context and the emergente of monastic revolution of the self and its owner.
    Download  
     
    Export citation  
     
    Bookmark  
  50.  59
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 659