Results for 'Internet-based plagiarism detection service'

999 found
Order:
  1. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. CONTRACT CHEATING IN ISRAEL DURING THE COVID-19 PANDEMIC.Yovav Eshet - 2022 - European Conference on Academic Integrity and Plagiarism 2022.
    Academic integrity is an essential pillar of any educational system. It is defined as acting in a manner consistent with the values and accepted standards of ethical practices in teaching, learning, and scholarship (Fishman, 2015). Contract cheating, or ghostwriting, is currently one of the most severe violations of academic integrity. It involves students engaging a third party, usually an online essay writing service, to complete their academic works on their behalf (Draper et al., 2021). Some of these services offer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Conceptual Access-NeTwORk (CANTOR) Thesis: Theorizing the Development or Success of New Internet-Based Products, Services, or Technologies.La Shun L. Carroll - 2023 - Indonesian Journal of Innovation and Applied Sciences (Ijias) 3 (2):86-98.
    For any new internet-based product, service, or technology to succeed, it must satisfy the criterion of providing access to or creating a network of possible users, products, and services. This is the Conceptual Access-Network (CANTOR) Thesis proposed. In addition to the main issues of success and how and why internet technology evolves, the principle can also meet the objective of explaining what underlies a range of traditional and nontraditional technologies beyond the internet. Through qualitative exploration, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Professional variables and staff readiness to utilise internet-based channels for research communication in an Era of Covid-19.Valentine Joseph Owan, Levi Udochukwu Akah, Ogbeche Mary Mark & Moses Eteng Obla - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 5863.
    This study assessed the professional variables of academic staff in African varsities and their readiness to Utilise Internet-Based Channels for Research Communication in an era of Covid-19. Drawing from Maslow’s hierarchy of needs theory, the study was guided by four null hypotheses. The quantitative research method based on the virtual cross-sectional survey design was adopted. A total of 8,591 academics in African universities were the targeted demographic of this study. However, data were collected from a virtual snowball (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Ctrl C + Ctrl V: Plagiarism and Knowledge on Referencing and Citation among Pre-service Teachers.Jupeth Pentang & Ronalyn M. Bautista - 2022 - International Journal of Multidisciplinary: Applied Business and Education Research 3 (2):245-257.
    Issues on plagiarism among pre-service teachers (PSTs) have increased in modular and online learning. To confirm this, the study determined the PSTs’ level of awareness on plagiarism; their knowledge on referencing and citation; and the correlation between their level of awareness on plagiarism and knowledge on referencing and citation, with their academic performance. The study employed a descriptive-correlational research design participated by 235 PSTs randomly sampled through strata. The data were gathered through a web-based survey. (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  7. Preconception Sex Selection: A Survey of Visitors to an Internet-Based Health Forum.Edgar Dahl - 2008 - Reproductive Biomedicine Online 16 (1):18-26.
    The aim of this survey was to explore the attitudes towards gender selection, focusing on people who were affected by infertility and also familiar with advanced technologies such as the internet. Although this survey is based almost exclusively on answers from women, it seems reasonable to conclude that a widely available service for preconception sex selection for non-medical reasons would not cause a severe gender imbalance in Germany.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Academic Integrity: Understanding Essence of Undergraduates’ Plagiarism in Their Research Writing at a Southern Chinese University.Zhengyan Guo - 2022 - The 5Th World Conference on Research in Education.
    In China, plagiarism among undergraduate students has been a protuberant issue preventing the robust development of tertiary education. The purpose of this Interpretative Phenomenological Analysis (IPA) research was to acquire a profound understanding of the essence of the phenomenon through the process of students’ research writing at Shaoyang University (SYU), a southern Chinese University. Employing a step-wise combination of purposive and random sampling techniques, 11 participants were selected to partake in the study’s online, face-to-face, and one-on-one semi-structured interviews. On (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Reasons for endorsing or rejecting ‘self-binding directives’ in bipolar disorder: a qualitative study of survey responses from UK service users.Tania Gergel, Preety Das, Lucy Stephenson, Gareth Owen, Larry Rifkin, John Dawson, Alex Ruck Keene & Guy Hindley - 2021 - The Lancet Psychiatry 8.
    Summary Background Self-binding directives instruct clinicians to overrule treatment refusal during future severe episodes of illness. These directives are promoted as having potential to increase autonomy for individuals with severe episodic mental illness. Although lived experience is central to their creation, service users’ views on self-binding directives have not been investigated substantially. This study aimed to explore whether reasons for endorsement, ambivalence, or rejection given by service users with bipolar disorder can address concerns regarding self-binding directives, decision-making capacity, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  19
    EFEITO DA APLICAÇÃO DO GNRH NO INÍCIO DOS PROTOCOLOS DE IATF, À BASE DE ESTRÓGENO E PROGESTERONA, SOBRE A PRENHEZ POR IATF DE VACAS LEITEIRAS MESTIÇAS.Lorrany Evelyn Tavares - 2023 - Dissertation, Universidade Federal de Uberlândia - Ufu
    RESUMO A inseminação artificial em tempo fixo (IATF) é uma das biotecnologias de reprodução mais estudadas dos últimos anos, e a busca pelo equilíbrio entre a fisiologia animal e o controle hormonal fomenta uma série de estudos. Sendo assim, o objetivo com este trabalho foi avaliar a eficiência da aplicação do hormônio liberador de gonadotrofinas (GnRH) no dia zero (D0) do protocolo de IATF, a base de estrógeno e progesterona sobre a taxa de penhez por IATF. O experimento foi desenvolvido (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Thought of Legal Research with Examples and Demonstrations.Kiyoung Kim - 2015 - SSRN.
    The policy makers or lawyers may face the need of legal research for reasons. The congressmen may plan to make new laws to address the challenges of their constituent or to the interest of nation. The lawyers may need to serve their clients who like to know the legal issues involved, the strategies to deal with their loss and recovery, and prospect for winning the case if the dispute has gotten worse. The lawyers may practice in a solo business or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  20. The Comparative Advantages of Brain-Based Lie Detection: The P300 Concealed Information Test and Pre-trial Bargaining.John Danaher - 2015 - International Journal of Evidence and Proof 19 (1).
    The lie detector test has long been treated with suspicion by the law. Recently, several authors have called this suspicion into question. They argue that the lie detector test may have considerable forensic benefits, particularly if we move past the classic, false-positive prone, autonomic nervous system-based (ANS-based) control question test, to the more reliable, brain-based, concealed information test. These authors typically rely on a “comparative advantage” argument to make their case. According to this argument, we should not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the partial occlusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Internet and Biometric Web Based Business Management Decision Support.Artūras Kaklauskas - 2023 - Vilnius, Lithuania: Vilnius Gediminas Technical University, Lithuania.
    Internet and Biometric Web Based Business Management Decision Support MICROBE MOOC material prepared under IO1/A5 Development of the MICROBE personalized MOOCs content and teaching materials Prepared by: A. Kaklauskas, A. Banaitis, I. Ubarte Vilnius Gediminas Technical University, Lithuania Project No: 2020-1-LT01-KA203-078100.
    Download  
     
    Export citation  
     
    Bookmark  
  23.  98
    Retribution of Plagiarism Founded on Reason-based Actions.Ignace Haaz - 2021 - In Ike Obiora F., Mbae Justus, Onyia Chidiebere & Makinda Herbert (eds.), Mainstreaming Ethics in Higher Education The Teacher: Between Knowledge Transmission and Human Formation Vol. 2, Obiora Ike / Justus Mbae / Chidiebere Onyia / Herbert Makinda (Eds.). Globethics. pp. 135-162.
    This chapter as the whole book are a result of a Globethics conference in March 2018 at the Catholic University of East Africa (CUEA) in Kenya, focused on the integration of Ethics in Higher Education. The book captures the potential for sharing of knowledge, and triggering interdisciplinary collaboration and research across a wide variety of issues ranging from research practice, religion, entrepreneurship, leadership, fundraising and corruption. While some of the chapters focus on the understanding of ethics and its relationship with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Detection and Mathematical Modeling of Anxiety Disorder Based on Socioeconomic Factors Using Machine Learning Techniques.Razan Ibrahim Alsuwailem & Surbhi Bhatia - 2022 - Human-Centric Computing and Information Sciences 12:52.
    The mental risk poses a high threat to the individuals, especially overseas demographic, including expatriates in comparison to the general Arab demographic. Since Arab countries are renowned for their multicultural environment with half of the population of students and faculties being international, this paper focuses on a comprehensive analysis of mental health problems such as depression, stress, anxiety, isolation, and other unfortunate conditions. The dataset is developed from a web-based survey. The detailed exploratory data analysis is conducted on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The new ethical responsibilities of internet service providers.Luciano Floridi - 2011 - Philosophy and Technology 24 (4):369-370.
    The exponential developments of internet services and resources have brought enormous benefits, but also enormous moral and ethical challenges. This paper introduces the contributions from a research workshop, tasked with defining new ethical responsibilities for Internet Service Providers (ISPs).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Awareness of Plagiarism among Student Teachers of Indian Teacher Educational Institutions.Subaveerapandiyan A. & R. Nandhakumar - 2023 - Indian Journal of Educational Technology 5 (2):44-54.
    Today, the Internet is a rich source of study materials, and Google Scholar offers free access to a large number of scientific articles. There are excellent research publications available in many more databases. Students have the option of easily copying the material. Reusing, paraphrasing, patchwriting, and ghostwriting without citing the original documents are plagiarism. Plagiarism is increasing in academics, particularly in research. This study aims to study the awareness of plagiarism and to analyze the reasons for (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  95
    Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, we proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. PROMES: An ontology‐based messaging service for semantically interoperable information exchange during disaster response.Linda Elmhadhbi, Mohamed‐Hedi Karray, Bernard Archimède, J. Neil Otte & Barry Smith - 2020 - Journal of Contingencies and Crisis Management 28 (3):324-338.
    Disaster response requires the cooperation of multiple emergency responder organizations (EROs). However, after‐action reports relating to large‐scale disasters identity communication difficulties among EROs as a major hindrance to collaboration. On the one hand, the use of two‐radio communication, based on multiple orthogonal frequencies and uneven coverage, has been shown to degrade inter‐organization communication. On the other hand, because they reflect different areas of expertise, EROs use differing terminologies, which are difficult to reconcile. These issues lead to ambiguities, misunderstandings, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Recurrent Neural Network Based Speech emotion detection using Deep Learning.P. Pavithra - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):65-77.
    In modern days, person-computer communication systems have gradually penetrated our lives. One of the crucial technologies in person-computer communication systems, Speech Emotion Recognition (SER) technology, permits machines to correctly recognize emotions and greater understand users' intent and human-computer interlinkage. The main objective of the SER is to improve the human-machine interface. It is also used to observe a person's psychological condition by lie detectors. Automatic Speech Emotion Recognition(SER) is vital in the person-computer interface, but SER has challenges for accurate recognition. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Plagiarism Software is a Creator or Destroyer for Effective Writing.A. Subaveerapandiyan - 2022 - DESIDOC Journal of Library and Information Technology 42 (2): 114-118.
    Plagiarism is malpractice, the fabrication of others’ “ideas or work” published without the proper permission or citation of the original contributors. Plagiarism is detected through different software, i.e., Turnitin, before publishing any research data. The present survey study assesses whether academicians, researchers, and scholars around the world perceive this software as a creator or destroyer of new thoughts and ideas. A survey of this research data was conducted with academicians, researchers, and scholars around the globe. The number of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. A Community Based Study on the Role of Maternal Education on Antenatal Care Services and Child Care at Various Tribal Villages, Adilabad, Telangana State.A. Ravinder & G. Sreekanth - 2020 - Journal of Contemporary Medicine and Dentistry 8 (2):05-09.
    Background: Educated women tend to have a greater awareness of the existence of ANC services, more aware of health problems, know more about the availability of health care services, and utilize the information more effectively than non-educated women. Moreover, higher levels of education tend to positively affect healthseeking behaviors, and education may increase a woman’s control over her pregnancy and expose women to more health education messages and campaigns, enabling them to recognize danger signs and complications and take appropriate action. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The internet: which future for organised knowledge, Frankenstein or Pygmalion? Part 1.Luciano Floridi - 1995 - International Journal of Human-Computer Studies 43 (2):261–274.
    The Internet is like a new country, with a growing population of millions of well educated citizens. If it wants to keep track of its own cultural achievements in real time, it will have to provide itself with an infostructure like a virtual National Library system. This paper proposes that institutions all over the world should take full advantage of the new technologies available, and promote and coordinate such a global service. This is essential in order to make (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  33. ARTIFICIAL INTELLIGENT BASED COMPUTATIONAL MODEL FOR DETECTING CHRONIC-KIDNEY DISEASE.K. Jothimani & S. Thangamani - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):15-27.
    Chronic kidney disease (CKD) is a global health problem with high morbidity and mortality rate, and it induces other diseases. There are no obvious incidental effects during the starting periods of CKD, patients routinely disregard to see the sickness. Early disclosure of CKD enables patients to seek helpful treatment to improve the development of this disease. AI models can effectively assist clinical with achieving this objective on account of their fast and exact affirmation execution. In this appraisal, proposed a Logistic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This research (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  40. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert Cavalier (ed.), The Impact of the Internet on our moral lives. New York, NY, USA: pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  42. Service and Status Competition May Help Explain Perceived Ethical Acceptability.Hugh Desmond - 2020 - American Journal of Bioethics Neuroscience 11 (4):258-260.
    The dominant view on the ethics of cognitive enhancement (CE) is that CE is beholden to the principle of autonomy. However, this principle does not seem to reflect commonly held ethical judgments about enhancement. Is the principle of autonomy at fault, or should common judgments be adjusted? Here I argue for the first, and show how common judgments can be justified as based on a principle of service.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. In Service to Others: A New Evolutionary Perspective on Human Enhancement.Hugh Desmond - 2021 - Hastings Center Report 51 (6):33-43.
    In enhancement ethics, evolutionary theory has been largely perceived as supporting liberal views on enhancement, where decisions to enhance are predominantly regulated by the principle of individual autonomy. In this paper I critique this perception in light of recent scientific developments. Cultural evolutionary theory suggests a picture where individual interests are entangled with community interests, and this undermines the applicability of the principle of autonomy. This is particularly relevant for enhancement ethics, given how – I argue – decisions to enhance (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  49
    Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Augmenting Seasoned English Language Teachers’ ICT Skills through a Service-Learning Activity-based TPACK.John Rey Pelila, Shirley L. Ayao-ao, Ma Theresa B. Nollido, Princess Precious Gem D. Ico, Jackielou H. Cabral, Shaira Nadine A. Capiral & Mark Anthony T. Gavina - 2022 - Edulangue 5 (2):1-25.
    Due to the emergence of ICT in ELT sector, seasoned English teachers find it resistant to such a shift despite having a positive attitude towards its use. This quasi-experimental study aimed to examine the extent to which seasoned English language teachers developed their ICT skills through a Service-Learning Activity (SLA). Using a one-group pre- and post-test design, this study collected the data through a modified Needs Assessment Survey (NAS) distributed to fourteen purposively selected participants. It was administered to examine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Detecting the Factors Affecting Classroom Dialogue Quality.Chrysi Rapanta, Merce Garcia-Milà, Andrea Miralda Banda & Fabrizio Macagno - 2023 - Linguistics and Education 77:101223.
    Despite the emphasis on dialogue and argumentation in educational settings, still not much is known about how best we can support learners in their interthinking, reasoning, and metadialogic understanding. The goal of this classroom intervention study is to explore the degree of students’ dialogicity and its possible increase during a learning programme implementing dialogic and argument-based teaching goals and principles. In particular, we focus on how students from 5 to 15 years old engage with each other's ideas, and whether/how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary to structure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Counseling Services as Determinants of Senior Secondary 2 Anti-Social Behaviour in Calabar Education Zone of Cross River State, Nigeria.J. Juan - 2022 - Behaviour and Health 3 (1):183-202.
    This study aims to examine counseling services as determinants of senior secondary 2 students’ anti-social behaviour in Calabar Education Zone of Cross River State, Nigeria. The main independent variable of the study was counseling services which includes informative counseling services, rehabilitation while the dependent variable is anti-social behaviours. Two hypotheses were formulated to direct the study. Ex-post facto research design was adopted for the study. The population of the study consisted of 2686 senior secondary 2 students in 90 public secondary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Critical Rationalism and the Internet.Donald Gillies - 2023 - Journal of Philosophical Investigations at University of Tabriz 17 (42):80-90.
    The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999