Results for 'decentralized-distributed networks'

974 found
Order:
  1. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Sharing (mis) information on social networking sites. An exploration of the norms for distributing content authored by others.Lavinia Marin - 2021 - Ethics and Information Technology 23 (3):363-372.
    This article explores the norms that govern regular users’ acts of sharing content on social networking sites. Many debates on how to counteract misinformation on Social Networking Sites focus on the epistemic norms of testimony, implicitly assuming that the users’ acts of sharing should fall under the same norms as those for posting original content. I challenge this assumption by proposing a non-epistemic interpretation of (mis) information sharing on social networking sites which I construe as infrastructures for forms of life (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  3. Experiments in Distributive Justice and Their Limits.Michael Bennett - 2016 - Critical Review: A Journal of Politics and Society 28 (3-4):461-483.
    Mark Pennington argues political systems should be decentralized in order to facilitate experimental learning about distributive justice. Pointing out the problems with Pennington's Hayekian formulation, I reframe his argument as an extension of the Millian idea of 'experiments in living.' However, the experimental case for decentralization is limited in several ways. Even if decentralization improves our knowledge about justice, it impedes the actual implementation of all conceptions of justice other than libertarianism. I conclude by arguing for the compatibility of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Unfair distribution of resources in Africa: What should be done about the ethnicity factor?Gail M. Presbey - 2003 - Human Studies 26 (1):21-40.
    The article examines the role of ethnic favoritism in maldistribution of national resources in Kenya and discusses two broad proposals for attacking such corruption. Evidence drawn from research in Kenya disproves the view of Chabal and Daloz, who argue that Africans prefer to distribute goods according to ethnic ties, and shows that frustration with the lack of alternatives to such a system, rather than enthusiasm for it, drives cooperation with corrupt maldistribution. One solution to the problem is to decentralize government (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  5. Learning Networks and Connective Knowledge.Stephen Downes - 2010 - In Harrison Hao Yang & Steve Chi-Yin Yuen (eds.), Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking. IGI Global.
    The purpose of this chapter is to outline some of the thinking behind new e-learning technology, including e-portfolios and personal learning environments. Part of this thinking is centered around the theory of connectivism, which asserts that knowledge - and therefore the learning of knowledge - is distributive, that is, not located in any given place (and therefore not 'transferred' or 'transacted' per se) but rather consists of the network of connections formed from experience and interactions with a knowing community. And (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. (1 other version)Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions.Luciano Floridi - 2016 - Philosophical Transactions of the Royal Society A 374:20160112.
    The concept of distributed moral responsibility (DMR) has a long history. When it is understood as being entirely reducible to the sum of (some) human, individual and already morally loaded actions, then the allocation of DMR, and hence of praise and reward or blame and punishment, may be pragmatically difficult, but not conceptually problematic. However, in distributed environments, it is increasingly possible that a network of agents, some human, some artificial (e.g. a program) and some hybrid (e.g. a (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  7. Distributed Cognition, Toward a New Foundation for Human-Computer Interaction Research.David Kirsh, Jim Hollan & Edwin Hutchins - 2000 - ACM Transactions on Computer-Human Interaction 7 (2):174-196.
    We are quickly passing through the historical moment when people work in front of a single computer, dominated by a small CRT and focused on tasks involving only local information. Networked computers are becoming ubiquitous and are playing increasingly significant roles in our lives and in the basic infrastructure of science, business, and social interaction. For human-computer interaction o advance in the new millennium we need to better understand the emerging dynamic of interaction in which the focus task is no (...)
    Download  
     
    Export citation  
     
    Bookmark   78 citations  
  8.  34
    Distributed Denial of Service Protection.T. Shyam Prasad - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (6):1-14.
    As Distributed Denial of Service (DDoS) attacks evolve, accurately detecting these threats becomes essential to ensuring network stability. Traditional methods often face challenges in recognizing adaptive DDoS patterns and balancing detection accuracy with false positives. This paper presents a machine learning-based framework leveraging Gaussian Naive Bayes, K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and an Ensemble Random Forest classifier. Through an in-depth performance analysis using accuracy and AUC-ROC metrics, the hybrid model aims to provide a robust, scalable solution to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  88
    Governing the Agent-to-Agent Economy of Trust via Progressive Decentralization.Tomer Jordi Chaffer - manuscript
    Current approaches to AI governance often fall short in anticipating a future where AI agents manage critical tasks, such as financial operations, administrative functions, and beyond. As AI agents may eventually delegate tasks among themselves to optimize efficiency, understanding the foundational principles of human value exchange could offer insights into how AI-driven economies might operate. Just as trust and value exchange are central to human interactions in open marketplaces, they may also be critical for enabling secure and efficient interactions among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even if you do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  82
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  76
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Energy Efficiency Prediction using Artificial Neural Network.Ahmed J. Khalil, Alaa M. Barhoom, Bassem S. Abu-Nasser, Musleh M. Musleh & Samy S. Abu-Naser - 2019 - International Journal of Academic Pedagogical Research (IJAPR) 3 (9):1-7.
    Buildings energy consumption is growing gradually and put away around 40% of total energy use. Predicting heating and cooling loads of a building in the initial phase of the design to find out optimal solutions amongst different designs is very important, as ell as in the operating phase after the building has been finished for efficient energy. In this study, an artificial neural network model was designed and developed for predicting heating and cooling loads of a building based on a (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  14. Getting It Out on the Net: Decentralized E-learning through On-line Pre-publication.Shane J. Ralston - 2015 - In Petar Jandrić & Damir Boras (eds.), Critical Learning in Digital Networks. Springer. pp. 57-74.
    This chapter explores the personal and professional obstacles faced by Humanities and Social Science scholars contemplating pre-publication of their scholarly work in an on-line network. Borrowing a theoretical framework from the radical educational theorist Ivan Illich, it also develops the idea that pre-publication networks offer higher education a bottom-up, decentralized alternative to business-modeled e-learning. If learners would only embrace this more anarchical medium, appreciating writing for pre-publication as a process of open-ended discovery rather than product delivery, then the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Reality of Using Social Networks in Technical Colleges in Palestine.Samy S. Abu-Naser, Mazen J. Al Shobaki, Youssef M. Abu Amuna & Suliman A. El Talla - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (1):142-158.
    The study aimed to identify the reality of the use of social networks in the technical colleges in Palestine, where the variables of social networks were included. The analytical descriptive method was used in the study. A questionnaire consisting of (12) items was randomly distributed to college workers Technology in the Gaza Strip. The sample of the study consisted of (205) employees of these colleges. The response rate was 74.5%. The results showed a high degree of approval (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Scaling‐Up Alternative Food Networks.Mark Navin - 2015 - Journal of Social Philosophy 46 (4):434-448.
    Alternative Food Networks (AFNs), which include local food and Fair Trade, work to mitigate some of the many shortcomings of mainstream food systems. If AFNs have the potential to make the world’s food systems more just and sustainable (and otherwise virtuous) then we may have good reasons to scale them up. Unfortunately, it may not be possible to increase the market share of AFNs while preserving their current forms. Among other reasons, this is because there are limits to both (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Cultural evolution in Vietnam’s early 20th century: a Bayesian networks analysis of Hanoi Franco-Chinese house designs.Quan-Hoang Vuong, Quang-Khiem Bui, Viet-Phuong La, Thu-Trang Vuong, Manh-Toan Ho, Hong-Kong T. Nguyen, Hong-Ngoc Nguyen, Kien-Cuong P. Nghiem & Manh-Tung Ho - 2019 - Social Sciences and Humanities Open 1 (1):100001.
    The study of cultural evolution has taken on an increasingly interdisciplinary and diverse approach in explicating phenomena of cultural transmission and adoptions. Inspired by this computational movement, this study uses Bayesian networks analysis, combining both the frequentist and the Hamiltonian Markov chain Monte Carlo (MCMC) approach, to investigate the highly representative elements in the cultural evolution of a Vietnamese city’s architecture in the early 20th century. With a focus on the façade design of 68 old houses in Hanoi’s Old (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  18. What You Believe Travels Differently: Information and Infection Dynamics Across Sub-Networks.Patrick Grim, Christopher Reade, Daniel J. Singer, Stephen Fisher & Stephen Majewicz - 2010 - Connections 30:50-63.
    In order to understand the transmission of a disease across a population we will have to understand not only the dynamics of contact infection but the transfer of health-care beliefs and resulting health-care behaviors across that population. This paper is a first step in that direction, focusing on the contrasting role of linkage or isolation between sub-networks in (a) contact infection and (b) belief transfer. Using both analytical tools and agent-based simulations we show that it is the structure of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Standards and the distribution of cognitive labour: A model of the dynamics of scientific activity.Langhe Rogieder & Greiff Matthias - 2010 - Logic Journal of the IGPL 18 (2):278-294.
    We present a model of the distribution of labour in science. Such models tend to rely on the mechanism of the invisible hand . Our analysis starts from the necessity of standards in distributed processes and the possibility of multiple standards in science. Invisible hand models turn out to have only limited scope because they are restricted to describing the atypical single-standard case. Our model is a generalisation of these models to J standards; single-standard models such as Kitcher are (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  20. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows its (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  21. Developing a Trusted Human-AI Network for Humanitarian Benefit.Susannah Kate Devitt, Jason Scholz, Timo Schless & Larry Lewis - forthcoming - Journal of Digital War:TBD.
    Humans and artificial intelligences (AI) will increasingly participate digitally and physically in conflicts yet there is a lack of trusted communications across agents and platforms. For example, humans in disasters and conflict already use messaging and social media to share information, however, international humanitarian relief organisations treat this information as unverifiable and untrustworthy. AI may reduce the ‘fog-of-war’ and improve outcomes, however current AI implementations are often brittle, have a narrow scope of application and wide ethical risks. Meanwhile, human error (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Michael A. Arbib, The metaphorical brain 2: Neural networks and beyond.John A. Barnden - 1998 - Artificial Intelligence 101 (1-2):301-309.
    The book is thought-provoking and informative, wide in scope while also being technically detailed, and still relevant to modem AI [at least as of 1998, the time of writing this review, but probably also at the time of posting this entry here, 2023] even though it was published in 1989. This relevance lies mainly in the book’s advocacy of distributed computation at multiple levels of description, its combining of neural networks and other techniques, its emphasis on the interplay (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  29
    Trust based authentication technique for cluster based _vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10. Translated by Sugumar R..
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  20
    Trust based authentication technique for cluster based vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10.
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Az elektronikus prevenció lehetőségei az új (szintetikus) drogok használatának megelőzésében: a Rekreációs Drogok Európai Hálózatának (Recreational Drugs European Network ….Zsolt Demetrovics, Barbara Mervo, Ornella Corazza, Zoe Davey, Paolo Deluca, Colin Drummond, A. Enea, Jacek Moskalewicz, G. Di Melchiorre, L. Di Furia, Magí Farré, Liv Flesland, Luciano Floridi, Fruzsina Iszáj, N. Scherbaum, Holger Siemann, Arvid Skutle, Marta Torrens, M. Pasinetti, Cinzia Pezzolesi, Agnieszka Pisarska, Harry Shapiro, Elias Sferrazza, Peer Van der Kreeft & F. Schifano - 2010 - Addictologia Hungarica 1:289–297.
    Recreational Drugs European Network (ReDNet) project aims to use the Psychonaut Web Mapping Project database (Psychonaut Web Mapping Group, 2009) containing novel psychoactive compounds usually not mentioned in the scientific literature and thus unknown to clinicians as a unique source of information. The database will be used to develop an integrated ICT prevention approach targeted at vulnerable individuals and focused on novel synthetic and herbal compounds and combinations. Particular care will be taken in keeping the health professionals working directly with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  13
    Developing a Cognitive Twin with a Distributed Cognitive System and Evolutionary Strategies.Prasad Gharge Pawankumar Shedage, Tejas Satpute, - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (1):131-133.
    Cognitive twins, digital replicas of cognitive processes, have emerged as a transformative approach in artificial intelligence and human-machine collaboration. This paper presents a framework for developing a cognitive twin by integrating a Distributed Cognitive System (DCS) with Evolutionary Strategies (ES). The DCS enables decentralized knowledge processing, while ES optimizes learning and adaptation over time. Our approach is evaluated on real-world datasets, demonstrating its efficiency in cognitive modeling and decision-making. Results highlight improvements in adaptability, scalability, and accuracy compared to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  16
    A hybrid modified artificial bee colony (ABC)-based artificial neural network model for power management controller and hybrid energy system for energy source integration.Rajendran Sugumar - 2023 - Engineering Proceedings 59 (35):1-12.
    Small MGS (microgrid systems) are capable of decreasing energy losses. Long-distance power transmission lines are constructed by integrating distributed power sources with energy storage subsystems, which is the current trend in the development of RES (renewable energy sources). Although energies produced by RES do not cause pollution, they are stochastic and hence challenging to manage. This disadvantage makes high penetration of RES risky for the stability, dependability, and power quality of main electrical grids. The energies obtained from RES must (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  78
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of Things (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  33
    A Hybrid Modified Artificial _Bee Colony (ABC)-Based Artificial Neural Network Model for Power Management Controller and Hybrid Energy System for Energy Source Integration.R. Sugumar - 2023 - International Conference on Recent Advances on Science and Engineering 59 (35):2-12. Translated by Rajendran Sugumar.
    Small MGS (microgrid systems) are capable of decreasing energy losses. Long-distance power transmission lines are constructed by integrating distributed power sources with energy storage subsystems, which is the current trend in the development of RES (renewable energy sources). Although energies produced by RES do not cause pollution, they are stochastic and hence challenging to manage. This disadvantage makes high penetration of RES risky for the stability, dependability, and power quality of main electrical grids. The energies obtained from RES must (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Uncovering the antecedents of trust in social commerce: an application of the non-linear artificial neural network approach.Hussam Al Halbusi - 2022 - Competitiveness Review 4.
    Purpose – The internet creates ample opportunities to start a mobile social commerce business. The literature confirms the issue of customer trust for social commerce businesses is a challenge that must be addressed. Hence, this study aims to examine the antecedents of trust in mobile social commerce by applying linear and non-linear relationships based on partial least squares structural equation modeling and an artificial neural network model. -/- Design/methodology/approach – This study applied a non-linear artificial neural network approach to provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The system of evaluation efficiency of the strategy of sustainable development of the enterprise in the decentralization condition.Igor Britchenko, Svitlana Filyppova, Liubov Niekrasova, Olena Chukurna & Radostin Vazov - 2022 - Списание «Икономически Изследвания (Economic Studies)» 1 (1):118 - 138.
    The article proposes a scientific and methodological approach to strategising the development of a manufacturing enterprise in a decentralised environment based on the principle of feedback. This approach involves taking into account the direct and feedback indicators of the enterprise, aimed at increasing its competitiveness and achieving sustainable development goals. The authors propose to assess the level of development of the production enterprise in decentralisation, taking into account the multiplier effect of interaction with the united territorial community on the basis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  21
    A hybrid modified artificial bee colony (ABC)-based artificial _neural network model for power management controller and hybrid energy system for energy source integration.Rajendran Sugumar - 2023 - Engineering Proceedings 59 (35):1-12.
    Small MGS (microgrid systems) are capable of decreasing energy losses. Long-distance power transmission lines are constructed by integrating distributed power sources with energy storage subsystems, which is the current trend in the development of RES (renewable energy sources). Although energies produced by RES do not cause pollution, they are stochastic and hence challenging to manage. This disadvantage makes high penetration of RES risky for the stability, dependability, and power quality of main electrical grids. The energies obtained from RES must (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  37
    LBAODV: a new load balancing multipath routing algorithm for mobile ad hoc networks.Nastooh Taheri Javan - 2008 - 2008 6Th National Conference on Telecommunication Technologies 1 (1):344-349.
    An ad hoc network is comprised of mobile hosts without any wired infrastructure support. Multipath routing allows the establishment of multiple paths between a source and a destination. It distributes traffic among multiple paths instead of routing all the traffics along a single path. In this paper, we propose a new multipath routing protocol that uses all discovered paths simultaneously for transmitting data, by using this approach data packets are balanced over discovered paths and energy consumption is distributed across (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  26
    arnessing Neural Networks for Precise Eagle-Fish Recognition in Natural Habitats.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-12.
    This project, titled Bird Species Identification Using Deep Learning, aims to develop a robust system that can identify bird species from images with high precision. The core of this project involves training a CNN model on a diverse dataset of bird images. This dataset includes species from various geographical locations and environments, capturing a wide range of appearances, postures, and behaviors. By preprocessing and augmenting the dataset, the model is designed to handle challenges such as variations in lighting, background noise, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Cooperation in Value-Creating Networks: Relational Perspectives on Governing Social and Economic Value Creation in the 21st Century.Josef Wieland (ed.) - 2024 - Springer.
    In this chapter, I systematically distinguish a variety of ways to rela- tionalize economics and focus on a certain approach to relationalizing normative economics in the light of communal values salient in the African philosophical tradi- tion. I start by distinguishing four major ways to relationalize empirical economics, viz., in terms of its ontologies, methods, explanations, and predictions and also three major ways to relationalize normative economics, with regard to means taken towards ends, decision-procedures used to specify ends, and ends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  31
    Golden Eagle Detection: Integrating Neural Networks and Particle Swarm Optimization.P. Meenalochini - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-12.
    rd species identification plays a vital role in biodiversity conservation and ecological studies, offering insights into habitat health and species distribution. Traditional methods for identifying bird species are time-intensive and prone to human error, necessitating automated solutions. This project, Bird Species Identification Using Deep Learning, proposes an advanced system leveraging the power of deep learning to accurately identify bird species from images. The system utilizes a convolutional neural network (CNN), renowned for its proficiency in image classification tasks. A dataset comprising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  26
    From Pixels to Patterns: Neural Networks for Eagle-Fish Detection.R. Senthilkumar - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-12.
    Bird species identification plays a vital role in biodiversity conservation and ecological studies, offering insights into habitat health and species distribution. Traditional methods for identifying bird species are time-intensive and prone to human error, necessitating automated solutions. This project, Bird Species Identification Using Deep Learning, proposes an advanced system leveraging the power of deep learning to accurately identify bird species from images. The system utilizes a convolutional neural network (CNN), renowned for its proficiency in image classification tasks.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Rules in programming languages and networks.Frederick R. Adams, Kenneth Aizawa & Gary Fuller - 1992 - In John Dinsmore (ed.), The Symbolic and Connectionist Paradigms: Closing the Gap. Lawrence Erlbaum.
    1. Do models formulated in programming languages use explicit rules where connectionist models do not? 2. Are rules as found in programming languages hard, precise, and exceptionless, where connectionist rules are not? 3. Do connectionist models use rules operating on distributed representations where models formulated in programming languages do not? 4. Do connectionist models fail to use structure sensitive rules of the sort found in "classical" computer architectures? In this chapter we argue that the answer to each of these (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44.  40
    Web/Mobile Based Tool for Mapping of Water Supply Network.Vaman Dasu - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.
    issues in real-time, allowing authorities to address concerns swiftly. Additionally, the integration of IoT-based monitoring, utilizing ESP32/ARDUINO devices, will enable the collection of real-time data, providing alerts on water supply status and system malfunctions. The technology stack comprises JavaScript, PHP, and PostgreSQL with PostGIS for spatial data management, emphasizing secure, scalable data handling. The platform is designed for continuous improvement through user feedback, ensuring it evolves to meet the dynamic needs of the Jal Jeevan Mission. Through innovative technology and a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Weaponized skepticism: An analysis of social media deception as applied political epistemology.Regina Rini - 2021 - In Elizabeth Edenberg & Michael Hannon (eds.), Political Epistemology. Oxford: Oxford University Press. pp. 31-48.
    Since at least 2016, many have worried that social media enables authoritarians to meddle in democratic politics. The concern is that trolls and bots amplify deceptive content. In this chapter I argue that these tactics have a more insidious anti-democratic purpose. Lies implanted in democratic discourse by authoritarians are often intended to be caught. Their primary goal is not to successfully deceive, but rather to undermine the democratic value of testimony. In well-functioning democracies, our mutual reliance on testimony also generates (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  46. (1 other version)A property cluster theory of cognition.Cameron Buckner - 2013 - Philosophical Psychology (3):1-30.
    Our prominent definitions of cognition are too vague and lack empirical grounding. They have not kept up with recent developments, and cannot bear the weight placed on them across many different debates. I here articulate and defend a more adequate theory. On this theory, behaviors under the control of cognition tend to display a cluster of characteristic properties, a cluster which tends to be absent from behaviors produced by non-cognitive processes. This cluster is reverse-engineered from the empirical tests that comparative (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  47. Principles of Information Processing and Natural Learning in Biological Systems.Predrag Slijepcevic - 2021 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 52 (2):227-245.
    The key assumption behind evolutionary epistemology is that animals are active learners or ‘knowers’. In the present study, I updated the concept of natural learning, developed by Henry Plotkin and John Odling-Smee, by expanding it from the animal-only territory to the biosphere-as-a-whole territory. In the new interpretation of natural learning the concept of biological information, guided by Peter Corning’s concept of “control information”, becomes the ‘glue’ holding the organism–environment interactions together. The control information guides biological systems, from bacteria to ecosystems, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48.  30
    Weighted Particle Swarm Optimization Algorithms and Power Management Strategies for Grid Hybrid Energy Systems (4th edition).Rajendran Sugumar - 2023 - International Conference on Recent Advances on Science and Engineering 4 (5):1-11.
    In independent renewable energy systems (RESs), one of the primary concerns needing to be addressed is the maintaining of power balances between supplies and requirements that are cost-optimized in residences linked to these systems. The amount of power generated through RESs has substantially risen, with solar and wind being the two primary sources in RESs. In modern power systems, small-scale distributed networks are growing at a rapid pace and distributed generation (DG) plays an important role. Micro grids (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Bitcoin Price Prediction.Desai Nms - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-13.
    Bitcoin, as a decentralized digital currency, has undergone extreme price fluctuations over the years. Predicting its future price presents a significant challenge due to its volatile nature and susceptibility to various external factors, including market sentiment, regulations, and technological developments. This research aims to build an advanced forecasting model to predict Bitcoin’s price movements accurately. We leverage historical price data and apply cutting-edge machine learning techniques, including Long Short-Term Memory (LSTM) networks and Gradient Boosting Machines (GBM). By comparing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Płeć kulturowa w rozproszonych systemach poznawczych – możliwości konceptualizacji.Wachowski Witold - 2015 - Argument: Biannual Philosophical Journal 5 (1):135-150.
    Title - Gender in distributed cognitive systems: Possible conceptualizations. Abstract - There is a mismatch between social and biological approaches in the studies on sex and gender. Neurofeminist researchers critically examine gendered impacts of research in neuroscience and cognitive science, as well as develop more adequate and gender‑appropriate neuroscientific studies. However, they still seem to be focused on the brain and its relationship with the environment. Moreover, there are a little ‘science‑phobic’ feminist approaches based on actor‑network theory, and social (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974