Results for 'efficient methods'

974 found
Order:
  1.  59
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  72
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The reality of modern methods applied in process of performance assessments of employees in the municipalities in Gaza Strip.Mazen J. Al Shobaki & Samy S. Abu Naser - 2016 - International Journal of Advanced Scientific Research 1 (7):14-23.
    The research aims to identify the reality of modern methods applied in the process of performance assessments of employees in the municipalities of Gaza-strip, Complete Census method of community study was used, (571) questionnaires were distributed to all members of the community study, (524) questionnaires were recovery with rate of (91.76%). The most important findings of the study: There were statistically significant relationship differences between the applications of modern methods in the performance assessments of employees in the municipalities (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4.  63
    A Comprehensive Evaluation and Methodology on Enhancing Computational Efficiency through Accelerated Computing.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):517-525.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task concurrency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  75
    Efficient Cloud-Enabled Cardiovascular Disease Risk Prediction and Management through Optimized Machine Learning.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-475.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, energy consumption has a positive correlation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Method and Metaphor in Aristotle's Science of Nature.Sean Michael Pead Coughlin - 2013 - Dissertation, University of Western Ontario
    This dissertation is a collection of essays exploring the role of metaphor in Aristotle’s scientific method. Aristotle often appeals to metaphors in his scientific practice; but in the Posterior Analytics, he suggests that their use is inimical to science. Why, then, does he use them in natural science? And what does his use of metaphor in science reveal about the nature of his scientific investigations? I approach these questions by investigating the epistemic status of metaphor in Aristotelian science. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  85
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Crunchy Methods in Practical Mathematics.Michael Wood - 2001 - Philosophy of Mathematics Education Journal 14.
    This paper focuses on the distinction between methods which are mathematically "clever", and those which are simply crude, typically repetitive and computer intensive, approaches for "crunching" out answers to problems. Examples of the latter include simulated probability distributions and resampling methods in statistics, and iterative methods for solving equations or optimisation problems. Most of these methods require software support, but this is easily provided by a PC. The paper argues that the crunchier methods often have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. An efficient lattice algorithm for the libor market model.Tim Xiao - 2011 - Journal of Derivatives 19 (1):25-40.
    The LIBOR Market Model has become one of the most popular models for pricing interest rate products. It is commonly believed that Monte-Carlo simulation is the only viable method available for the LIBOR Market Model. In this article, however, we propose a lattice approach to price interest rate products within the LIBOR Market Model by introducing a shifted forward measure and several novel fast drift approximation methods. This model should achieve the best performance without losing much accuracy. Moreover, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  39
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  23
    Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. A Bipolar Fuzzy Extension of the MULTIMOORA Method.Dragisa Stanujkic, Assia Bakali, Darjan Karabasevic, Edmundas Kazimieras Zavadskas, Florentin Smarandache & Willem K. M. Brauers - 2019 - Informatica 30 (1):135–152.
    The aim of this paper is to make a proposal for a new extension of the MULTIMOORA method extended to deal with bipolar fuzzy sets. Bipolar fuzzy sets are proposed as an extension of classical fuzzy sets in order to enable solving a particular class of decision-making problems. Unlike other extensions of the fuzzy set of theory, bipolar fuzzy sets introduce a positive membership function, which denotes the satisfaction degree of the element x to the property corresponding to the bipolar-valued (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Implementation of Swot-Ahp Method to Determine the Best Strategy on Development Women Navy Resources in Indonesian War Ship.Devi Cipta Anggraini, Suparno, Adi Bandono, I. Nengah Putra & Arica Dwi Susanto - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (9):11-20.
    Abstract: (Indonesian Women Navy=kowal) is part of Indonesian Navy which have the same duties and responsibilities as other naval soldiers. The essence of Kowal's main task is to take part in performing the main tasks of the TNI in which their skills are needed to achieve greater efficiency by remembering his nature and femininity. SWOT is used as a planning tool. However, this analysis has weaknesses. Some of these weaknesses can be avoided, by connecting a SWOT analysis with AHP method. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The NET effect: Negative emissions technologies and the need–efficiency trade-off.Kian Mintz-Woo - 2023 - Global Sustainability 6:e5.
    Non-technical summary: -/- When developing and deploying negative emissions technologies (NETs), little attention has been paid to where. On the one hand, one might develop NETs where they are likely to contribute most to global mitigation targets, contributing to a global climate solution. On the other hand, one might develop NETs where they can help support development on a regional basis, justified by regional demands. I defend these arguments and suggest that they reflect the values of efficiency and responding to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  73
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  55
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. International experience of integration of tourism and hospitality enterprises.Oleksandr Krupskyi & Yevheniia Stesenko - 2018 - Economics: Time Realities. Scientific Journal 37 (3):61-67.
    The article analyzes and presents the results of international experience of integration development in the field of tourism and hospitality, modern and efficient methods of integration in the field of tourism. The effective ways of realization of integration development programs at tourist enterprises and hotel chains are determined. The main objectives of integration processes in the field of tourism are also defined. The analysis of the most famous multinational tour operators and the largest hotel chains in the world (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  44
    Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.Vishal Parmar - 2024 - Technosaga 2024 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban environments, achieving a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Evaluation of Ukrainian banks’ business models by the structural and functional groups analysis method.Olena Zarutska, Lyudmila Novikova, Roman Pavlov, Tatyana Pavlova & Oksana Levkovich - 2022 - Financial and Credit Activity Problems of Theory and Practice 4 (45):8-20.
    A method of identifying banks’ business models and studying the features of their risk profile, considering the system of indicators featuring the structure of assets, liabilities, income, expenses, and other qualitative indicators based on monthly statistical reporting. Kohonen's self-organizing maps (SOM) are used to process large data sets, revealing objects’ hidden features by forming homogeneous groups according to similar values of a large system of indicators. The choice of the system of indicators that play the most significant role in describing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The wisdom-of-crowds: an efficient, philosophically-validated, social epistemological network profiling toolkit.Colin Klein, Marc Cheong, Marinus Ferreira, Emily Sullivan & Mark Alfano - 2023 - In Hocine Cherifi, Rosario Nunzio Mantegna, Luis M. Rocha, Chantal Cherifi & Salvatore Miccichè (eds.), Complex Networks and Their Applications XI: Proceedings of The Eleventh International Conference on Complex Networks and Their Applications: COMPLEX NETWORKS 2022 — Volume 1. Springer.
    The epistemic position of an agent often depends on their position in a larger network of other agents who provide them with information. In general, agents are better off if they have diverse and independent sources. Sullivan et al. [19] developed a method for quantitatively characterizing the epistemic position of individuals in a network that takes into account both diversity and independence; and presented a proof-of-concept, closed-source implementation on a small graph derived from Twitter data [19]. This paper reports on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Brief Essay on the Nature and Method of Metaphysics.Andres Ayala - 2023 - The Incarnate Word 10 (1):47-86.
    This paper is an attempt to clarify, from a Thomistic point of view, the nature and method of metaphysics. I argue that metaphysics' object is created being, not God, even if God enters metaphysics as efficient cause of metaphysic's object. Also, that metaphysics is a science, insofar as a particular kind of coherent reasoning process, going from the many to understand a certain oneness, and then from that oneness to reinterpret the many. Moreover, that, in this particular process of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Mizhnarodnyy dosvid intehratsiynoho rozvytku pidpryyemstv turyzmu ta hostynnosti [International experience of integration of tourism and hospitality enterprises].Oleksandr P. Krupskyi & Yе. E. Stesenko - 2018 - Economics: Time Realities. Scientific Journal 37 (3):61-67.
    The article analyzes and presents the results of international experience of integration development in the field of tourism and hospitality, modern and efficient methods of integration in the field of tourism. The effective ways of realization of integration development programs at tourist enterprises and hotel chains are determined. The main objectives of integration processes in the field of tourism are also defined. The analysis of the most famous multinational tour operators and the largest hotel chains in the world (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  41
    Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.R. Indoria - 2024 - Technosaga 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban environments, achieving a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. (1 other version)STATE's ROLE AND METHODS OF IMPACT ON ITS ECONOMY IN A TRANSITION PERIOD.Giorgi Kharshiladze - 2021 - MYŚL EKONOMICZNA I POLITYCZNA 1 (71):77-98.
    The main problem of how to transform a centrally planned market into a market economy has emerged as one of the most influential and challenging issues in modern times. Nowadays, post-Soviet republics and nations of Central and Eastern Europe are in a transformation process and seek to capture claimed efficiency and advantages of market mechanisms for their economies. This is a very complex issue, because a rapid transition from socialism to a market economy is an unprecedented phenomenon and requires fundamental (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Motivating and Maintaining Ethics, Equity, Effectiveness, Efficiency, and Expertise in Peer Review.Adam Craig, Christina Lee, Nithyaa Bala & Carl Taswell - 2022 - Brainiacs Journal 3 (1):I5B147D9D.
    Scientists who engage in science and the scientific endeavor should seek truth with conviction of morals and commitment to ethics. While the number of publications continues to increase, the number of retractions has increased at a faster rate. Journals publish fraudulent research papers despite claims of peer review and adherence to publishing ethics. Nevertheless, appropriate ethical peer review will remain a gatekeeper when selecting research manuscripts in scholarly publishing and approving research applications for grant funding. However, this peer review must (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Recovery of precious metals from e-wastes through conventional and phytoremediation treatment methods: a review and prediction. [REVIEW]Chuck Chuan Ng - 2023 - Journal of Material Cycles and Waste Management 2023.
    E-waste, also known as waste from electrical and electronic equipment, is a solid waste that accumulates quickly due to high demand driven by the market for replacing newer electrical and electronic products. The global e-waste generation is estimated to be between 53.6 million tons, and it is increasing by 3–5% per year. Metals make-up approximately 30% of e-waste, which contains precious elements Au, Ag, Cu, Pt, and other high-value elements, valued at USD 57 billion, which is driving the e-waste recycling (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Resist or yield? What to do with temptations?Bence Nanay - 2020 - In Alfred Mele (ed.), Surrounding Self-Control. Oxford University Press, Usa. pp. 242-256.
    An important recent distinction in the empirical literature about self-control is between resisting and avoiding temptations. While we have evidence that avoiding temptations is the more efficient method of the two, philosophers have focused almost exclusively on resisting temptations. The aim of this paper is to examine what the ability to avoid temptations depends on and argue that it depends primarily on how fragmented one’s mind is: on the inconsistencies in one’s mental setup. The fragmentation of mind requires a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. How to Change People’s Beliefs? Doxastic Coercion vs. Evidential Persuasion.Gheorghe-Ilie Farte - 2016 - Argumentum. Journal of the Seminar of Discursive Logic, Argumentation Theory and Rhetoric 14 (2):47-76.
    The very existence of society depends on the ability of its members to influence formatively the beliefs, desires, and actions of their fellows. In every sphere of social life, powerful human agents (whether individuals or institutions) tend to use coercion as a favorite shortcut to achieving their aims without taking into consideration the non-violent alternatives or the negative (unintended) consequences of their actions. This propensity for coercion is manifested in the doxastic sphere by attempts to shape people’s beliefs (and doubts) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Fuzzy Networks for Modeling Shared Semantic Knowledge.Farshad Badie & Luis M. Augusto - 2023 - Journal of Artificial General Intelligence 14 (1):1-14.
    Shared conceptualization, in the sense we take it here, is as recent a notion as the Semantic Web, but its relevance for a large variety of fields requires efficient methods of extraction and representation for both quantitative and qualitative data. This notion is particularly relevant for the investigation into, and construction of, semantic structures such as knowledge bases and taxonomies, but given the required large, often inaccurate, corpora available for search we can get only approximations. We see fuzzy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Indigenous ayahuasca ceremonies in the European context: structures, purposes, concepts.Mika Turkia - manuscript
    Psychedelics are currently being studied intensively for the treatment of various psychiatric disorders. Ayahuasca, a plant-based extract originating from the Amazonian area, is traditionally consumed in ritualistic group events. The related indigenous traditions date back hundreds of years and have amassed vast amounts of knowledge on the therapeutic use of psychedelic and non-psychedelic plant-based substances. -/- These traditions require a prospective ceremony facilitator to undergo years of intensive training to acquire knowledge, mental power or self-confidence, stability, sensitivity, intuitive treatment outcome (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  71
    Parallel Processing Techniques for Optimizing Data-Intensive Applications on Accelerated Computing Platforms.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-550.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  98
    A comparative study of the structure of knowledge in the philosophy of Descartes and John Dewey.Seyedsaber Seyedi Fazlollahi & Mohammad Akvan - 2022 - The Epistemological Research 11 (Philosophy):27-50.
    In his philosophical structure, Descartes intended to organize, on the basis of mathematics, an efficient method of certainty for research and philosophy. The Mathesis is a body of universal and necessary truths of order and connection between ideas. According to Descartes' epistemology, man has become a researcher and discoverer who must discover himself. For Descartes, certain knowledge is possible, and in his structural cognitive style, action is a function of the form, while Dewey's cognitive style is a function in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Enhanced Artificial Intelligence System for Diagnosing and Predicting Breast Cancer Using Deep Learning.Mona Alfifi, Mohamad Shady Alrahhal, Samir Bataineh & Mohammad Mezher - 2020 - International Journal of Advanced Computer Science and Applications 11 (7):1-17.
    Breast cancer is the leading cause of death among women with cancer. Computer-aided diagnosis is an efficient method for assisting medical experts in early diagnosis, improving the chance of recovery. Employing artificial intelligence (AI) in the medical area is very crucial due to the sensitivity of this field. This means that the low accuracy of the classification methods used for cancer detection is a critical issue. This problem is accentuated when it comes to blurry mammogram images. In this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  14
    Numerical Modeling of the Stress-Strain State of Power Frames of Liquid Rocket Engines of Low Thrust.Oleh Bondarenko & Yurii Tkachov - 2024 - Matematične Modelûvannâ 1 (50):194–201.
    Today, the space industry is undergoing a period of significant technological advancement. Continuous progress in additive manufacturing technologies and the adoption of modern materials for 3D printing are driving this transformation. This trend has intensified competition among various space companies—both state-owned and private—each striving to introduce innovative and unique solutions. FlightControl Propulsion, a private space company in Ukraine, is one such example. This study focuses on the design of the power frame for a low-thrust liquid rocket engine. Power frames in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. A Guide to Thought Experiments in Epistemology.Wesley Buckwalter - 2024 - In Blake Roeber, Ernest Sosa, Matthias Steup & John Turri (eds.), Contemporary Debates in Epistemology, 3rd edition. Wiley-Blackwell.
    The purpose of this chapter is to provide a guide for conducting thought experiments in epistemology effectively. The guide raises several considerations for best practices when using this research method. Several weaknesses in the way thought experiments are conducted are also identified and several suggestions are reviewed for how to improve them. Training in these research techniques promotes more productive scholarship in epistemology, saves time and resources wasted on less efficient approaches, and reduces the risk that researchers are fooling (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  73
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Electronic Banking Services from the Point of View of Bank Customers in Palestine.Suliman A. El Talla, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (10):45-60.
    This study aims to identify the electronic banking services in Palestine from the point of view of the customers of the banks, where researchers used the descriptive analytical method, through a questionnaire distributed electronically to the sample of beneficiaries of the electronic banking services provided by banks operating in Palestine. The study reached a number of results, the most important of which are: There is a moderate degree of efficiency of electronic banking services provided in banks operating in Palestine from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Berechnungen der moralischen Effizienz zweier wohltätiger Projekte – Kinderheim in Guatemala vs. Malariaprophylaxe. Anhang zu: Wie effizient sollen Altruisten handeln?Christoph Lumer - 2021 - Publications of Christoph Lumer.
    This is an appendix to the article "Wie effizient sollten Altruisten handeln?" ("How Efficient Should Altruists Act?") The appendix provides detailed moral efficiency calculations for two charitable projects: a children's home in Guatemala for neglected children versus malaria prevention by distributing mosquito nets in malaria areas in sub-Saharan Africa. The exact method of efficiency calculation is explained and applied. At least prima facie, the malaria prophylaxis project is clearly more efficient.
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Reality of Marketing Services in Palestine Cellular Communications Company (Jawwal).Suliman A. El Talla, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (10):77-86.
    This study aimed to identify the reality of marketing services in Palestine Cellular Communications Company (Jawwal) from the viewpoint of the workers, where the researchers used the descriptive analytical method, through a questionnaire randomly distributed to the sample of workers in Palestine Cellular Communications Company (Jawwal) in Gaza Strip reached (60) employees. The study reached a number of results, the most important of which are: The results showed that there is a high level of efficiency of marketing services in Palestine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Business diagnostics as a universal tool for stady of state and determination of corporations development directions and strategies.Igor Kryvovyazyuk, Galyna Otlyvanska, Liudmyla Shostak, Tatiana Sak, Larysa Yushchyshyna, Iryna Volynets, Olha Myshko, Iryna Oleksandrenko, Viktoriia Dorosh & Tetiana Visyna - 2021 - Academy of Strategic Management Journal 20 (2):1-14.
    The aim of the article is to show how the use of diagnostic methods allows identifying patterns and problems of corporations functioning, providing identification of directions and strategies for further development of their business. Theoretical and methodological basis of the research is a scientific works of scientists in the field of business diagnostics and strategic development, who studied diagnostics in the system of responding to business development problems, identifying areas for improving strategic management, financial statements of corporations of Daimler (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  88
    Model for ensuring business excellence on the basis of management innovation.Igor Kryvovyazyuk - 2022 - Economic Forum 1 (2):112-119.
    The problem of building an effective system of interconnected and purposeful innovative changes in business management is solved in the article. The main purpose of the research is to improve the model of business excellence on the basis of interconnected and purposeful innovative changes in business management. Critical analysis of literature sources and approaches to solving the problem of building a perfect model of business emphasizes the diversity of applied methodological approaches and methods of management innovation. However, in terms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  66
    Optimized Energy Numbers Continued.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:12.
    In this paper, we explore the properties and optimization techniques related to polyhedral cones and energy numbers with a focus on the cone of positive semidefinite matrices and efficient computation strategies for kernels. In Part (a), we examine the polyhedral nature of the cone of positive semidefinite matrices, , establishing that it does not form a polyhedral cone for due to its infinite dimensional characteristics. In Part (b), we present an algorithm for efficiently computing the kernel function on-the-fly, leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Managerial innovations in methodology of solving export-import activity problems and ensuring international corporations business excellence.Igor Kryvovyazyuk, I. Vakhovych, I. Kaminska & V. Dorosh - 2020 - Quality – Access to Success 21 (178):50-55.
    The purpose of the research is to develop a new methodological basis for identifying, analyzing and solving problems of international corporations export-import activities and to ground the directions for ensuring their business excellence. The approach originality provides introduction of a conceptual model that aims to eliminate the negative symptoms of international corporations export-import activities based on the results of comprehensive market research, effectiveness of export-import activities and calculation of the integrated indicator of business excellence. The leading corporations of Slovakia and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. BATTERY-POWERED DEVICE FOR MONITORING PHYSICAL DISTANCING THROUGH WIRELESS TECHNOLOGY.Angelica A. Cabaya, Rachel Grace B. Rizardo, Clesphsyche April O. Magno, Aubrey Madar B. Magno, Fredolen A. Causing, Steven V. Batislaong & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    One method for preventing the spread of the coronavirus and other contagious diseases is through social distancing. Therefore, creating a tool to measure and quickly discover the precise distance is necessary. In order to prevent physical contact between individuals, this study aimed to detects individuals’ physical distance, through an inaugurated battery-powered device that monitors physical distance through wireless technology. Specifically, in public or crowded areas, to lessen the spread of the virus. This study focuses on detecting people’s physical distance in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  64
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Ramism.Andrea Strazzoni - 2022 - Encyclopedia of Renaissance Philosophy.
    The main aim of the French logician and philosopher Petrus Ramus was to provide a method of teaching the liberal arts enabling the completion of the undergraduate program of studies in 7 years. This method was based on a new logic, in which the complex structure of Aristotle’s Organon and of the Summulae logicales of Peter of Spain is reduced to two main doctrines: the invention of arguments, by which it is possible to find the notions for reasoning and disputing (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974