Results for 'Storage Techniques'

976 found
Order:
  1. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  77
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  66
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  74
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  70
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  68
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big data analysis is becoming one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Thermal Performance of MEMS-Based Heat Exchanger with Micro-Encapsulated PCM Slurry.Samira Mehravar - 2014 - Journal of Power and Energy Engineering 2:15-22.
    Latent heat thermal energy storage technique has demonstrate to be a better engineering option mainly due to its benefit of supplying higher energy storage density in a smaller temperature difference between retrieval and storage. For this purpose, a micro electro-mechanical system, MEMS-based heat exchanger with microencapsulated PCM (MEPCM) slurry as cold fluid, has been simulated three dimensionally. This work investigates the influence of using MEPCM-slurry on the temperature of the cold and hot fluids. The MEPCM and water (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  67
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  41
    Технологічні основи вибору обладнання машинобудівних цехів.Юрій Ткачов, Євген Джур & Євгеній Ніколенко - 2006 - Dnipro: Oles Honchar Dnipro National University.
    "Technological Foundations of Equipment Selection in Machine-Building Workshops" is a comprehensive resource designed to explore the key principles and methodologies involved in selecting appropriate equipment for machine-building industries. This book provides an in-depth analysis of organizational and technical aspects crucial for the construction of flexible manufacturing systems (FMS), a critical component in modern industrial operations. The text addresses the importance of automation in production processes, offering insights into the various types of automation systems, their classification, and their impact on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  63
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  59
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Advanced Facade Systems in Tirana, Albania.Klodjan Xhexhi - 2023 - Iosr Journal of Mechanical and Civil Engineering (Iosr-Jmce) 20 (1):25-31.
    This article presents information about facades, their thermal insulating role in buildings in Albania. The façade in construction is one of the necessary factors to ensure a longer life of the buildings and indoor thermal comfort. Façade systems are composed of different materials, which provide a protective effect during the life of the building. The article will focus on the characteristic materials used in Albania for the construction of facades and the main materials used from the year 2000 up to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Ethical pitfalls for natural language processing in psychology.Mark Alfano, Emily Sullivan & Amir Ebrahimi Fard - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    Knowledge is power. Knowledge about human psychology is increasingly being produced using natural language processing (NLP) and related techniques. The power that accompanies and harnesses this knowledge should be subject to ethical controls and oversight. In this chapter, we address the ethical pitfalls that are likely to be encountered in the context of such research. These pitfalls occur at various stages of the NLP pipeline, including data acquisition, enrichment, analysis, storage, and sharing. We also address secondary uses of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Review of: "Reproduction (electrical nano memories) by the method combined nanolithography (۱۲ V), Fast switching speed (۱ microsecond)".Afshin Rashid - 2023 - Qeios 34:15-19.
    Graphene nanomemories have been developed molecularly, providing excellent programmable nanoscale memory performance compared to previous graphene memory devices and a memory window. Large (12V), fast switching speed (1 microsecond), shows strong electrical reliability. Graphene molecular nanomemories show unique electronic properties, and their small dimensions, structural strength, and high performance make them a charge storage medium for Nano memory applications. We use a set of techniques involving a solution of nanoparticles, which creates a very thin layer on the target (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. BE AWARE MGA SUKI: PRACTICES OF FOOD SAFETY AND APPROPRIATE HYGIENE AMONG SIDEWALK VENDORS IN BALAYAN, BATANGAS.Chinee F. Tolentino, Diane G. Alindugan, Paula Bianca D. Castillo, Lyza Mae M. De Sagun, Jzel N. Macalindong, Cherish R. Rivera & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (1):102–132.
    This study emphasizes the importance of enhancing food safety and hygiene practices among sidewalk vendors to safeguard public health in Balayan Public Market. Employing a mixed-methods approach, with both quantitative and qualitative components, a diverse sample of 55 consumers, 5 sidewalk vendors, and 5 market administrators was selected using a combination of purposive and random sampling techniques under non-probability sampling. Microbial investigations were conducted during both the initial sampling and testing phase (A) and subsequent sampling and testing phase (B) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Environmental Impact of Natural Grass-Based Livestock Farming.Minh-Phuong Thi Duong & Minh-Hoang Nguyen - manuscript
    The study conducted by O'Brien and their colleagues aimed to assess the impact of three methods for diversifying environmental risk on multiple cattle farms in Ireland. These three methods, as highlighted in the study, include: 1) The combination of grass and white clover (referred to as GWC), 2) Organic farming (referred to as OFS), and 3) An approach involving both agriculture and forestry (referred to as AGF), with a specific focus on the technique of combining perennial crops, grazing pastures, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  63
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Carbon capture and storage: where should the world store CO₂? It’s a moral dilemma.Kian Mintz-Woo - 2021 - The Conversation.
    [Newspaper opinion] To give carbon storage sites the greatest chance of success, it makes sense to develop them in places where the geology has been thoroughly explored and where there is lots of relevant expertise. This would imply pumping carbon into underground storage sites in northern Europe, the Middle East and the US, where companies have spent centuries looking for and extracting fossil fuels. On the other hand, it might be important to develop storage sites in economies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  71
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Why and Where to Fund Carbon Capture and Storage.Kian Mintz-Woo & Joe Lane - 2021 - Science and Engineering Ethics 27 (6):70.
    This paper puts forward two claims about funding carbon capture and storage. The first claim is that there are moral justifications supporting strategic investment into CO2 storage from global and regional perspectives. One argument draws on the empirical evidence which suggests carbon capture and storage would play a significant role in a portfolio of global solutions to climate change; the other draws on Rawls' notion of legitimate expectations and Moellendorf's Anti-Poverty principle. The second claim is that where (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Legislative technique.Habil Gurbanov - 2022 - Metafizika 5 (4):129-139.
    Legislative technique encompasses a system of methods and means associated with the preparation of draft legal acts in the most perfect form in terms of structure and form. In the legislative technique, not only national, but also the established legal practice of foreign countries for hundreds of years is widely used. The special legal means of legislative technique include the following: 1) legal language; 2) legal structures; 3) the procedure for registering a legislative act, the process of lawmaking; 4) systematization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  81
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  66
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  40
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Techniques et concepts du vivant en biologie synthétique.Alberto Molina-Pérez - 2009 - Ludus Vitalis 17 (31):237-240.
    [ENGLISH] This article discusses the potential of synthetic biology to address fundamental questions in the philosophy of biology regarding the nature of life and biological functions. Synthetic biology aims to reduce living organisms to their simplest forms by identifying the minimal components of a cell and also to create novel life forms through genetic reprogramming, biobrick assembly, or novel proteins. However, the technical success of these endeavors does not guarantee their conceptual success in defining life. There is a lack of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Internet Techniques for an Untimely Anthropology.Meg Stalcup - 2020 - In Julie Laplante, Willow Scobie & Ari Gandsman (eds.), Searching After Method: Live Anthropology. Berghahn Book. pp. 102-107.
    Making “the familiar strange and the strange familiar” is what anthropology has long claimed as its expertise. The Internet and its broader technological problem space pose methodological challenges, however, for a discipline that has traditionally drawn on the authority of “being there” to ground its claims to knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  34. A Technique for Determining Closure in Semantic Tableaux.Steven James Bartlett - 1983 - Methodology and Science: Interdisciplinary Journal for the Empirical Study of the Foundations of Science and Their Methodology 16 (1):1-16.
    The author considers the model-theoretic character of proofs and disproofs by means of attempted counterexample constructions, distinguishes this proof format from formal derivations, then contrasts two approaches to semantic tableaux proposed by Beth and Lambert-van Fraassen. It is noted that Beth's original approach has not as yet been provided with a precisely formulated rule of closure for detecting tableau sequences terminating in contradiction. To remedy this deficiency, a technique is proposed to clarify tableau operations.
    Download  
     
    Export citation  
     
    Bookmark  
  35. La technique cinématographique d'Andreï Tarkovsky dans Solaris.Nicolae Sfetcu - manuscript
    Tarkovsky s’est opposé au montage et a considéré que la base de l’art cinématographique (l’art du film) est le rythme interne des images. Il a considèré le cinéma comme une représentation des courants distinctifs ou des ondes de temps, transmis dans le film par son rythme interne. Le rythme est au cœur du « film poétique ». Un rythme comme un mouvement dans le cadre (« la sculpture dans le temps »), pas comme une séquence d'images dans le temps. Le (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Principals’ supervisory techniques for combating corruption and the attainment of quality school governance in public secondary schools in Aba Education Zone of Abia State, Nigeria.Esther Chijioke Madukwe, Blessing Iheoma Nwannunu & Valentine Joseph Owan - 2019 - International Journal of Educational Benchmark 13 (2):113-123.
    The study investigated principals’ supervisory techniques for combating corruption and the attainment of quality school governance. Two null hypotheses were formulated. The ex-post facto research design was adopted for the study. Census technique was used to draw the entire population of 81 principals from all the public secondary schools in Aba Education Zone of Abia State. Data collection was carried out with the use of a research instrument titled: “Principals’ Supervisory Techniques for Combating Corruption and Attainment of Quality (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Techniques of Bridging the Gulf: Dialectic and Reductionism in McDowell and Fichte.Jens Lemanski - 2020 - Edukacja Filozoficzna 69 (1):7-36.
    “Dialectic” has been a matter of growing interest in contemporary philosophy. The present article analyzes dialectical methods and positions them by reference to two paradigmatic texts of German idealism and analytic philosophy, i.e. J.G. Fichte’s Science of Knowing (1804) and J. McDowell’s Mind and World. Both dialectical approaches will be interpreted with regard to their contribution in the debate on reductionism and anti-reductionism: both Fichte and McDowell claim that philosophical positions and logical terms stand in a dualistic relationship to one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Mexico and mitochondrial replacement techniques: what a mess.César Palacios-González - 2018 - British Medical Bulletin 128.
    Abstract Background The first live birth following the use of a new reproductive technique, maternal spindle transfer (MST), which is a mitochondrial replacement technique (MRT), was accomplished by dividing the execution of the MST procedure between two countries, the USA and Mexico. This was done in order to avoid US legal restrictions on this technique. -/- Sources of data Academic articles, news articles, documents obtained through freedom of information requests, laws, regulations and national reports. -/- Areas of agreement MRTs are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. (1 other version)Technique Rationality in the Contemporary Neo-Capitalist System.Gilberto Davanço Neto - 2022 - Revista Quaestio Iuris 15 (01):863-888.
    The rationality of the human being applied in science-technique in the contemporary capitalist system is distorted; the purpose, which is the good life for human beings, has become the means to sustain and feedback the technicist system of technological capitalism. Thus, the modus operandi of science, aims only to legitimize technology, apart from the ethics applied in this relationship between technology and human beings, and cut off from critical philosophical thinking. With the result presented, the problem lies in the reason (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  89
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Mitochondrial Replacement Techniques and Mexico’s Rule of Law: On the Legality of the First Maternal Spindle Transfer Case.César Palacios-González - 2017 - Journal of Law and the Biosciences 4 (1):50–69.
    News about the first baby born after a mitochondrial replacement technique (MRT; specifically maternal spindle transfer) broke on September 27, 2016 and, in a matter of hours, went global. Of special interest was the fact that the mitochondrial replacement procedure happened in Mexico. One of the scientists behind this world first was quoted as having said that he and his team went to Mexico to carry out the procedure because, in Mexico, there are no rules. In this paper, we explore (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  43. Active Techniques Implemented in an Introductory Signal Processing Course to Help Students Achieve Higher Levels of Learning.Saharnaz Baghdadchi, Rebecca Hardesty, Paul Andreas Hadjipieris & Jace Hargis - 2018 - Papers on Engineering Education Repository.
    Holding students to high standards and assessing, measuring and evaluating their learning with challenging, authentic problems in the midterm and final exams is the goal of the professors who teach core signal processing concepts. However, the heavy reliance of these subjects on mathematics makes it difficult for students to genuinely grasp the concepts and relate to a conceptual framework. Specifically, analyzing the signals and the functionality of systems in Fourier domain; separating the system level analysis from signal level analysis; and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Translation Techniques.Marcia Ricci Pinheiro - 2015 - Communication and Language at Work 3 (4):121-144.
    In this paper, we discuss three translation techniques: literal, cultural, and artistic. Literal translation is a well-known technique, which means that it is quite easy to find sources on the topic. Cultural and artistic translation may be new terms. Whilst cultural translation focuses on matching contexts, artistic translation focuses on matching reactions. Because literal translation matches only words, it is not hard to find situations in which we should not use this technique. Because artistic translation focuses on reactions, judging (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. The ethical challenges of the clinical introduction of mitochondrial replacement techniques.John B. Appleby - 2015 - Medicine, Health Care and Philosophy 18 (4):501-514.
    Mitochondrial DNA (mtDNA) diseases are a group of neuromuscular diseases that often cause suffering and premature death. New mitochondrial replacement techniques (MRTs) may offer women with mtDNA diseases the opportunity to have healthy offspring to whom they are genetically related. MRTs will likely be ready to license for clinical use in the near future and a discussion of the ethics of the clinical introduction ofMRTs is needed. This paper begins by evaluating three concerns about the safety of MRTs for (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  46. University Lecturing as a Technique of Collective Imagination.Lavinia Marin - 2020 - In Naomi Hodgson, Joris Vlieghe & Piotr Zamojski (eds.), Post-critical Perspectives on Higher Education. Springer. pp. 73-82.
    Lecturing is the only educational form inherited from the universities of the middle ages that is still in use today. However, it seems that lecturing is under threat, as recent calls to do away with lecturing in favour of more dynamic settings, such as the flipped classroom or pre-recorded talks, have found many adherents. In line with the post-critical approach of this book, this chapter argues that there is something in the university lecture that needs to be affirmed: at its (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. PARAPHRASING TECHNIQUE TO DEVELOP SKILL FOR ENGLISH WRITING AMONG INDONESIAN COLLEGE STUDENTS OF ENGLISH.Kaharuddin Andi - 2020 - Systematic Reviews in Pharmacy 11 (11):291-297.
    This research aims at examining three important things, i.e. students’ technique in paraphrasing, paraphrasing acceptability and obstacles in paraphrasing. A qualitative approach was used to carry out this study by purposively selecting 26 Indonesian college students of English as respondents. The data were collected by giving a paraphrasing task (consisted of 5 paragraphs) to the students and interviewed them to find out in-depth information on paraphrasing acceptably and obstacles. The research revealed that synonym technique was the most frequent technique sued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Political Technique, the Conflict of Umori, and Foucault’s Reading of Machiavelli in Sécurité, Territoire, Population.Sean Erwin - 2015 - Foucault Studies 19:172-190.
    For those familiar with Machiavelli’s texts, Foucault’s interpretation of Macchiavelli in his 1978 lecture series Sécurité, Territoire, Population1 is surprising. Although Machiavelli figures prominently in five of the thirteen lectures,2 Foucault treats Machiavelli as if he were the author of only one book—The Prince—and his reading treats this complex text as if it covered only one topic: how to guarantee the security of the Prince. Clearly Foucault did not intend his interpretation of Machiavelli as a close exegesis. Other discussions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. What is a subliminal technique? An ethical perspective on AI-driven influence.Juan Pablo Bermúdez, Rune Nyrup, Sebastian Deterding, Celine Mougenot, Laura Moradbakhti, Fangzhou You & Rafael A. Calvo - 2023 - Ieee Ethics-2023 Conference Proceedings.
    Concerns about threats to human autonomy feature prominently in the field of AI ethics. One aspect of this concern relates to the use of AI systems for problematically manipulative influence. In response to this, the European Union’s draft AI Act (AIA) includes a prohibition on AI systems deploying subliminal techniques that alter people’s behavior in ways that are reasonably likely to cause harm (Article 5(1)(a)). Critics have argued that the term ‘subliminal techniques’ is too narrow to capture the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976