Results for 'edge computing'

965 found
Order:
  1. Testing the Simulation Hypothesis: The Annihilation of the Universe and Campbell’s Consciousness-Based Alternative.Eliott Edge - manuscript
    Bostrom's Simulation Argument has become synonymous with simulation theory, despite the existence of alternative frameworks that also suggest our universe may be a computer simulation—frameworks that do not require the assumption of posthumans. Further, Bostrom's work has spurred discussions around the potential destruction or termination of our universe, prompting existential anxieties and fueling extensive philosophical speculation. We evaluate the arguments of Greene, Turchin, Batin, Denkenberger, and Yampolskiy, alongside the counterarguments of Braddon-Mitchell, Latham, and Edge. We conclude that Bostrom's Simulation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Advances and Analysis on Reducing Webpage Response Time with Effect of Edge Computing.N. Kamiyama, Y. Nakano, K. Shiomoto, G. Hasegawa, Masayuki Murata & Hideo Miyahara - 2018 - 2016 IEEE Global Communications Conference (GLOBECOM) 4.
    Modern webpages consist of many rich objects dynamically produced by servers and client terminals at diverse locations, so we face an increase in web response time. To reduce the time, edge computing, in which dynamic objects are generated and delivered from edge nodes, is effective. For ISPs and CDN providers, it is desirable to estimate the effect of reducing the web response time when introducing edge computing. Therefore, in this paper, we derive a simple formula (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Optimizing AI Models for Biomedical Signal Processing Using Reinforcement Learning in Edge Computing.A. Manoj Prabaharan - 2024 - Journal of Artificial Intelligence and Cyber Security (Jaics) 8 (1):1-7.
    . In the evolving landscape of healthcare, the efficient processing of biomedical signals is critical for real-time diagnosis and personalized treatment. Conventional cloud-based AI systems for biomedical signal processing face challenges such as high latency, bandwidth consumption, and data privacy concerns. Edge computing, which brings data processing closer to the source, has emerged as a potential solution to these limitations. However, optimizing AI models for edge devices, which often have limited computational resources, remains a challenge. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  27
    The Evolution of Cloud Computing: From Virtualization to Edge Computing.Ingale Amruta - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (2):453-458.
    Cloud computing has evolved from a nascent technology to a foundational pillar of modern IT infrastructure, driving innovations across industries by providing scalable, on-demand resources and services. Its evolution, from the early stages of virtualization to the emergence of edge computing, has reshaped how data is stored, processed, and accessed. This paper explores the key milestones in the evolution of cloud computing, beginning with the advent of virtualization and moving through the development of various cloud models, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Edge-Cloud Convergence: Architecting Hybrid Systems for Real-Time Data Processing and Latency Optimization.Dutta Shaunot - 2023 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 10 (1):1147-1151.
    With the rapid growth of Internet of Things (IoT) devices and the increasing demand for real-time processing of large data volumes, traditional cloud-based systems struggle to meet latency and bandwidth requirements. Edge-Cloud convergence has emerged as a solution, combining the computational power of cloud data centers with the low-latency and high-throughput capabilities of edge devices. This paper explores the architecture, design principles, and best practices for building hybrid systems that integrate edge computing and cloud infrastructure. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Emergence and Computation at the Edge of Classical and Quantum Systems.Ignazio Licata - 2008 - In World Scientific, Physics of Emergence and Organization.
    The problem of emergence in physical theories makes necessary to build a general theory of the relationships between the observed system and the observing system. It can be shown that there exists a correspondence between classical systems and computational dynamics according to the Shannon-Turing model. A classical system is an informational closed system with respect to the observer; this characterizes the emergent processes in classical physics as phenomenological emergence. In quantum systems, the analysis based on the computation theory fails. It (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10.  38
    The Evolution of Cloud Computing: Key Trends and Future Directions.Rama Bansode Suvarna More - 2021 - International Journal of Advanced Research in Education and Technology 8 (1):447-452.
    Cloud computing has revolutionized the way businesses and individuals access and utilize computing resources. With its rapid adoption over the last few decades, it has become the backbone of many IT services across industries. This paper explores the evolution of cloud computing, highlighting key trends and identifying future directions that will shape the landscape. It discusses the evolution from traditional on-premise systems to the cloud-first approach, current advancements such as multi-cloud and hybrid cloud environments, and the growing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Neural Computation of Surface Border Ownership and Relative Surface Depth from Ambiguous Contrast Inputs.Birgitta Dresp-Langley & Stephen Grossberg - 2016 - Frontiers in Psychology 7.
    The segregation of image parts into foreground and background is an important aspect of the neural computation of 3D scene perception. To achieve such segregation, the brain needs information about border ownership; that is, the belongingness of a contour to a specific surface represented in the image. This article presents psychophysical data derived from 3D percepts of figure and ground that were generated by presenting 2D images composed of spatially disjoint shapes that pointed inward or outward relative to the continuous (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  53
    The Advancement of Cloud Computing: From Conventional IT Infrastructure to Serverless Computing (13th edition).Choudhary Anjali - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (1):119-126. Translated by Choudhary Anjali.
    At present, numerous innovations and technologies take place continuously. Serverless computing is a paradigm switch from conventional cloud computing. The term ‘serverless’ represents that the cloud developers do not interact with servers directly, whereas they use codes and logic to do so. This feature enhanced and extended the overall performance of the serverless platform. This paper presents a comparative study of both cloud environments from conventional to platform-independent or serverless computing. Apart from this, several key aspects such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Nature and Function of Content in Computational Models.Frances Egan - 2018 - In Mark Sprevak & Matteo Colombo, The Routledge Handbook of the Computational Mind. Routledge.
    Much of computational cognitive science construes human cognitive capacities as representational capacities, or as involving representation in some way. Computational theories of vision, for example, typically posit structures that represent edges in the distal scene. Neurons are often said to represent elements of their receptive fields. Despite the ubiquity of representational talk in computational theorizing there is surprisingly little consensus about how such claims are to be understood. The point of this chapter is to sketch an account of the nature (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  14. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  96
    On the Edge of Cognitive Revolution: The Impact of Neuro-Robotics on Mind and Singularity.Fatih Burak Karagöz - 2023 - Isbcs Workshop Semposium.
    The mind has always been a peculiar and elusive subject, sparking controversial theories throughout the history of philosophy. The initial theorization of the mind dates back to Orphism, which formulated a dualistic structure of soul and body (Johansen, 1999) [1], laying the foundation for Greek dualism, introspection, and the rise of metaphysical idealism. This ill-empirical stance, especially after Plato’s idea of forms, led to inaccessible theoretical concepts concerning the investigation of the relationship between body and mind. Although diverse theories provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Analysis of Human Computer Interface ( HCI) using Meta Verse Techniques.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5:1.
    : The design and usability of computer interfaces are crucial factors in improving user experience and productivity in the field of human-computer interaction. This overview examines the development of computer interfaces, starting with command-line interfaces (CLI) and moving on to graphical user interfaces (GUI), touch interfaces, and gesture-controlled interfaces. The guiding concepts of interface development are highlighted: usability, accessibility and user-centered design. The harmony of form and function, the incorporation of cutting-edge technologies such as voice recognition and augmented reality, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The central system as a computational engine.Susan Schneider - unknown
    The Language of Thought program has a suicidal edge. Jerry Fodor, of all people, has argued that although LOT will likely succeed in explaining modular processes, it will fail to explain the central system, a subsystem in the brain in which information from the different sense modalities is integrated, conscious deliberation occurs, and behavior is planned. A fundamental characteristic of the central system is that it is “informationally unencapsulated” -- its operations can draw from information from any cognitive domain. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Design and Development of Human Computer Interface using Virtual Reality Techniques.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):325-337.
    The design and usability of computer interfaces are crucial factors in improving user experience and productivity in the field of human-computer interaction. This overview examines the development of computer interfaces, starting with command-line interfaces (CLI) and moving on to graphical user interfaces (GUI), touch interfaces, and gesture-controlled interfaces. The guiding concepts of interface development are highlighted: usability, accessibility and user-centered design. The harmony of form and function, the incorporation of cutting-edge technologies such as voice recognition and augmented reality, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Optimized Machine Learning Algorithms for Real-Time ECG Signal Analysis in IoT Networks.P. Selvaprasanth - 2024 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 8 (1):1-7.
    Electrocardiogram (ECG) signal analysis is a critical task in healthcare for diagnosing cardiovascular conditions such as arrhythmias, heart attacks, and other heart-related diseases. With the growth of Internet of Things (IoT) networks, real-time ECG monitoring has become possible through wearable devices and sensors, providing continuous patient health monitoring. However, real-time ECG signal analysis in IoT environments poses several challenges, including data latency, limited computational power of IoT devices, and energy constraints. This paper proposes a framework for Optimized Machine Learning Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  21
    AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in Data- Driven Transformation.Adavelli Sateesh Reddy - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (6):9069-9080.
    As the integration of Artificial Intelligence (AI) and cloud computing transforms the insurance industry, it is undergoing a major breakthrough. With these technologies, insurers can modernize operations, improve the customer experience and make better decisions using real time data and predictive analytics. This paper aims to explore why AI and cloud play such critical roles in shifting insurance practice from legacy systems modernization, to data governance and regulatory compliance to workforce readiness. Today, world-class AI powered tools and cloud platforms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Next-Generation Federated Learning: Overcoming Privacy and Scalability Challenges for.K. Kavikuyil - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 8 (3):681-684.
    Federated Learning (FL) is a machine learning paradigm that enables model training across decentralized devices while preserving data privacy. However, FL faces two significant challenges: privacy concerns and scalability issues. Privacy concerns arise from potential vulnerabilities in aggregating updates, whereas scalability issues stem from the increasing number of edge devices and the computational overhead required for communication and model updates. This paper explores cutting-edge advancements aimed at addressing these challenges, including advanced encryption techniques, differential privacy mechanisms, federated optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  27
    Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support customer engagement. The study offers core design principles for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and globally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Philosophy and theory of artificial intelligence 2017.Vincent C. Müller (ed.) - 2017 - Berlin: Springer.
    This book reports on the results of the third edition of the premier conference in the field of philosophy of artificial intelligence, PT-AI 2017, held on November 4 - 5, 2017 at the University of Leeds, UK. It covers: advanced knowledge on key AI concepts, including complexity, computation, creativity, embodiment, representation and superintelligence; cutting-edge ethical issues, such as the AI impact on human dignity and society, responsibilities and rights of machines, as well as AI threats to humanity and AI (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Predictive Analysis of Lottery Outcomes Using Deep Learning and Time Series Analysis.Asil Mustafa Alghoul & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):1-6.
    Abstract: Lotteries have long been a source of fascination and intrigue, offering the tantalizing prospect of unexpected fortunes. In this research paper, we delve into the world of lottery predictions, employing cutting-edge AI techniques to unlock the secrets of lottery outcomes. Our dataset, obtained from Kaggle, comprises historical lottery draws, and our goal is to develop predictive models that can anticipate future winning numbers. This study explores the use of deep learning and time series analysis to achieve this elusive (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  29. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Third volume.Florentin Smarandache - 2024
    The third volume of “Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond” presents an in-depth exploration of the cutting-edge developments in uncertain combinatorics and set theory. This comprehensive collection highlights innovative methodologies such as graphization, hyperization, and uncertainization, which enhance combinatorics by incorporating foundational concepts from fuzzy, neutrosophic, soft, and rough set theories. These advancements open new mathematical horizons, offering novel approaches to managing uncertainty within complex systems. Combinatorics, a discipline focused on counting, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Second volume.Takaaki Fujita & Florentin Smarandache - 2024
    The second volume of “Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond” presents a deep exploration of the progress in uncertain combinatorics through innovative methodologies like graphization, hyperization, and uncertainization. This volume integrates foundational concepts from fuzzy, neutrosophic, soft, and rough set theory, among others, to further advance the field. Combinatorics and set theory, two central pillars of mathematics, focus on counting, arrangement, and the study of collections under defined rules. Combinatorics excels in handling (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Hunting for humans: on slavery, the emergence of the US as the world’s first super industrial state and its deployment of artificial intelligence and other military technology to repress dissent and neutralize enemy combatants.Miron Clay-Gilmore - 2025 - AI and Ethics 10.
    This essay argues that Huey Newton’s philosophical explanation of US empire fills an epistemological gap in our thinking that provides us with a basis for understanding the emergence and operational application of predictive policing, Big Data, cutting-edge surveillance programs, and semi-autonomous weapons by US military and policing apparati to maintain control over racialized populations historically and in the (still ongoing) Global War on Terror today – a phenomenon that Black Studies scholars and Black philosophers alike have yet to demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. (1 other version)Problems of representation I: nature and role.Dan Ryder - 2009 - In Sarah Robins, John Symons & Paco Calvo, The Routledge Companion to Philosophy of Psychology. New York, NY: Routledge. pp. 233.
    Introduction There are some exceptions, which we shall see below, but virtually all theories in psychology and cognitive science make use of the notion of representation. Arguably, folk psychology also traffics in representations, or is at least strongly suggestive of their existence. There are many different types of things discussed in the psychological and philosophical literature that are candidates for representation-hood. First, there are the propositional attitudes – beliefs, judgments, desires, hopes etc. (see Chapters 9 and 17 of this volume). (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  33. Novel Concepts on Domination in Neutrosophic Incidence Graphs with Some Applications.Florentin Smarandache, Siti Nurul Fitriah Mohamad & Roslan Hasni - 2023 - Journal of Advanced Computational Intelligence and Intelligent Informatics 27 (5).
    In graph theory, the concept of domination is essential in a variety of domains. It has broad applications in diverse fields such as coding theory, computer net work models, and school bus routing and facility lo cation problems. If a fuzzy graph fails to obtain acceptable results, neutrosophic sets and neutrosophic graphs can be used to model uncertainty correlated with indeterminate and inconsistent information in arbitrary real-world scenario. In this study, we consider the concept of domination as it relates to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Revamping molecular biology for the twentieth first century, or putting back the theoretical horse ahead of the technological cart.Armando Aranda-Anzaldo - 2010 - Ludus Vitalis 18 (33):267-270.
    Molecular biology is a relatively new and very successful branch of science but currently it faces challenges posed by very complex issues that cannot be addressed by a traditional reductionist approach. However, despite its origins in the providential shift of some theoretical physicists to biology, currently molecular biology is immersed in a blind trend in which high-throughput technology, able to generate trillions of data, is becoming the leading edge of a discipline that has traded rational and critical thinking for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Formalizing UMLS Relations Using Semantic Partitions in the Context of a Task-Based Clinical Guidelines Model.Anand Kumar, Matteo Piazza, Barry Smith, Silvana Quaglini & Mario Stefanelli - 2004 - In Anand Kumar, Matteo Piazza, Barry Smith, Silvana Quaglini & Mario Stefanelli, Formalizing UMLS Relations Using Semantic Partitions in the Context of a Task-Based Clinical Guidelines Model. Saarbrücken: IFOMIS.
    An important part of the Unified Medical Language System (UMLS) is its Semantic Network, consisting of 134 Semantic Types connected to each other by edges formed by one or more of 54 distinct Relation Types. This Network is however for many purposes overcomplex, and various groups have thus made attempts at simplification. Here we take this work further by simplifying the relations which involve the three Semantic Types – Diagnostic Procedure, Laboratory Procedure and Therapeutic or Preventive Procedure. We define operators (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Sixth volume: Various New Uncertain Concepts (Collected Papers).Takaaki Fujita & Florentin Smarandache - 2025 - Gallup, NM, USA: NSIA Publishing House.
    This book is the sixth volume in the series of Collected Papers on Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Building upon the foundational contributions of previous volumes, this edition focuses on the exploration and development of Various New Uncertain Concepts, further enriching the study of uncertainty and complexity through innovative theoretical advancements and practical applications. The volume is meticulously organized into 15 chapters, each presenting unique perspectives and contributions to the field. From (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  99
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. On the Fundamentality of Meaning.Brian D. Josephson - 2018 - In FQXi Essays on 'What Is Fundamental?'.
    The mainstream view of meaning is that it is emergent, not fundamental, but some have disputed this, asserting that there is a more fundamental level of reality than that addressed by current physical theories, and that matter and meaning are in some way entangled. In this regard there are intriguing parallels between the quantum and biological domains, suggesting that there may be a more fundamental level underlying both. I argue that the organisation of this fundamental level is already to a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. A very brief review of the life and work of neuroscientist, physician, psychoanalyst, inventor, animal rights activist and pioneer in dolphins, isolation tanks and psychedelics John C Lilly 1915-2001.Starks Michael - 2016 - In Michael Starks, Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 577-580.
    Lilly was one of the greatest scientists and pioneers on the limits of human possibility but after his death a collective amnesia has descended and he is now almost forgotten. His Wiki is good but inevitably incomplete so here are a few missing details and viewpoints. Lilly was a generation (or more) ahead of his time. He is almost single-handedly responsible for the great interest in dolphins (which led to the Marine Mammal Protection Act in the USA and helped to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  25
    A Survey on an Attendance System based on the Principle of Facial Recognition.Bhashkar Anirudh K. Nayak - 2020 - International Journal of Innovative Research in Science, Engineering and Technology 9 (12):11347-11353.
    : In most educational institutions the student’s attendance is taken manually by using an attendance sheet, given by the faculty member in a class. The Current attendance marking methods are monotonous and time consuming. Manually recorded attendance can be easily tampered with. And it is also very difficult to actually verify the status of each student in a classroom environment with distributed branches whether the students are actually responding or not. Hence this paper is proposed to tackle these issues. Authentication (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Knowledge Sits in Places: The Vernacularity and Emplacement of Fish Markets in Southern Philippines.Nelson N. Turgo - 2016 - Mabini Review 5:66-88.
    Markets sit in places and knowledge produced in these places also constitute the very foundation of markets’ viability and market actors’ performative competitive edge. However, not all markets are created equal primarily in the context of their importance in the global economy. Thus conceived, we imagine a world economy or markets populated by people in front of wide computer screens making sense of financial algorithms and derivatives. In a way, here, we see a market that is run by codified (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  46
    Building Scalable Data Warehouses for Financial Analytics in Large Enterprises.Vijayan Naveen Edapurath - 2024 - International Journal of Innovative Research and Creative Technology 10 (3):1-10.
    In today's digital era, large enterprises face the daunting task of managing and analyzing vast volumes of financial data to inform strategic decision-making and maintain a competitive edge. Traditional data warehousing solutions often fall short in addressing the scale, complexity, and performance demands of modern financial analytics. This paper explores the architectural principles, technological strategies, and best practices essential for building scalable data warehouses tailored to the needs of financial analytics in large organizations. It delves into data integration techniques, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  32
    Digital Transformation in Insurance: How Guidewire, AWS, and Snowflake Converge for Future-Ready Solutions.Adavelli Sateesh Reddy - 2022 - International Journal of Computer Science and Information Technology Research 3 (1):95-114.
    The digital transformation of the insurance industry is unprecedented, urged by the changing expectations of customers, the necessity to embrace regulatory requirements and the necessity to enhance operational efficiency. This paper examines the convergence of three leading-edge technologies, Guidewire, Amazon Web Services (AWS) and Snowflake, to enable scalable, resilient and data-driven solutions for insurers. AWS and Snowflake provide unmatched cloud infrastructure in terms of security and scalability. They also provide industry-specific applications and frameworks for modernizing core systems for Guidewire, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. A graph-theoretic account of logics.A. Sernadas, C. Sernadas, J. Rasga & Marcelo E. Coniglio - 2009 - Journal of Logic and Computation 19 (6):1281-1320.
    A graph-theoretic account of logics is explored based on the general notion of m-graph (that is, a graph where each edge can have a finite sequence of nodes as source). Signatures, interpretation structures and deduction systems are seen as m-graphs. After defining a category freely generated by a m-graph, formulas and expressions in general can be seen as morphisms. Moreover, derivations involving rule instantiation are also morphisms. Soundness and completeness theorems are proved. As a consequence of the generality of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. On graph-theoretic fibring of logics.A. Sernadas, C. Sernadas, J. Rasga & M. Coniglio - 2009 - Journal of Logic and Computation 19 (6):1321-1357.
    A graph-theoretic account of fibring of logics is developed, capitalizing on the interleaving characteristics of fibring at the linguistic, semantic and proof levels. Fibring of two signatures is seen as a multi-graph (m-graph) where the nodes and the m-edges include the sorts and the constructors of the signatures at hand. Fibring of two models is a multi-graph (m-graph) where the nodes and the m-edges are the values and the operations in the models, respectively. Fibring of two deductive systems is an (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. FabriCity-XR: A Phygital Lattice Structure Mapping Spatial Justice – Integrated Design to AR-Enabled Assembly Workflow.Sina Mostafavi, Asma Mehan, Cole Howell, Edgar Montejano & Jessica Stuckemeyer - 2024 - In Germane Barnes & Blair Satterfield, 112th ACSA Annual Meeting Proceedings, Disruptors on the Edge. Vancouver, Canada: ACSA Press. pp. 180-187.
    The research discussed in this paper centers around the convergence of extended reality (XR) platforms, computational design, digital fabrication, and critical urban study practices. Its aim is to cultivate interdisciplinary and multiscalar approaches within these domains. The research endeavor represents a collaborative effort between two primary disciplines: critical urban studies, which prioritize socio-environmental justice, and integrated digital design to production, which emphasize the realization of volumetric or voxel-based structural systems. Moreover, the exploration encompasses augmented reality to assess its utilization in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 965