Results for 'internet data center'

999 found
Order:
  1. A Sustainability Improvement Strategy of Interconnected Data Centers Based on Dispatching Potential of Electric Vehicle Charging Stations.Xihao Wang, Xiaojun Wang, Yuqing Liu, Chun Xiao, Rongsheng Zhao, Ye Yang & Zhao Liu - 2022 - Sustainability 14 (11):6814.
    With the rapid development of information technology, the electricity consumption of Internet Data Centers (IDCs) increases drastically, resulting in considerable carbon emissions that need to be reduced urgently. In addition to the introduction of Renewable Energy Sources (RES), the joint use of the spatial migration capacity of IDC workload and the temporal flexibility of the demand of Electric Vehicle Charging Stations (EVCSs) provides an important means to change the carbon footprint of the IDC. In this paper, a sustainability (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  72
    Megadatele (Big Data) pe Internet.Sfetcu Nicolae - 2022 - It and C 1 (1):23-27.
    Termenul Big Data se referă la extragerea, manipularea și analiza unor seturi de date care sunt prea mari pentru a fi tratate în mod obișnuit. Din această cauză se utilizează software special și, în multe cazuri, și calculatoare și echipamente hardware special dedicate. În general la aceste date analiza se face statistic. Pe baza analizei datelor respective se fac de obicei predicții ale unor grupuri de persoane sau alte entități, pe baza comportamentului acestora în diverse situații și folosind tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  69
    Exploring age-related patterns in internet access: Insights from a secondary analysis of New Zealand survey data.Edgar Pacheco - 2024 - Media Peripheries 18 (1):38-56.
    About thirty years ago, when the Internet started to be commercialised, access to the medium became a topic of research and debate. Up-to-date evidence about key predictors, such as age, is crucial because of the Internet's ever-changing nature and the challenges associated with gaining access to it. This paper aims to give an overview of New Zealand's Internet access trends and how they relate to age. It is based on secondary analysis of data from a larger (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The internet: which future for organised knowledge, Frankenstein or Pygmalion? Part 1.Luciano Floridi - 1995 - International Journal of Human-Computer Studies 43 (2):261–274.
    The Internet is like a new country, with a growing population of millions of well educated citizens. If it wants to keep track of its own cultural achievements in real time, it will have to provide itself with an infostructure like a virtual National Library system. This paper proposes that institutions all over the world should take full advantage of the new technologies available, and promote and coordinate such a global service. This is essential in order to make possible (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  13. National Center for Biomedical Ontology: Advancing biomedicine through structured organization of scientific knowledge.Daniel L. Rubin, Suzanna E. Lewis, Chris J. Mungall, Misra Sima, Westerfield Monte, Ashburner Michael, Christopher G. Chute, Ida Sim, Harold Solbrig, M. A. Storey, Barry Smith, John D. Richter, Natasha Noy & Mark A. Musen - 2006 - Omics: A Journal of Integrative Biology 10 (2):185-198.
    The National Center for Biomedical Ontology is a consortium that comprises leading informaticians, biologists, clinicians, and ontologists, funded by the National Institutes of Health (NIH) Roadmap, to develop innovative technology and methods that allow scientists to record, manage, and disseminate biomedical information and knowledge in machine-processable form. The goals of the Center are (1) to help unify the divergent and isolated efforts in ontology development by promoting high quality open-source, standards-based tools to create, manage, and use ontologies, (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  17. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. The National Center for Biomedical Ontology.Mark A. Musen, Natalya F. Noy, Nigam H. Shah, Patricia L. Whetzel, Christopher G. Chute, Margaret-Anne Story & Barry Smith - 2012 - Journal of the American Medical Informatics Association 19 (2):190-195.
    The National Center for Biomedical Ontology is now in its seventh year. The goals of this National Center for Biomedical Computing are to: create and maintain a repository of biomedical ontologies and terminologies; build tools and web services to enable the use of ontologies and terminologies in clinical and translational research; educate their trainees and the scientific community broadly about biomedical ontology and ontology-based technology and best practices; and collaborate with a variety of groups who develop and use (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Enabling posthumous medical data donation: an appeal for the ethical utilisation of personal health data.Jenny Krutzinna, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 25 (5):1357-1387.
    This article argues that personal medical data should be made available for scientific research, by enabling and encouraging individuals to donate their medical records once deceased, similar to the way in which they can already donate organs or bodies. This research is part of a project on posthumous medical data donation developed by the Digital Ethics Lab at the Oxford Internet Institute at the University of Oxford. Ten arguments are provided to support the need to foster posthumous (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Enabling posthumous medical data donation: a plea for the ethical utilisation of personal health data.Luciano Floridi, Mariarosaria Taddeo & Jenny Krutzinna - 2019 - In Peter Dabrock, Matthias Braun & Patrik Hummel (eds.), The Ethics of Medical Data Donation. Springer Verlag.
    This article argues that personal medical data should be made available for scientific research, by enabling and encouraging individuals to donate their medical records once deceased, in a way similar to how they can already donate organs or bodies. This research is part of a project on posthumous medical data donation developed by the Digital Ethics Lab at the Oxford Internet Institute. Ten arguments are provided to support the need to foster posthumous medical data donation. Two (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Cultura e Internet: Actividad de extensión vinculada al análisis del sitio web del Teatro Solís.Esther Hochsztain & Carolina Asuaga - 2008 - I Jornadas de Extensión Del Area Social, 2008.
    La actividad de extensión que se presenta está vinculada al Teatros Solís, principal referente de la cultura montevideana. Trata sobre el estudio de la conducta del usuario al momento de la visita al sitio web del Teatro. El análisis se efectúa por medio de Web Usage Mining que consiste en la aplicación de técnicas de Data Mining para la identificación de patrones de uso de dicho sitio web. Se utiliza software de uso público y se diseña e implementa en (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The relationship between future self-continuity and intention to use Internet wealth management: The mediating role of tolerance of uncertainty and trait anxiety.Rongzhao Wang, Xuanxuan Lin, Zetong Ye, Hua Gao & Jianrong Liu - 2022 - Frontiers in Psychology 13:939508.
    This study aimed to analyze the mediating effect of tolerance of uncertainty (TU) and trait anxiety (TA) on future self-continuity (FSC) and intention to use Internet wealth management (IUIWM) systems. A questionnaire survey was distributed online and a total of 388 participants completed questionnaire, The questionnaire included the following scales: Chinese version of the FSC, Intention to Use the Internet Wealth Management, TU, and TA. Pearson correlation was used to investigate the correlation coefficient between variables while the sequential (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Data and Afrofuturism: an emancipated subject?Aisha Paulina Lami Kadiri - 2021 - Internet Policy Review 10 (4):1-26.
    The concept of an individual, liberal data subject, who was traditionally at the centre of data protection efforts has recently come under scrutiny. At the same time, the particularly destructive effect of digital technology on Black people establishes the need for an analysis that not only considers but brings racial dimensions to the forefront. I argue that because Afrofuturism situates the Black struggle in persistent, yet continuously changing structural disparities and power relations, it offers a powerful departure point (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The National Center for Biomedical Ontology: Advancing Biomedicine through Structured Organization of Scientific Knowledge. Rubin - 2012 - Journal of the American Medical Informatics Association 19 (2):190-195.
    The National Center for Biomedical Ontology is now in its seventh year. The goals of this National Center for Biomedical Computing are to: create and maintain a repository of biomedical ontologies and terminologies; build tools and web services to enable the use of ontologies and terminologies in clinical and translational research; educate their trainees and the scientific community broadly about biomedical ontology and ontology-based technology and best practices; and collaborate with a variety of groups who develop and use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Gender, age and staff preparedness to adopt Internet tools for research sharing during Covid-19 in African varsities.Valentine Joseph Owan, Michael Ekpenyong Asuquo, Samuel Okpon Ekaette, Sana Aslam, Moses Eteng Obla & Mercy Valentine Owan - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 6133.
    This study assessed the partial as well as the collaborative impact of age and gender on academic staff preparedness to adopt Internet tools for research sharing in African universities during Covid-19. Although evidence abounds in the literature on gender and age as they affect relatively, scholars’ utilisation of digital tools for research communication, such studies did not examine scholars’ preparedness to adopt from a broad perspective of Africa. This study was conducted based on the argument that the preparedness of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Ethical Considerations and Science Diplomacy on Coronavirus Disease (Covid-19) Pandemic in Nigeria.Sotonye Big-Alabo & Remigius Achinike Obah - 2020 - Academic Leadership 21 (6):347-356.
    The study investigated ethical considerations and science diplomacy on coronavirus disease (Covid-19) pandemic in Nigeria. The outbreak of the coronavirus disease (Covid-19) in Nigeria has spread quickly to about 34 states out of the 36 states and over 5000 persons have tested positive as at the time of this research after the first index case of an Italian and there is a projection that in coming days and weeks the number of infected persons and states will increase. The study was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  90
    Social Implications of Big Data and Fog Computing.Jeremy Horne - 2018 - International Journal of Fog Computing 1 (2):50.
    In the last half century we have gone from storing data on 5-1/4 inch floppy diskettes to cloud and now fog computing. But one should ask why so much data is being collected. Part of the answer is simple in light of scientific projects but why is there so much data on us? Then, we ask about its “interface” through fog computing. Such questions prompt this chapter on the philosophy of big data and fog computing. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Disaster Data Centre—An Innovative Educational Tool for Disaster Reduction through Education in Schools.Lekkas Efthymis - 2014 - Journal of Power and Energy Engineering 2:25-40.
    During the last decades, mankind has suffered from devastation caused by natural disasters and technological accidents of increased frequency and children are among the most vulnerable population group, especially those attending school during times of disaster. The importance of education in promoting and enabling disaster risk reduction has already been identified by researchers. In this paper “Disaster Date Center (DDC)” is presented, a new, powerful and innovative tool for the study of and education on disasters. One noteworthy application of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Czech Republic: From the Center of Christendom to the Most Atheist Nation of the 21st Century. Part 1. The Persecuted Church: The Clandestine Catholic Church (Ecclesia Silentii) in Czechoslovakia During Communism 1948-1991.Scott Vitkovic - 2023 - Occasional Papers on Religion in Eastern Europe (Opree) 43 (1):18 - 59.
    This research examines the most important historical, political, economic, social, cultural, and religious factors before, during, and after the reign of Communism in Czechoslovakia from 1918 to 2021 and their effect on the extreme increase in atheism and decrease in Christianity, particularly Roman Catholicism, in the present-day Czech Republic. It devotes special attention to the role of the Clandestine Catholic Church (Ecclesia Silentii) and the changing policies of the Holy See vis-à-vis this Church, examining these policies' impact on the continuing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Professional variables and staff readiness to utilise internet-based channels for research communication in an Era of Covid-19.Valentine Joseph Owan, Levi Udochukwu Akah, Ogbeche Mary Mark & Moses Eteng Obla - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 5863.
    This study assessed the professional variables of academic staff in African varsities and their readiness to Utilise Internet-Based Channels for Research Communication in an era of Covid-19. Drawing from Maslow’s hierarchy of needs theory, the study was guided by four null hypotheses. The quantitative research method based on the virtual cross-sectional survey design was adopted. A total of 8,591 academics in African universities were the targeted demographic of this study. However, data were collected from a virtual snowball sample (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  87
    Real-Life Data of Neoadjuvant Chemotherapy in Breast Cancer: Aegean Region Experience.Atike Pınar Erdoğan, Ferhat Ekinci, Ahmet Özveren, Emine Bihter Eniseler, Bilgin Demir & Mustafa Şahbazlar - 2023 - European Journal of Therapeutics 29 (2):123-127.
    Objective: The use of neoadjuvant chemotherapy (NACT) in breast cancer is increasing. The management of locally advanced breast cancer differs due to the approach of the center to which the patient applied and the approach of the following physician. From this point of view, we aimed to evaluate the real life data of our region. -/- Methods: The study included 106 patients treated with neoadjuvant chemotherapy in the medical oncology clinic of two different university hospitals. Association between clinicopathological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  51
    The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  89
    REVISITING THE HUMAN RESOURCE AND MANAGEMENT PROGRAM OF THE EARLY YEARS LEARNING CENTER IN MANDALUYONG CITY.Fe Jocelyn G. Dioquino, Albert S. Billones, Ana Katrina S. Caldeira, Melanie Carl T. Espe & Alfredo G. Sy Jr - 2023 - Get International Research Journal 1 (2).
    This study sought to investigate the Human Resource and Management (HRM) Program of a preschool hereinafter referred to as the Early Years Learning Center (EYLC) in Mandaluyong City for purposes of this research study. This is a qualitative case study that delved particularly into the issue of employee retention, especially of seasoned teachers and staff of the subject learning center. It used the interview method to generate an in-depth analysis as it revisited its HRM Program. To triangulate the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Effectiveness of Enhanced Basic Education Information System (EBEIS)/ Learner Information System (LIS)Data and School Management.Alven Lopez & Rufino Lorejo - 2023 - International Journal of Interdisciplinary Organizational Studies 18 (1):689-707.
    Accessing reliable and accurate information is essential to the proliferation of information through various channels. This can help individuals make informed decisions and avoid misinformation or disinformation. In such a case, creating an online information system should be prioritized to provide available data and information for planning, budgeting, and allocating resources and operational targets. This study assessed the level of satisfaction with the usability of EBEIS/LIS data and school management by the Department of Education among public secondary schools (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Britchenko Igor. University as a core of e-learning ecosystem/Polishchuk Y., Kornyliuk A., Britchenko I.//14th conference reader, Prague: Center for Higher Education Studies Location: Microsoft, Prague, CZECH REPUBLIC Date: JUN 20-21, 2019. – P. 309-319.Igor Britchenko, Polishchuk Yevhenia & Kornyliuk Anna - 2019 - In 14th conference reader, Prague: Center for Higher Education Studies. Praga, Czechy: pp. 309-319.
    The concept and the main stakeholders of E-learning ecosystem are investigated at the article. University is regarded as a center of such ecosystem due to skilled knowledge providers and technical equipment availability. Studying different cases authors prove that higher educational institution plays a driver role in different projects, especially social start-up projects. Different models of partnership between universities and other stakeholders are considered. In authors’ opinion, one of the most perspective collaborative projects are in frame of “students – schoolchildren” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. M2M Networking Architecture for Data Transmission and Routing.Soujanya Ambala - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):59-63.
    We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server free and router free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases routing and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Information Systems Governance and Industry 4.0 - epistemology of data and semiotic methodologies of IS in digital ecosystems.Ângela Lacerda Nobre, Rogério Duarte & Marc Jacquinet - 2018 - Advances in Information and Communication Technology 527:311-312.
    Contemporary Information Systems management incorporates the need to make explicit the links between semiotics, meaning-making and the digital age. This focus addresses, at its core, pure rationality, that is, the capacity of human interpretation and of human inscription upon reality. Creating the new real, that is the motto. Humans are intrinsically semiotic creatures. Consequently, semiotics is not a choice or an option but something that works like a second skin, establishing limits and permeable linkages between: human thought and human's infinite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  43. The Browsing Subject: Phenomenology and the Internet on Pandemic Time.Hannibal Travis - manuscript
    Does browsing the world through a screen change a person, especially in the context of COVID-19? Recent studies indicate that self-care, psychological well-being, and empathy may suffer. The “Californian ideology” privileges expression of the self even as digital technology tends to interrupt the modern trend towards elaborating distinct selves via texts that convey knowledge. Meanwhile, digital browsing may be fracturing attention and empathy. -/- As these changes proceed, legislators react to a medical and social crisis. Relaxation of business, community (...), and school closures prevailed, under pressure from advocates of liberty, jobs, and pro-market economics. A rival set of regulatory reforms would prioritize fighting the virus and providing more relief to its victims as being forms of care for others. In the international domain, nationalist ideology and economic warfare intensify disparities in access to medical care, imported goods, and livelihoods. At stake is how best to take beings into care. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  44. OmniSearch: a semantic search system based on the Ontology for MIcroRNA Target Gene Interaction data.Huang Jingshan, Gutierrez Fernando, J. Strachan Harrison, Dou Dejing, Huang Weili, A. Blake Judith, Barry Smith, Eilbeck Karen, A. Natale Darren & Lin Yu - 2016 - Journal of Biomedical Semantics 7 (1):1.
    In recent years, sequencing technologies have enabled the identification of a wide range of non-coding RNAs (ncRNAs). Unfortunately, annotation and integration of ncRNA data has lagged behind their identification. Given the large quantity of information being obtained in this area, there emerges an urgent need to integrate what is being discovered by a broad range of relevant communities. To this end, the Non-Coding RNA Ontology (NCRO) is being developed to provide a systematically structured and precisely defined controlled vocabulary for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Understanding of Authorship by the Post Graduate Medical Students at a Center in Bangladesh.S. P. Lasker - 2021 - Bangladesh Journal of Bioethics 12 (1):25-34.
    Education on authorship was delivered and evaluated by pre test and post test questionnairen on 30 post graduate medical students at the Department of Anestheology, Dhaka Medical College, Bangladesh between January and June 2019 to understand the knowledge, skill and attitude of post graduate medical students on authorship. Result: Before intervention, majority (60%) of the students felt that who perform the research work should be the author of the article. But 40% students were divided and felt that who advised the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  90
    Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Attitude and Ethical Behaviors of Healthcare Providers as Antidotes of Health Service Consumer Satisfaction in Mgbuoshimini Primary Health Centre, Port Harcourt, Nigeria.Justina Ikpoko-Ore-Ebirien Dike Isaruk, Ikpoko-Ore-Ebirien Dike Isaruk & Deborah Thelma George - 2023 - Journal of Health, Applied Sciences and Management 6 (3):24-33.
    Health service consumers' satisfaction with the services they receive has been a challenge over the past decade, and this has been attributed to many factors that diverse scholars have investigated using different variables. In this study, the attitude and ethical behaviours of healthcare providers as antidotes to health service consumers' satisfaction in the Primary Health Centre at Mgbuoshimini, Port Harcourt, Nigeria, were investigated. A cross-sectional descriptive research design was used to select participants from pregnant women, nursing mothers, couples for family (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999