Results for 'Open Cloud'

963 found
Order:
  1. Opening the Door to Cloud-Cuckoo-Land: Hempel and Kuhn on Rationality.Alexander George - 2012 - Journal for the History of Analytical Philosophy 1 (4).
    A reading is offered of Carl Hempel’s and Thomas Kuhn’s positions on, and disagreements about, rationality in science that relates these issues to the debate between W.V. Quine and Rudolf Carnap on the analytic/synthetic distinction.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private (...) SJF is utilized for planning and to conquer shape the issue of starvation we utilize limited pausing. For stack adjusting we screen the heap and dispatch the activity to the minimum stacked VM. To acquire advantage and to have open door for future upgrade out in the open cloud condition cognizance is the key factor and for better execution and load adjusting likewise wanted. While stack adjusting enhances the execution, the earth awareness increment the benefit of cloud suppliers. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Effects of Cloud Mobile Learning and Creative Environment on Student’s Creative Performances.Chen Si Yi - unknown
    The Purpose of this study was to investigate the effect of cloud mobile learning and creative environment on college student’s creativity performance. A nonequivalent pretest-posttest quasi-experimental design was used in this research. The objects were two freshman classes selected from a public university and randomly assigned to the experimental group and the control group. A learning activity named Amphibious Mechanical Beast was conducted in this teaching experiment. The experimental was taught using cloud mobile learning, while the control group (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. ATLAS DE NUVENS: UMA LEITURA POSSÍVEL POR MEIO DE WALTER BENJAMIN.Gustavo Ruiz da Silva & Eberval Gadelha Figueiredo Junior - 2022 - Occursus 1 (7):157-170.
    Knowing that Cloud Atlas (2016) opens various analytical possibilities, this brief essay chooses to map possible relationships that the book, especially concerning stories 3, 5, and 6, can establish with Walter Benjamin's philosophy, more punctually, his Theses on the Philosophy of History. It will be briefly introduced, to this end, a summary of each of the six short stories that make up Cloud Atlas and its structural organization. After that, it will be indicated specific passages by Walter Benjamin (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Gods of Transhumanism.Alex V. Halapsis - 2019 - Anthropological Measurements of Philosophical Research 16:78-90.
    Purpose of the article is to identify the religious factor in the teaching of transhumanism, to determine its role in the ideology of this flow of thought and to identify the possible limits of technology interference in human nature. Theoretical basis. The methodological basis of the article is the idea of transhumanism. Originality. In the foreseeable future, robots will be able to pass the Turing test, become “electronic personalities” and gain political rights, although the question of the possibility of machine (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Maximality, Function, and the Many.Robert Francescotti - 2019 - Metaphysica 20 (2):175-193.
    In the region where some cat sits, there are many very cat-like items that are proper parts of the cat (or otherwise mereologically overlap the cat) , but which we are inclined to think are not themselves cats, e.g. all of Tibbles minus the tail. The question is, how can something be so cat-like without itself being a cat. Some have tried to answer this “Problem of the Many” (a problem that arises for many different kinds of things we regularly (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. John S. Wilkins and Malte C. Ebach: The Nature of Classification: Relationships and Kinds in the Natural Sciences: Palgrave, Macmillan, 2014, pp., vii + 197, Price £60/$100.00.Catherine Kendig - 2015 - History and Philosophy of the Life Sciences 37 (4):477-479.
    John Wilkins and Malte Ebach respond to the dismissal of classification as something we need not concern ourselves with because it is, as Ernest Rutherford suggested, mere ‘‘stamp collecting.’’ They contend that classification is neither derivative of explanation or of hypothesis-making but is necessarily prior and prerequisite to it. Classification comes first and causal explanations are dependent upon it. As such it is an important (but neglected) area of philosophical study. Wilkins and Ebach reject Norwood Russell Hanson’s thesis that classification (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Ibn Ḥazm on Heteronomous Imperatives and Modality. A Landmark in the History of the Logical Analysis of Norms.Shahid Rahman, Farid Zidani & Walter Young - 2022 - London: College Publications, ISBN 978-1-84890-358-6, pp. 97-114., 2021.: In C. Barés-Gómez, F. J. Salguero and F. Soler (Ed.), Lógica Conocimiento y Abduccción. Homenaje a Angel Nepomuceno..
    The passionate and staunch defence of logic of the controversial thinker Ibn Ḥazm, Abū Muḥammad ʿAlī b. Aḥmad b. Saʿīd of Córdoba (384-456/994-1064), had lasting consequences in the Islamic world. Indeed, his book Facilitating the Understanding of the Rules of Logic and Introduction Thereto, with Common Expressions and Juristic Examples (Kitāb al-Taqrīb li-ḥadd al-manṭiq wa-l-mudkhal ilayhi bi-l-alfāẓ al-ʿāmmiyya wa-l-amthila al-fiqhiyya), composed in 1025-1029, was well known and discussed during and after his time; and it paved the way for the studies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Big Tech and the Smartification of Agriculture.Anna-Verena Nosthoff & Felix Maschewski - 2022 - Https://Projects.Itforchange.Net/State-of-Big-Tech/Big-Tech-and-the-Smartification-of-Agriculture-a- Critical-Perspective/.
    The paper outlines critical aspects concerning the increasing use of big data in agriculture and farming. In particular, the aim is to shed light on the emerging dominance of the platform economy in the field of agriculture and food production. To analyze those power structures shaping this dynamic, we start with brief observations on the general relationship between digitization and agriculture and explain the platform economy, its general business model, and the proprietary forms of market power emerging from it. Subsequently, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Traducere şi traducători.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    Include Ghidul Comisiei Europene pentru traducătorii din Uniunea Europeană Despre traducere şi traducători, teorii ale traducerilor, traducerea asistată pe calculator, şi software utilizat în traduceri. Include Ghidul Comisiei Europene pentru traducătorii din Uniunea Europeană şi legislaţia specifică traducerilor şi traducătorilor. Fidelitatea (sau loialitatea) şi transparenţa, idealurile duale în traducere, sunt de multe ori în conflict. Problema fidelităţii versus transparenţă a fost formulată şi în termeni de “echivalenţă formală” şi ” echivalenţă dinamică, sau funcţională“. Cele din urmă expresii sunt asociate cu (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary to structure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  15. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  36
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  30
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  22. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  24.  19
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. (1 other version)Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  26. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   162 citations  
  31. Open Science, Open Data, and Open Scholarship: European Policies to Make Science Fit for the Twenty-First Century.Rene Von Schomberg, Jean-Claude Burgelman, Corina Pascu, Kataezyna Szkuta, Athanasios Karalopoulos, Konstantinos Repanas & Michel Schouppe - 2019 - Frontiers in Big Data 2:43.
    Open science will make science more efficient, reliable, and responsive to societal challenges. The European Commission has sought to advance open science policy from its inception in a holistic and integrated way, covering all aspects of the research cycle from scientific discovery and review to sharing knowledge, publishing, and outreach. We present the steps taken with a forward-looking perspective on the challenges laying ahead, in particular the necessary change of the rewards and incentives system for researchers (for which (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  31
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  33. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  23
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  35
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. NUVEM (Cloud).Mota Victor - manuscript
    knowing and not knowing in a regular social context and the emergente of monastic revolution of the self and its owner.
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Open Systems View.Michael E. Cuffaro & Stephan Hartmann - 2023
    There is a deeply entrenched view in philosophy and physics, the closed systems view, according to which isolated systems are conceived of as fundamental. On this view, when a system is under the influence of its environment this is described in terms of a coupling between it and a separate system which taken together are isolated. We argue against this view, and in favor of the alternative open systems view, for which systems interacting with their environment are conceived of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Alethic Openness and the Growing Block Theory of Time.Batoul Hodroj, Andrew J. Latham, Jordan Lee-Tory & Kristie Miller - 2022 - The Philosophical Quarterly 73 (2):532-556.
    Whatever its ultimate philosophical merits, it is often thought that the growing block theory presents an intuitive picture of reality that accords well with our pre-reflective or folk view of time, and of the past, present, and future. This is partly motivated by the idea that we find it intuitive that, in some sense, the future is open and the past closed, and that the growing block theory is particularly well suited to accommodate this being so. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. Open-Mindedness, Rational Confidence, and Belief Change.Katia Vavova - 2023 - Social Epistemology Review and Reply Collective 12 (2):33–44.
    It’s intuitive to think that (a) the more sure you are of something, the harder it’ll be to change your mind about it, and (b) you can’t be open-minded about something if you’re very sure about it. If these thoughts are right, then, with minimal assumptions, it follows that you can’t be in a good position to both escape echo chambers and be rationally resistant to fake news: the former requires open-mindedness, but the latter is inimical to it. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  41. Contextualism, Moral Disagreement, and Proposition Clouds.Jussi Suikkanen - 2019 - In Russ Shafer-Landau (ed.), Oxford Studies in Metaethics Volume 14. Oxford Studies in Metaethics. pp. 47-69.
    According to contextualist theories in metaethics, when you use a moral term in a context, the context plays an ineliminable part in determining what natural property will be the semantic value of the term. Furthermore, on subjectivist and relativist versions of these views, it is either the speaker's own moral code or her moral community's moral code that constitutes the reference-fixing context. One standard objection to views of this type is that they fail to enable us to disagree in ordinary (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  42. The Open Future: Why Future Contingents Are All False.Patrick Todd - 2021 - Oxford: Oxford University Press.
    This book launches a sustained defense of a radical interpretation of the doctrine of the open future. Patrick Todd argues that all claims about undetermined aspects of the future are simply false.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  43.  83
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  66
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Is open-mindedness truth-conducive?Brent Madison - 2019 - Synthese 196 (5):2075-2087.
    What makes an intellectual virtue a virtue? A straightforward and influential answer to this question has been given by virtue-reliabilists: a trait is a virtue only insofar as it is truth-conducive. In this paper I shall contend that recent arguments advanced by Jack Kwong in defence of the reliabilist view are good as far as they go, in that they advance the debate by usefully clarifying ways in how best to understand the nature of open-mindedness. But I shall argue (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  47. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Open Source Production of Encyclopedias: Editorial Policies at the Intersection of Organizational and Epistemological Trust.Paul B. de Laat - 2012 - Social Epistemology 26 (1):71-103.
    The ideas behind open source software are currently applied to the production of encyclopedias. A sample of six English text-based, neutral-point-of-view, online encyclopedias of the kind are identified: h2g2, Wikipedia, Scholarpedia, Encyclopedia of Earth, Citizendium and Knol. How do these projects deal with the problem of trusting their participants to behave as competent and loyal encyclopedists? Editorial policies for soliciting and processing content are shown to range from high discretion to low discretion; that is, from granting unlimited trust to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  49. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 963