Results for 'Security Engineering'

979 found
Order:
  1. Conceptual Engineering and the Politics of Implementation.Matthieu Queloz & Friedemann Bieber - 2022 - Pacific Philosophical Quarterly 103 (3):670-691.
    Conceptual engineering is thought to face an ‘implementation challenge’: the challenge of securing uptake of engineered concepts. But is the fact that implementation is challenging really a defect to be overcome? What kind of picture of political life would be implied by making engineering easy to implement? We contend that the ambition to obviate the implementation challenge goes against the very idea of liberal democratic politics. On the picture we draw, the implementation challenge can be overcome by institutionalizing (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  2. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. (2 other versions)Broad-Spectrum Conceptual Engineering.Manuel Gustavo Https://Orcidorg Isaac - 2021 - Ratio: An International Journal for Analytic Philosophy 34 (4):286-302.
    Conceptual engineering is the method for assessing and improving our representational devices. On its ‘broad-spectrum’ version, it is expected to be appropriately applicable to any of our representation-involving cognitive activities, with major consequences for our whole cognitive life. This paper is about the theoretical foundations of conceptual engineering thus characterised. With a view to ensuring the actionability of conceptual engineering as a broad-spectrum method, it addresses the issue of how best to construe the subject matter of conceptual (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  5. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  6. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Engineering Topology of Construction Ecology for Dynamic Integration of Sustainability Outcomes to Functions in Urban Environments: Spatial Modeling.Moustafa Osman Mohammed - 2022 - International Scholarly and Scientific Research and Innovation 16 (11):312-323.
    Integration sustainability outcomes give attention to construction ecology in the design review of urban environments to comply with Earth’s System that is composed of integral parts of the (i.e., physical, chemical and biological components). Naturally, exchange patterns of industrial ecology have consistent and periodic cycles to preserve energy flows and materials in Earth’s System. When engineering topology is affecting internal and external processes in system networks, it postulated the valence of the first-level spatial outcome (i.e., project compatibility success). These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  47
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The New Philosopher-Kings: Conceptual Engineering and Social Authority.Nick Smyth - manuscript
    Many philosophers have recently become interested in conceptual engineering, or the activity of producing better conceptual schemes in human populations. But few, if any, are asking the question: what would it mean for actual human agents to possess the social authority to modify a conceptual scheme in this way? This paper argues for a deontological approach to conceptual engineering, wherein we have to secure social authority qua engineers before attempting to modify social concepts. I show that the dominant, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  67
    Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for extremely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  71
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Handles for Pentesting Modern Secure Coding: bypassing mobile security.Mourad M. H. Henchiri - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):8-15.
    Abstract— Malware behavior was and still is a key solution, for top security appliances, to monitor algorithmic approaches when performing regular security tasks; scan, detection, cleaning and removal. And even for early actions; when building a security framework and securing all possible access points to all data sources. The first suspect in such scenario is the inner residents; appliances and system functions. Numerous are available at each operating system, and thus, the security is raised and set (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  34
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their qualities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. AI and Ethics in Surveillance: Balancing Security and Privacy in a Digital World.Msbah J. Mosa, Alaa M. Barhoom, Mohammed I. Alhabbash, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):8-15.
    Abstract: In an era of rapid technological advancements, artificial intelligence (AI) has transformed surveillance systems, enhancing security capabilities across the globe. However, the deployment of AI-driven surveillance raises significant ethical concerns, particularly in balancing the need for security with the protection of individual privacy. This paper explores the ethical challenges posed by AI surveillance, focusing on issues such as data privacy, consent, algorithmic bias, and the potential for mass surveillance. Through a critical analysis of the tension between (...) and privacy, this paper examines the implications of AI technologies on civil liberties and human rights. It also highlights the importance of establishing clear regulatory frameworks and ethical guidelines to ensure that AI surveillance systems operate within boundaries that respect individual freedoms. In navigating this delicate balance, we propose solutions that prioritize transparency, accountability, and the protection of privacy in the digital age. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Granting Automata Human Rights: Challenge to a Basis of Full-Rights Privilege.Lantz Fleming Miller - 2015 - Human Rights Review 16 (4):369-391.
    As engineers propose constructing humanlike automata, the question arises as to whether such machines merit human rights. The issue warrants serious and rigorous examination, although it has not yet cohered into a conversation. To put it into a sure direction, this paper proposes phrasing it in terms of whether humans are morally obligated to extend to maximally humanlike automata full human rights, or those set forth in common international rights documents. This paper’s approach is to consider the ontology of humans (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  21. The Dworkin–Williams Debate: Liberty, Conceptual Integrity, and Tragic Conflict in Politics.Matthieu Queloz - 2024 - Philosophy and Phenomenological Research 109 (1):3-29.
    Bernard Williams articulated his later political philosophy notably in response to Ronald Dworkin, who, striving for coherence or integrity among our political concepts, sought to immunize the concepts of liberty and equality against conflict. Williams, doubtful that we either could or should eliminate the conflict, resisted the pursuit of conceptual integrity. Here, I reconstruct this Dworkin–Williams debate with an eye to drawing out ideas of ongoing philosophical and political importance. The debate not only exemplifies Williams's political realism and its connection (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  22. “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility).Jo Ann Oravec (ed.) - 2018 - IGI Global.
    Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of these (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Good Robot, Bad Robot: Dark and Creepy Sides of Robotics, Automated Vehicles, and Ai.Jo Ann Oravec - 2022 - New York, NY, USA: Palgrave-Macmillan.
    This book explores how robotics and artificial intelligence can enhance human lives but also have unsettling “dark sides.” It examines expanding forms of negativity and anxiety about robots, AI, and autonomous vehicles as our human environments are reengineered for intelligent military and security systems and for optimal workplace and domestic operations. It focuses on the impacts of initiatives to make robot interactions more humanlike and less creepy. It analyzes the emerging resistances against these entities in the wake of omnipresent (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Segregated specialists and nuclear culture.Sean F. Johnston - manuscript
    Communities of nuclear workers have evolved in distinctive contexts. During the Manhattan Project the UK, USA and Canada collectively developed the first reactors, isotope separation plants and atomic bombs and, in the process, nurtured distinct cadres of specialist workers. Their later workplaces were often inherited from wartime facilities, or built anew at isolated locations. For a decade, nuclear specialists were segregated and cossetted to gestate practical expertise. At Oak Ridge Tennessee, for example, the informal ‘Clinch College of Nuclear Knowledge’ aimed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The perception movement economy of Ukraine to business/Igor Britchenko, Volodymyr Saienko//Списание «Икономически изследвания (Economic Studies)». – Институт за икономически изследвания при БАН, София (България). – № 4. – 2017. – P. 163 - 181. ISSN 02053292.Igor Britchenko & Volodymyr Saienko - 2017 - Списание «Икономически Изследвания (Economic Studies)» 4 (4):163 - 181.
    The article provides the analysis of the entrance into the innovative activity and organized regulation of interaction which is based on the scientific and technological changes, concentration of production and the feasibility study of administrative decisions, which are dominated by a conglomerate of technical, technological and engineering management decisions. The research formulates the provisions for the productive use of business as the form of economic relations which is based on the entrepreneur function. These provisions are formulated basing on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  17
    Shielding the Cloud: _A Survey of Different DDoS Detection Techniques (13th edition).Kruthika B. Anil Kumar, , Lavanya G. S. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (10):17762-17766. Translated by Lavanya G S Anil Kumar.
    Security is a major concern on the internet, and Distributed Denial of Service (DDoS) attacks are a significant threat. These attacks overwhelm network resources and use up bandwidth, making it difficult for legitimate users to access services. One challenge in dealing with DDoS attacks is telling the difference between a sudden increase in traffic from real users, known as a "flash crowd," and actual attack traffic. This paper looks at different existing solutions for detecting DDoS attacks and explains how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  81
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Social norms and farm animal protection.Nicolas Delon - 2018 - Palgrave Communications 4:1-6.
    Social change is slow and difficult. Social change for animals is formidably slow and difficult. Advocates and scholars alike have long tried to change attitudes and convince the public that eating animals is wrong. The topic of norms and social change for animals has been neglected, which explains in part the relative failure of the animal protection movement to secure robust support reflected in social and legal norms. Moreover, animal ethics has suffered from a disproportionate focus on individual attitudes and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Even good bots fight: the case of Wikipedia.Milena Tsvetkova, Ruth García-Gavilanes, Luciano Floridi & Taha Yasseri - 2017 - PLoS ONE 12 (2).
    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  45
    Anonymization and Revocation of CP-ABE Based Ring Networks.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (5):1-15.
    given the increasing threats to data confidentiality and integrity. The project titled "Anonymization and Revocation of User Identity in CPABE-Based Ring Networks" addresses these concerns by integrating CiphertextPolicy Attribute-Based Encryption (CPABE) into a ring network environment. This novel approach effectively hides user identities during communications, mitigating risks of unauthorized data access and preventing potential misuse of sensitive information. A key feature of this project is the implementation of a secure revocation mechanism that ensures once a user's permissions are revoked, they (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  17
    IT System Log Analyzer.Rani Beulah - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.
    Ant Design (ANTD) is employed to enhance the user interface with pre-built, responsive components that streamline the design process and provide a clean, intuitive look to the application. This not only improves usability but also ensures a consistent user experience. The combination of these tools results in a robust system that enhances log management capabilities, allowing IT teams to proactively detect and address potential system issues. Future enhancements could include integrating machine learning models for predictive analytics, which would enable the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Who owns the taste of coffee – examining implications of biobased means of production in food.Zoë Robaey & Cristian Timmermann - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 85-90.
    Synthetic foods advocates offer the promise of efficient, reliable, and sustainable food production. Engineered organisms become factories to produce food. Proponents claim that through this technique important barriers can be eliminated which would facilitate the production of traditional foods outside their climatic range. This technique would allow reducing food miles, secure future supply, and maintain quality and taste expectations. In this paper, we examine coffee production via biobased means. A startup called Atomo Coffee aims to produce synthetic coffee with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Sniper and the Psychopath: A Parable in Defense of the Weapons Industry.Duncan MacIntosh - 2023 - In Daniel Schoeni, Tobias Vestner & Kevin Govern (eds.), Ethical Dilemmas in the Global Defense Industry. Oxford University Press. pp. 47-78.
    This chapter discusses the fundamental question of the defense industry’s role and legitimacy for societies. It begins with a parable of a psychopath doing something self-serving that has beneficial moral consequences. Analogously, it is argued, the defense industry profiting by selling weapons that can kill people makes it useful in solving moral problems not solvable by people with ordinary moral scruples. Next, the chapter argues that while the defense industry is a business, it is also implicated in the security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  14
    Computerized Cognitive Retraining Program.R. Kamalakar - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-13.
    . The Computerized Cognitive Retraining Program is a web-based application designed to support home-based cognitive training for children with cognitive disabilities. Cognitive disabilities often present challenges in areas such as memory, attention, and problemsolving, which can impact a child's learning and daily functioning. This project aims to provide an engaging, accessible platform for children to practice and improve these skills from the comfort of their home, under the guidance of healthcare professionals. The application enables children to engage with a variety (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Shifting perspectives: holography and the emergence of technical communities.Sean F. Johnston - 2005 - Technology and Culture 46 (1):77-103.
    Holography, the technology of three-dimensional imaging, has repeatedly been reconceptualised by new communities. Conceived in 1947 as a means of improving electron microscopy, holography was revitalized in the early 1960s by engineer-scientists at classified laboratories. The invention promoted the transformation of a would-be discipline (optical engineering) and spawned limited artist-scientist collaborations. However, a separate artisanal community promoted a distinct countercultural form of holography via a revolutionary technology: the sandbox optical table. Their tools, sponsorship, products, literature and engagement with wider (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Life-centered ethics, and the human future in space.Michael N. Mautner - 2008 - Bioethics 23 (8):433-440.
    In the future, human destiny may depend on our ethics. In particular, biotechnology and expansion in space can transform life, raising profound questions. Guidance may be found in Life-centered ethics, as biotic ethics that value the basic patterns of organic gene/protein life, and as panbiotic ethics that always seek to expand life. These life-centered principles can be based on scientific insights into the unique place of life in nature, and the biological unity of all life. Belonging to life then implies (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  39.  22
    Why It’s Difficult to Increase Job Creation to Balance Exponential Population Growth.Angelito Malicse - manuscript
    Why It’s Difficult to Increase Job Creation to Balance Exponential Population Growth -/- One of the biggest challenges in economic development is ensuring that job creation keeps pace with the rapid growth of the population. If a country fails to provide enough employment opportunities, it leads to rising unemployment, poverty, and social instability. The problem is even more complex because economic growth is not always proportional to population growth. Several key factors—such as economic productivity, income inequality, technological advancements, education, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. "Don't Be Evil" and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility).Jo Ann Oravec - 2018 - In “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility). IGI Global. pp. 200-237.
    Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/ Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Geoengineering: A war on climate change?Andrew Lockley - 2016 - Journal of Evolution and Technology 26 (1):26-49.
    Geoengineering; specifically Solar Radiation Management ; has been proposed to effect rapid influence over the Earth’s climate system in order to counteract Anthropogenic Global Warming. This poses near-term to long-term governance challenges; some of which are within the planning horizon of current political administrations. Previous discussions of governance of SRM have focused primarily on two scenarios: an isolated “Greenfinger” individual; or state; acting independently ; versus more consensual; internationalist approaches. I argue that these models represent a very limited sub-set of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Making Better Informed, More Confident COVID-19 Decisions: Vaccine Hesitancy, Its Barriers and Impact Studies: Taking Bayelsa State as an Example.Morufu Olalekan Raimi, Emeka Chisom Lucky, Ebikapaye Okoyen, Angalabiri Clement, Christopher Ogbointuwei & Atoyebi Babatunde - 2021 - International Journal of Vaccines and Immunization 5 (1):1-13.
    Background: Health care practitioners are recognized to have a large influence in shaping uptake of vaccine in new borns, children, adolescents, as well as adults. Parents remain more secure in their decisions when health care practitioners communicate successfully with them about vaccine dangers and benefits, the value as well as necessity for vaccinations, as well as vaccine safety. Thus, immunization remain the foundation of the primary health care system, an indisputable human right as well as a global health and development (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Looking Backward to Move Forward: Legitimation and Authoritarian Origins In East Asia.Junhyoung Lee - 2022 - Dissertation, University College Dublin. School of Politics and International Relations
    Having a ‘title to govern’ is critical for regime survival. Authoritarian rulers have also attempted to legitimise themselves as justified rulers. Numerous case studies have examined rulers’ collective efforts to explain their right to govern (legitimacy claims, or legitimation). This thesis tries to examine how the ruler’s seizure of power shapes legitimation capacity in order to gain a thorough grasp of the relationship between legitimation and regime resilience. Using comparative historical case studies of Vietnam, Mongolia and North Korea, this project (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or data engineer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Preliminaries of a Space Situational Awareness Ontology.Robert J. Rovetto & T. S. Kelso - 2016 Feb - In Renato Zanetti, Ryan P. Russell, Martin T. Oximek & Angela L. Bowes (eds.), Proceedings of AAS/AIAA Spaceflight Mechanics Meeting, in Advances in the Astronautical Sciences. Univelt Inc.. pp. 4177-4192.
    Space situational awareness (SSA) is vital for international safety and security, and for the future of space travel. The sharing of SSA data and information should improve the state of global SSA for planetary defense and spaceflight safety. I take steps toward a Space Situational Awareness (SSA) Ontology, and outline some central objectives, requirements and desiderata in the ontology development process for this domain. The purpose of this ontological system is to explore the potential for the ontology research topic (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  63
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  45
    Efficient Enumeration of URLs of Active Hidden Servers over Anonymous Channel.S. Cherishma Sree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-14.
    This project presents an innovative approach to the efficient enumeration of hidden service URLs (.onion) on the TOR network using a custom-built graphical user interface (GUI) application. The tool leverages web scraping techniques, targeting the Ahmia search engine, to retrieve and analyze active hidden server URLs. Through the integration of Python’s Tkinter library for GUI development and the use of requests and regular expressions for content mining, the application simplifies the process of discovering and visualizing .onion URLs. The tool allows (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  41
    Robust Human Target Detection and Acquisition.N. Sushanth - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-13.
    en the increasing importance of human target detection in various security applications, many existing systems face challenges related to cost, accuracy, and adaptability. This work presents the development of a machine learning-based system called Human Target Detection and Acquisition, designed to assist security personnel in the detection and tracking of human targets through an adaptive and cost-effective approach. In this, standard CCTV cameras provide visual data, which intelligent algorithms process to identify and track human targets, even in challenging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  64
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 979