Results for 'Internet of things'

953 found
Order:
  1. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  2. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  4. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Towards the Epistemology of the Internet of Things Techno-Epistemology and Ethical Considerations Through the Prism of Trust.Ori Freiman - 2014 - International Review of Information Ethics 22:6-22.
    This paper discusses the epistemology of the Internet of Things [IoT] by focusing on the topic of trust. It presents various frameworks of trust, and argues that the ethical framework of trust is what constitutes our responsibility to reveal desired norms and standards and embed them in other frameworks of trust. The first section briefly presents the IoT and scrutinizes the scarce philosophical work that has been done on this subject so far. The second section suggests that the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  9. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  89
    RESEARCH ASPECTS IN WASTE MANAGEMENT AND THE USE OF INTELLIGENT TECHNOLOGIES.Mohit Gangwar - 2024 - Annals of the Bhandarkar Oriental Research Institute (6):151-157.
    The management of waste has become an increasingly critical issue as urbanization and industrial activities surge globally. Traditional waste management practices are struggling to keep pace with the rising quantities and complexities of waste. This paper delves into the integration of intelligent technologies, such as Artificial Intelligence (AI), the Internet of Things (IoT), and data analytics, into waste management systems. By examining current practices, methodologies, experiments, and results, this study aims to highlight the transformative potential of intelligent technologies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is pro- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  7
    Enhanced Campus Automation System and the emerging need for IoT integration: an automation perspective. [eCAS-IoT].J. Rajeshwar Rao & Siby Samuel - 2019 - In Cecilia Titiek Murniati & Heny Hartono (eds.), E-Proceedings International Conference on Innovation in Education: Opportunities and Challenges in Southeast Asia. Semarang: Universitas Katolik Soegijapranata. pp. 179-190.
    Technology has the power to break the limitations of traditional passive learning and innovate almost all aspects of everyday life with the power of connecting things of the world to the Internet, “Internet of Things (IoT).” IoT is no longer a phenomenon, but it has become a prevalent system in which people, processes, data, and things connect to the Internet and each other. This paper ‘Enhanced Campus Automation System and the emerging need of IoT (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. (1 other version)Mark Weiser and the Origins of Ubiquitous Computing. [REVIEW]Dustin Gray - 2024 - Metascience 33:257–259.
    In today’s world, technology seems to touch every aspect of our lives. Our processes for so many things have become automated and digitalized. The use of networked computational devices by both end users and corporations has become, in a word, ubiquitous. In many ways, the era of rapid technological growth we find ourselves in currently can be traced back to the work of the pioneering computer scientist, Mark Weiser. It is widely accepted among technologists today that his original vision (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  45
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Information Systems Governance and Industry 4.0 - epistemology of data and semiotic methodologies of IS in digital ecosystems.Ângela Lacerda Nobre, Rogério Duarte & Marc Jacquinet - 2018 - Advances in Information and Communication Technology 527:311-312.
    Contemporary Information Systems management incorporates the need to make explicit the links between semiotics, meaning-making and the digital age. This focus addresses, at its core, pure rationality, that is, the capacity of human interpretation and of human inscription upon reality. Creating the new real, that is the motto. Humans are intrinsically semiotic creatures. Consequently, semiotics is not a choice or an option but something that works like a second skin, establishing limits and permeable linkages between: human thought and human's infinite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  51
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  41
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  73
    AUGMENTED REALITY AND IOT-INTEGRATED SMART HOMES: ENHANCING USER EXPERIENCE AND AUTOMATION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The integration of Augmented Reality (AR) and the Internet of Things (IoT) within smart homes represents a significant leap forward in home automation and user experience. This paper explores a comprehensive framework that combines these technologies to create an immersive, efficient, and user-friendly smart home environment. By utilizing AR, users can interact with and control IoT-enabled devices in real time through visual and intuitive interfaces. This integration not only simplifies the management of home systems but also enhances the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Psychopower and Ordinary Madness: Reticulated Dividuals in Cognitive Capitalism.Ekin Erkan - 2019 - Cosmos and History 15 (1):214-241.
    Despite the seemingly neutral vantage of using nature for widely-distributed computational purposes, neither post-biological nor post-humanist teleology simply concludes with the real "end of nature" as entailed in the loss of the specific ontological status embedded in the identifier "natural." As evinced by the ecological crises of the Anthropocene—of which the 2019 Brazil Amazon rainforest fires are only the most recent—our epoch has transfixed the “natural order" and imposed entropic artificial integration, producing living species that become “anoetic,” made to serve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  70
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Theorising Web 3.0: ICTs in a changing society.David Kreps & Kai Kimppa - 2015 - Information Technology and People 28 (4):726-741.
    Abstract: Purpose – The purpose of this paper is to analyse the broad phases of web development: the read-only Web 1.0, the read-write Web 2.0, and the collaborative and Internet of Things Web 3.0, are examined for the theoretical lenses through which they have been understood and critiqued. Design/methodology/approach – This is a conceptual piece, in the tradition of drawing on theorising from outside the Information Systems field, to shed light on developments in information communication technologies (ICTs). Findings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. A novel Holistic Risk Assessment Concept: The Epistemological Positioning and the Methodology.Carrodano Tarantino Cinzia - unknown
    Risk is an intrinsic part of our lives. In the future, the development and growth of the Internet of things allows getting a huge amount of data. Considering this evolution, our research focuses on developing a novel concept, namely Holistic Risk Assessment (HRA), that takes into consideration elements outside the direct influence of the individual to provide a highly personalized risk assessment. The HRA implies developing a methodology and a model. This paper is related to the epistemological positioning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. rethinking machine ethics in the era of ubiquitous technology.Jeffrey White (ed.) - 2015 - Hershey, PA, USA: IGI.
    Table of Contents Foreword .................................................................................................... ......................................... xiv Preface .................................................................................................... .............................................. xv Acknowledgment .................................................................................................... .......................... xxiii Section 1 On the Cusp: Critical Appraisals of a Growing Dependency on Intelligent Machines Chapter 1 Algorithms versus Hive Minds and the Fate of Democracy ................................................................... 1 Rick Searle, IEET, USA Chapter 2 We Can Make Anything: Should We? .................................................................................................. 15 Chris Bateman, University of Bolton, UK Chapter 3 Grounding Machine Ethics within the Natural System ........................................................................ 30 Jared Gassen, JMG Advising, USA Nak Young Seong, Independent Scholar, South (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. M2M Networking Architecture for Data Transmission and Routing.Soujanya Ambala - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):59-63.
    We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server free and router free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases routing and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed based on small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.R. Indoria - 2024 - Technosaga 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban environments, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.Vishal Parmar - 2024 - Technosaga 2024 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban environments, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Ethics and Epistemology of Trust.J. Adam Carter, and & Mona Simion - 2020 - Internet Encyclopedia of Philosophy.
    Trust is a topic of longstanding philosophical interest. It is indispensable to every kind of coordinated human activity, from sport to scientific research. Even more, trust is necessary for the successful dissemination of knowledge, and by extension, for nearly any form of practical deliberation and planning. Without trust, we could achieve few of our goals and would know very little. Despite trust’s fundamental importance in human life, there is substantial philosophical disagreement about what trust is, and further, how trusting is (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  43. The Philosophy of Inquiry and Global Problems: The Intellectual Revolution Needed to Create a Better World.Nicholas Maxwell - 2024 - London: Palgrave-Macmillan.
    Bad philosophy is responsible for the climate and nature crises, and other global problems too that threaten our future. That sounds mad, but it is true. A philosophy of science, or of theatre or life is a view about what are, or ought to be, the aims and methods of science, theatre or life. It is in this entirely legitimate sense of “philosophy” that bad philosophy is responsible for the crises we face. First, and in a blatantly obvious way, those (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Struggle Is Real: The Experiences and Challenges Faced by Filipino Tertiary Students on Lack of Gadgets Amidst the Online Learning.Janelle Jose, Kristian Lloyd Miguel P. Juan, John Patrick Tabiliran, Franz Cedrick Yapo, Jonadel Gatchalian, Melanie Kyle Baluyot, Ken Andrei Torrero, Jayra Blanco & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 7 (1):174-181.
    Education is essential to life, and the epidemic affected everything. Parents want to get their kids the most important teaching. However, since COVID-19 has affected schools and other institutions, providing education has become the most significant issue. Online learning pedagogy uses technology to provide high-quality learning environments for student-centered learning. Further, this study explores the experiences and challenges faced by Filipino tertiary students regarding the lack of gadgets amidst online learning. Employing the Interpretative Phenomenological Analysis, the findings of this study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. “The Risk of Being Uninformed” - A paper on the character and implications of risk in the context of economically motivated crime.John Sliter - 2011 - Journal of Financial Crime 12 (1). Translated by John Sliter.
    Paper was presented at the 29th Annual Symposium on Economic Crime in Cambridge, England. -/- Regardless of our concern for privacy, real-time criminal activity information is being disseminated throughout cyberspace by the private sector. This information is growing very quickly while being archived for search and retrieval on a long term basis. This is inevitable and could not, nor should not, be stopped. -/- Law enforcement and government policy makers should consider the risk of sharing with the risk of not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Superinteligentny Lewiatan: Zarys problemu autonomii człowieka a autonomizacji urządzeń.Adrian Mróz - 2020 - Kultura I Historia 37 (1):1-18.
    Celem niniejszej pracy jest zastosowanie wizji „Lewiatana” Thomasa Hobbesa do koncepcji superinteligencji lub nadludzkiej inteligencji, które dyskutowane jest wśród transhumanistów i poruszone jest przez takich filozofów i futurologów jak między innymi Nick Bostrom, Stanisław Lem, albo Ray Kurzweil. Inspiracją mojej pracy były pytania w rodzaju: „kiedy człowiek przestaje być autonomicznym podmiotem?” albo „czy człowiek w ogóle może być samodzielny?”. Niemniej jednak wydaje mi się, że takie pytania mogą się pojawić wtedy, kiedy człowieka rozpoznamy jako zwierzę polityczne (politikon zoon w sensie (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Mental Imagery and Creativity: Cognition, Observation and Realization.William Brant - 2013 - Saarbrücken, Germany: Akademikerverlag.
    Mental images, or envisioning things with your "mind's eye," are now studied via multiple levels of observation and involve computational neuroscience, robotics and many disciplines that complement philosophy and form integral parts of cognitive science. MENTAL IMAGERY AND CREATIVITY offers an historical analysis of the use of "mental images" in science. This book also gives many useful illustrations, depicting roles of imagery with 21st century technology, including the usage of imagery, fMRIs and internet connections, allowing people to control (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Karl Popper: Philosophy of Science.Brendan Shea - 2011 - In James Fieser & Bradley Dowden (eds.), Internet Encyclopedia of Philosophy. Routledge.
    Karl Popper (1902-1994) was one of the most influential philosophers of science of the 20th century. He made significant contributions to debates concerning general scientific methodology and theory choice, the demarcation of science from non-science, the nature of probability and quantum mechanics, and the methodology of the social sciences. His work is notable for its wide influence both within the philosophy of science, within science itself, and within a broader social context. Popper’s early work attempts to solve the problem of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  49. Folklore in the Cultural Awakening of Amadi- Ama People in Port Harcourt City Local Government Area of Rivers State, Nigeria.Barigbon Gbara Nsereka - 2019 - International Journal of Innovative Research and Development 8 (3).
    Considering that the importance of folklore in development, especially cultural development, in communities seems to be lost to the present generation of young people, this study was carried out to determine the possible role of folklore in reawakening the cultural consciousness of the people of Amadi-Ama in Port Harcourt City Local Government Area of Rivers State, Nigeria, with a view to harmonizing and galvanizing the people who, unlike their forbears, seem not to know the importance of folklore which welded together (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Knowledge of things.Matt Duncan - 2020 - Synthese 197 (8):3559-3592.
    As I walk into a restaurant to meet up with a friend, I look around and see all sorts of things in my immediate environment—tables, chairs, people, colors, shapes, etc. As a result, I know of these things. But what is the nature of this knowledge? Nowadays, the standard practice among philosophers is to treat all knowledge, aside maybe from “know-how”, as propositional. But in this paper I will argue that this is a mistake. I’ll argue that some (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
1 — 50 / 953