Results for 'Private Cloud'

1000+ found
Order:
  1. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  2. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  4. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  99
    Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar trebuie (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   159 citations  
  14. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to form (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  64
    NUVEM (Cloud).Mota Victor - manuscript
    knowing and not knowing in a regular social context and the emergente of monastic revolution of the self and its owner.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Private Investigators and Public Speakers.Alexander Sandgren - 2023 - Journal of the American Philosophical Association 9 (1):95-113.
    Near the end of 'Naming the Colours', Lewis (1997) makes an interesting claim about the relationship between linguistic and mental content; we are typically unable to read the content of a belief off the content of a sentence used to express that belief or vice versa. I call this view autonomism. I motivate and defend autonomism and discuss its importance in the philosophy of mind and language. In a nutshell, I argue that the different theoretical roles that mental and linguistic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Private Schools and Queue‐jumping: A reply to White.Mark Jago & Ian James Kidd - 2020 - Journal of Philosophy of Education 54 (5):1201-1205.
    John White (2016) defends the UK private school system from the accusation that it allows an unfair form of ‘queue jumping’ in university admissions. He offers two responses to this accusation, one based on considerations of harm, and one based on meritocratic distribution of university places. We will argue that neither response succeeds: the queue-jumping argument remains a powerful case against the private school system in the UK. We begin by briefly outlining the queue-jumping argument (§1), before evaluating (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. The Private Language Argument and a Second-Person Approach to Mindreading.Joshua Johnson - 2013 - European Journal for Philosophy of Religion 5 (4):75--86.
    I argue that if Wittgenstein’s Private Language Argument is correct, then both Theory Theory and Simulation Theory are inadequate accounts of how we come to know other minds since both theories assume the reality of a private language. Further, following the work of a number of philosophers and psychologists, I defend a ‘Second-Person Approach’ to mindreading according to which it is possible for us to be directly aware of at least some of the mental states of others. Because (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Private languages and private theorists.D. T. Bain - 2004 - Philosophical Quarterly 54 (216):427-434.
    Simon Blackburn objects that Wittgenstein's private language argument overlooks the possibility that a private linguist can equip himself with a criterion of correctness by confirming generalizations about the patterns in which his private sensations occur. Crispin Wright responds that appropriate generalizations would be too few to be interesting. But I show that Wright's calculations are upset by his failure to appreciate both the richness of the data and the range of theories that would be available to the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Private memory confers no advantage.Samuel Allen Alexander - forthcoming - Cifma.
    Mathematicians and software developers use the word "function" very differently, and yet, sometimes, things that are in practice implemented using the software developer's "function", are mathematically formalized using the mathematician's "function". This mismatch can lead to inaccurate formalisms. We consider a special case of this meta-problem. Various kinds of agents might, in actual practice, make use of private memory, reading and writing to a memory-bank invisible to the ambient environment. In some sense, we humans do this when we silently (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Against private surrogacy: a child-centred view.Anca Gheaus - forthcoming - Oxford University Press.
    Surrogacy involves a private agreement whereby a woman who gestates a child attempts to surrender her (putative) moral right to become the parent of that child such that another person (or persons), of the woman’s choice, can acquire it. Since people lack the normative power to privately transfer custody, attempts to do so are illegitimate, and the law should reflect this fact.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Private Contractors, Foreign Troops, and Offshore Detention Centers: The Ethics of Externalizing Immigration Controls.Alex Sager - 2018 - APA Newsletter on Hispanic/Latino Issues in Philosophy 17 (2):12-15.
    Despite the prevalence of externalization, much work in the ethics of immigration continues to assume that the admission of immigrants is determined by state immigration officials who decide whether to admit travelers at official crossings. This assumption neglects how decisions about entrance have been increasingly relocated abroad – to international waters, consular offices, airports, or foreign territories – often with non-governmental or private actors, as well as foreign governments functioning as intermediaries. Externalization poses a fundamental challenge to achieving just (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Privation theories of pain.Adam Swenson - 2009 - International Journal for Philosophy of Religion 66 (3):139 - 154.
    Most modern writers accept that a privation theory of evil should explicitly account for the evil of pain. But pains are quintessentially real. The evil of pain does not seem to lie in an absence of good. Though many directly take on the challenges this raises, the metaphysics and axiology of their answers is often obscure. In this paper I try to straighten things out. By clarifying and categorizing the possible types of privation views, I explore the ways in which (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  90
    The Cloud.Victor Adelino Ausina Mota - manuscript
    from monasticism to modern life, via Saint Francis and Buonaventura, euqating some purposes anda deliberations of an ideal and happy life on this complex world, even so you're not a social scientist or a social worker.
    Download  
     
    Export citation  
     
    Bookmark  
  28. Private Solidarity.Nicolas Bommarito - 2016 - Ethical Theory and Moral Practice 19 (2):445-455.
    It’s natural to think of acts of solidarity as being public acts that aim at good outcomes, particularly at social change. I argue that not all acts of solidarity fit this mold - acts of what I call ‘private solidarity’ are not public and do not aim at producing social change. After describing paradigmatic cases of private solidarity, I defend an account of why such acts are themselves morally virtuous and what role they can have in moral development.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Opening the Door to Cloud-Cuckoo-Land: Hempel and Kuhn on Rationality.Alexander George - 2012 - Journal for the History of Analytical Philosophy 1 (4).
    A reading is offered of Carl Hempel’s and Thomas Kuhn’s positions on, and disagreements about, rationality in science that relates these issues to the debate between W.V. Quine and Rudolf Carnap on the analytic/synthetic distinction.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Iterated privation and positive predication.Bjørn Jespersen, Massimiliano Carrara & Marie Duží - 2017 - Journal of Applied Logic 25:S48-S71.
    The standard rule of single privative modification replaces privative modifiers by Boolean negation. This rule is valid, for sure, but also simplistic. If an individual a instantiates the privatively modified property (MF) then it is true that a instantiates the property of not being an F, but the rule fails to express the fact that the properties (MF) and F have something in common. We replace Boolean negation by property negation, enabling us to operate on contrary rather than contradictory properties. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Louise Amoore: Cloud Ethics. Algorithms and the Attributes of Ourselves and Others.Anna-Verena Nosthoff & Felix Maschewski - 2021 - Behemoth. A Journal on Civilisation 14 (2).
    Download  
     
    Export citation  
     
    Bookmark  
  34. Private Incarceration – Towards a Philosophical Critique.Yoav Peled & Doron Navot - 2012 - Constellations 19 (2):216-234.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Effects of Cloud-based M-learning on Student Motivation and Creative Performance: A Case Study on Computer illustration Course.I.-Fan Tsai - unknown
    This study was conducted to explore the effects of cloud-based m- learning on students’ motivation and creative performance in computer illustration course. Variables of motivation, creative behavior, creative process and creative product were conducted to understand the situations, differences, and the predictive power cloud-based m-learning had in creative performance. A nonequivalent pretest–posttest design was adopted, and 123 university students from Taipei City, Taiwan,were recruited as research participants in the study during 10-weeks experiment. They were asked to complete a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Contextualism, Moral Disagreement, and Proposition Clouds.Jussi Suikkanen - 2019 - In Russ Shafer-Landau (ed.), Oxford Studies in Metaethics 14. Oxford: Oxford University Press. pp. 47-69.
    According to contextualist theories in metaethics, when you use a moral term in a context, the context plays an ineliminable part in determining what natural property will be the semantic value of the term. Furthermore, on subjectivist and relativist versions of these views, it is either the speaker's own moral code or her moral community's moral code that constitutes the reference-fixing context. One standard objection to views of this type is that they fail to enable us to disagree in ordinary (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Privation, parasite et perversion de la volonté.Seamus O’Neill - 2017 - Laval Théologique et Philosophique 73 (1):31-52.
    Augustin est bien connu comme défenseur d’une « théorie privative » du mal. On peut lire, par exemple, dans les Confessions que « le mal n’est que la privation du bien, à la limite du pur néant ». Le problème, cependant, avec les théories privatives du mal est qu’elles ne nous offrent pas, généralement, une explication robuste ni de l’activité du mal, ni de son pouvoir à causer des effets bien réels ; effets desquels l’expérience demande, malgré tout, une explication (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Logically Private Laws: Legislative Secrecy in "The War on Terror".Duncan Macintosh - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press. pp. 225-251.
    Wittgenstein taught us that there could not be a logically private language— a language on the proper speaking of which it was logically impossible for there to be more than one expert. For then there would be no difference between this person thinking she was using the language correctly and her actually using it correctly. The distinction requires the logical possibility of someone other than her being expert enough to criticize or corroborate her usage, someone able to constitute or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Private Sector Eyes Investment Funds.Vuong Quan Hoang - 1998 - Vietnam Investment Review 8:17-17.
    Research article title: Private Sector Eyes Investment Funds Author: Vuong Quan Hoang Outlet: Vietnam Investment Review (pg. 17) Published on: 15 - 21 June 1998.
    Download  
     
    Export citation  
     
    Bookmark  
  40. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Behind the Clouds.Victor Mota - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  43. Private Law Models for Public Law Concepts.Daniel Lee - 2008 - Review of Politics 70.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Clock System or Cloud System?: Applying Popper's Metaphor to the Study of Human Consciousness.Hillary S. Webb - 2012 - Paranthropology 3 (4).
    The question of what human consciousness “is,” how it “works,” and what it “does” is currently being approached by myriad fields of study, each with their own particular goals and research techniques. But despite the undeniably complex nature of this enigmatic phenomenon, the prevailing scientific and institutional paradigm seems to imply that only quantitative, experimentally focused approaches are a worthy means of illuminating “truth” about human consciousness. -/- In this paper, I begin by borrowing Popper’s metaphor of “clock systems” versus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Effects of Cloud Mobile Learning and Creative Environment on Student’s Creative Performances.Chen Si Yi - unknown
    The Purpose of this study was to investigate the effect of cloud mobile learning and creative environment on college student’s creativity performance. A nonequivalent pretest-posttest quasi-experimental design was used in this research. The objects were two freshman classes selected from a public university and randomly assigned to the experimental group and the control group. A learning activity named Amphibious Mechanical Beast was conducted in this teaching experiment. The experimental was taught using cloud mobile learning, while the control group (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Ontology, epistemology, and private ostensive definition.Irwin Goldstein - 1996 - Philosophy and Phenomenological Research 56 (1):137-147.
    People see five kinds of views in epistemology and ontology as hinging on there being words a person can learn only by private ostensive definitions, through direct acquaintance with his own sensations: skepticism about other minds, 2. skepticism about an external world, 3. foundationalism, 4. dualism, and 5. phenomenalism. People think Wittgenstein refuted these views by showing, they believe, no word is learnable only by private ostensive definition. I defend these five views from Wittgenstein’s attack.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47.  99
    On the Privation Theory of Evil.Parker Haratine - 2023 - TheoLogica: An International Journal for Philosophy of Religion and Philosophical Theology 7 (2).
    Augustine’s privation theory of evil maintains that something is evil in virtue of a privation, a lack of something which ought to be present in a particular nature. While it is not evil for a human to lack wings, it is indeed evil for a human to lack rationality according to the end of a rational nature. Much of the literature on the privation theory focuses on whether it can successfully defend against counterexamples of positive evils, such as pain. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Leibniz on Privations, Limitations, and the Metaphysics of Evil.Samuel Newlands - 2014 - Journal of the History of Philosophy 52 (2):281-308.
    There was a consensus in late Scholasticism that evils are privations, the lacks of appropriate perfections. For something to be evil is for it to lack an excellence that, by its nature, it ought to have. This widely accepted ontology of evil was used, in part, to help explain the source of evil in a world created and sustained by a perfect being. during the second half of the seventeenth century, progressive early moderns began to criticize the traditional privative account (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  49. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Does the Tractatus Contain a Private Language Argument?William Child - 2013 - In Peter M. Sullivan & Michael D. Potter (eds.), Wittgenstein's Tractatus: history and interpretation. Oxford: Oxford University Press. pp. 143-169.
    Cora Diamond has claimed that Wittgenstein’s Tractatus contains an early ‘private language argument’: an argument that private objects in other people’s minds can play no role in the language I use for talking about their sensations. She further claims that the Tractatus contains an early version of the later idea that an inner process stands in need of outward criteria. The paper argues against these claims, on the grounds that they depend on an unwarranted construal of the Tractatus’s (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000