Results for 'Searchable Encryption'

38 found
Order:
  1.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  44
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  44
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Ambiguous encryption implies that consciousness cannot be simulated.Anna Wegloop & Peter Vach - manuscript
    Here we show, based on a simplified version of fully homomorphic encryption, that it is not possible to simulate conscious experience, in the sense of using a computer algorithm to generate experiences that are indistinguishable from those of a particular typical human being. This seems to have important implications for questions in the context of future developments in artificial intelligence. For example, the proposed process of mind-uploading will in general not generate a virtual consciousness similar to the consciousness of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  95
    Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  55
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  49
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re- (...) keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  63
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  55
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  64
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  14.  47
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  99
    Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  87
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  55
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  59
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Reducing the Inadvertent Spread of Retracted Science: recommendations from the RISRS report.Jodi Schneider, Nathan D. Woods, Randi Proescholdt & The Risrs Team - 2022 - Research Integrity and Peer Review 7 (1).
    Background Retraction is a mechanism for alerting readers to unreliable material and other problems in the published scientific and scholarly record. Retracted publications generally remain visible and searchable, but the intention of retraction is to mark them as “removed” from the citable record of scholarship. However, in practice, some retracted articles continue to be treated by researchers and the public as valid content as they are often unaware of the retraction. Research over the past decade has identified a number (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  50
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. A Refutation of Goodman's Type‐Token Theory of Notation.John Dilworth - 2003 - Dialectica 57 (3):330-336.
    In Languages of Art, Nelson Goodman presents a general theory of symbolic notation. However, I show that his theory could not adequately explain possible cases of natural language notational uses, and argue that this outcome undermines, not only Goodman's own theory, but any broadly type versus token based account of notational structure.Given this failure, an alternative representational theory is proposed, in which different visual or perceptual aspects of a given physical inscription each represent a different letter, word, or other notational (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  23. Hegel: The Letters.Clark Butler and Christiane Seiler & Clark Butler G. W. F. Hegel - 1984 - Indiana University Press.
    740 page life in letters, including all Hegel's available letters at time of publication by Indiana University Press in 1984 tied together by a running commentary by Clark Butler. The volume is in a searchable PDF format. Publication was supported by a Major Grant by the National Endowment of the Humanities (NEH).
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. (1 other version)Review of Wittgenstein And Psychology A Practical Guide by Harre and Tissaw (2005).Michael Starks - 2017
    A major flaw of the book is its failure to note Wittgenstein’s role in destroying the mechanical or reductionist or computationalist view of mind. These continue to dominate cognitive science and philosophy in spite of the fact that they were powerfully countered by W and later by Searle and others. -/- There is much talk of W’s use of terms like “grammar”, “rules” etc but never a clear mention that they mean our Evolved Psychology or our genetically programmed innate behavior. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. (1 other version)The Necessity of Exosomatic Knowledge for Civilization and a Revision to our Epistemology.Ray Scott Percival - 2012 - In Norbert-Bertrand Barbe (ed.), LE NÉANT DANS LA PENSÉE CONTEMPORAINE. Publications du Centre Fran. pp. 136-150.
    The traditional conception of knowledge is justified, true belief. This located knowledge within the person's mind. I argue that due to the explosive growth of what I like to call "exosomatic knowledge," knowledge outside the mind, the traditional conception has outlived its relevance. On the other hand, Karl Popper's (1934) Falsificationism, with its emphasis on the objective character of knowledge, is not only a sounder, but also a more appropriate theory of knowledge for understanding the nature and growth of civilization. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. “Chosenness, Agapism, and the Search for Moderation between Nationhood and Universalism”.S. Berman Nadav - 2024 - da'at 92:7-36.
    Chosenness, Agapism, and the Search for Moderation between Nationhood and Universalism -/- Abstract The idea of collective Chosenness (nivḥarut) was interpreted by Jewish thinkers in two initial ways: Chosenness as a divine gift which is somehow encrypted in the body of each Jewish individual, and Chosenness as a normatively acquired (rather than inherited) property. Numerous attempts were made to defend these approaches, and to mediate between them. This paper examine the idea of Chosenness from a novel perspective, by interrogating it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  42
    Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication.Mohit Gangwar - 2024 - International Journal of Intelligent Systems and Applications in Engineering 12 (2):29-41.
    This work focuses on enhancing security for transmitted e-documents, such as e-stamp papers, within wireless environments through dynamic authentication using variable circular concealment of multiple invisible signature images. This method is driven by encrypted secret keys and session-based random numbers, alongside a region-specific bit casting strategy and dynamic bit sequencing for multiple signatures to bolster security and robustness. Multi-copy signature marking on non-overlapping document areas, coupled with varied bit encoding strategies for each modified pixel byte coefficient in cover image sub-blocks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Whispers and Shouts. The measurement of the human act.Fernando Flores Morador & Luis de Marcos Ortega (eds.) - 2021 - Alcalá de Henares, Madrid: Departement of Computational Sciences. University of Alcalá; Madrid.
    The 20th Century is the starting point for the most ambitious attempts to extrapolate human life into artificial systems. Norbert Wiener’s Cybernetics, Claude Shannon’s Information Theory, John von Neumann’s Cellular Automata, Universal Constructor to the Turing Test, Artificial Intelligence to Maturana and Varela’s Autopoietic Organization, all shared the goal of understanding in what sense humans resemble a machine. This scientific and technological movement has embraced all disciplines without exceptions, not only mathematics and physics but also biology, sociology, psychology, economics etc. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Role of Information in Consciousness.Harry Haroutioun Haladjian - forthcoming - Psychology of Consciousness: Theory, Research, and Practice.
    This article comprehensively examines how information processing relates to attention and consciousness. We argue that no current theoretical framework investigating consciousness has a satisfactory and holistic account of their informational relationship. Our key theoretical contribution is showing how the dissociation between consciousness and attention must be understood in informational terms in order to make the debate scientifically sound. No current theories clarify the difference between attention and consciousness in terms of information. We conclude with two proposals to advance the debate. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Flying Termite.Laszlo Katona (ed.) - 2014 - Vernon Press.
    ABSTRACT of The Flying Termite by L.L. Katona -/- In this book I would like to show the term “intelligence“ has a universal, non-anthropomorphic meaning. We can perceive intelligence in dogs, dolphins or gorillas without understanding of it, but intelligence can be also seen in many other things from insects and the Solar System to elementary particles or the rules of a triangle. But that doesn’t mean intelligence comes from Intelligent Design, yet alone a Designer, they seems to be the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  32
    History of the Heavens.Mark Julyan (ed.) - 2024 - New York: Barnes and Noble Press.
    This is the first chapter of Mark Julyan's 'History of the Heavens' which, as a whole, focuses on the many different interpretational problems that emerge within the controversial and previously unavailable appendix to Kant's 'Universal Natural History and Theory of the Heavens'. The first chapter makes the contention that we should interpret J.L. Austin's curious and otherwise eccentric capitalization of the font in the word KANT (twice on pp.2-3) of his 'How to do Things with Words' (1962), through pp.13-14 of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  49
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  45
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  37.  55
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Attention and Perception.Ronald A. Rensink - 2015 - In R. A. Scott, S. M. Kosslyn & M. C. Buchmann (eds.), Emerging Trends in the Social and Behavioral Sciences: An Interdisicplinary, Searchable, and Linkable Resource. Wiley. pp. 1-14.
    This article discusses several key issues concerning the study of attention and its relation to visual perception, with an emphasis on behavioral and experiential aspects. It begins with an overview of several classical works carried out in the latter half of the 20th century, such as the development of early filter and spotlight models of attention. This is followed by a survey of subsequent research that extended or modified these results in significant ways. It covers current work on various forms (...)
    Download  
     
    Export citation  
     
    Bookmark