Results for 'Security in Data Mining'

975 found
Order:
  1. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  70
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining qualitative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Chen Jake & Lonardi Stefano (eds.), Biological Data Mining. Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Download  
     
    Export citation  
     
    Bookmark  
  13. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola (eds.), Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I argue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Data Mining & Big Data: Strategic Anticipation & Decision-making support, SciencesPo, 24h, 2018.Marc-Olivier Boisset & Jean Langlois-Berthelot - unknown
    In the end of the course the student will be able to: • Understand the functioning of data mining tools and their contributions to managerial professions • Master the use of dynamic search tools on the open web and on the dark web. • Use the proper tools according to the objectives sought • Master the latest trends and innovations in Business Analytics • Analyze the opportunities offered in terms of data mining by artificial intelligence and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia (eds.), ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  55
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. (1 other version)Ontology-assisted database integration to support natural language processing and biomedical data-mining.Jean-Luc Verschelde, Marianna C. Santos, Tom Deray, Barry Smith & Werner Ceusters - 2004 - Journal of Integrative Bioinformatics. Repr. In: Yearbook of Bioinformatics , 39–48 1:1-10.
    Successful biomedical data mining and information extraction require a complete picture of biological phenomena such as genes, biological processes, and diseases; as these exist on different levels of granularity. To realize this goal, several freely available heterogeneous databases as well as proprietary structured datasets have to be integrated into a single global customizable scheme. We will present a tool to integrate different biological data sources by mapping them to a proprietary biomedical ontology that has been developed for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Experiences in Mining Educational Data to Analyze Teacher's Performance: A Case Study with High Educational Teachers.Abdelbaset Almasri - 2017 - International Journal of Hybrid Information Technology 10 (12):1-12.
    Educational Data Mining (EDM) is a new paradigm aiming to mine and extract knowledge necessary to optimize the effectiveness of teaching process. With normal educational system work it’s often unlikely to accomplish fine system optimizing due to large amount of data being collected and tangled throughout the system. EDM resolves this problem by its capability to mine and explore these raw data and as a consequence of extracting knowledge. This paper describes several experiments on real educational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Ethical Issues in Text Mining for Mental Health.Joshua Skorburg & Phoebe Friesen - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    A recent systematic review of Machine Learning (ML) approaches to health data, containing over 100 studies, found that the most investigated problem was mental health (Yin et al., 2019). Relatedly, recent estimates suggest that between 165,000 and 325,000 health and wellness apps are now commercially available, with over 10,000 of those designed specifically for mental health (Carlo et al., 2019). In light of these trends, the present chapter has three aims: (1) provide an informative overview of some of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Identifying Virtues and Values Through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - 2018 - Journal of Value Inquiry 52 (1).
    Because obituaries are succinct and explicitly intended to summarize their subjects’ lives, they may be expected to include only the features that the author finds most salient but also to signal to others in the community the socially-recognized aspects of the deceased’s character. We begin by reviewing studies 1 and 2, in which obituaries were carefully read and labeled. We then report study 3, which further develops these results with a semi-automated, large-scale semantic analysis of several thousand obituaries. Geography, gender, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  27. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. (1 other version)Cunoașterea Științifică, Volumul 1, 2022.Nicolae Sfetcu - 2022 - Cunoașterea Științifică 1.
    Revista Cunoașterea Științifică este o publicație trimestrială din domeniile științei și filosofiei, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE Cunoașterea, de Nicolae Sfetcu Cuvânt introductiv pentru (și despre) „Cunoașterea Științifică”, de Adrian Klein Viitorul științei – Știința științelor, de Nicolae Sfetcu -/- ȘTIINȚE NATURALE Teste gravitaționale, de Nicolae Sfetcu Inside, and Beyond „Nothingness”, de Adrian Klein și Robert Neil Boyd Anomalii ale relativității generale, de Nicolae Sfetcu -/- ȘTIINȚE SOCIALE Fondarea Uniunii Europene și evoluția tratatelor comunității (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. (1 other version)Mapping Human Values: Enhancing Social Marketing through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - forthcoming - In Lynn Kahle & Eda Atay (eds.), Social and Cultural Values in a Global and Digital Age.
    Download  
     
    Export citation  
     
    Bookmark  
  30.  28
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Perceived Influence of Entrepreneurship Education Methods on Economic Security in Cross River State.Stephen Bepeh Undie, Ezekiel Usip Mfon, Lydia Ochuole Ogbudu, Ubong Edet Uko & Joseph Ogbaji Ebiale - 2023 - Prestige Journal of Education 6 (1):158-171.
    This study investigated the perception of how methods of entrepreneurial education predict the level of economic security in the Southern Senatorial District of Cross River State. It was guided by two research questions and two hypotheses, tested at a significant level of 0.05. The research design was a survey. The study had 350 participants. A 40-item "Entrepreneurship Education and Economic Security Questionnaire" (EEESQ) was validated by five experts from the University of Calabar and used in data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Institutional variables and the supervision of security in public secondary schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  33. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  52
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  59
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Mineness without Minimal Selves.M. V. P. Slors & F. Jongepier - 2014 - Journal of Consciousness Studies 21 (7-8):193-219.
    In this paper we focus on what is referred to as the ‘mineness’ of experience, that is, the intimate familiarity we have with our own thoughts, perceptions, and emotions. Most accounts characterize mineness in terms of an experiential dimension, the first-person givenness of experience, that is subsumed under the notion of minimal self-consciousness or a ‘minimal self’. We argue that this account faces problems and develop an alternative account of mineness in terms of the coherence of experiences with what we (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  42. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  54
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. How Archaeological Evidence Bites Back: Strategies for Putting Old Data to Work in New Ways.Alison Wylie - 2017 - Science, Technology, and Human Values 42 (2):203-225.
    Archaeological data are shadowy in a number of senses. Not only are they notoriously fragmentary but the conceptual and technical scaffolding on which archaeologists rely to constitute these data as evidence can be as constraining as it is enabling. A recurrent theme in internal archaeological debate is that reliance on sedimented layers of interpretative scaffolding carries the risk that “preunderstandings” configure what archaeologists recognize and record as primary data, and how they interpret it as evidence. The selective (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  47. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. “Giving something back”: a systematic review and ethical enquiry into public views on the use of patient data for research in the United Kingdom and the Republic of Ireland.Jessica Stockdale, Jackie Cassell & Elizabeth Ford - 2019 - Wellcome Open Research 3 (6).
    Background: Use of patients’ medical data for secondary purposes such as health research, audit, and service planning is well established in the UK. However, the governance environment, as well as public understanding about this work, have lagged behind. We aimed to systematically review the literature on UK and Irish public views of patient data used in research, critically analysing such views though an established biomedical ethics framework, to draw out potential strategies for future good practice guidance and inform (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  58
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  34
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 975