Results for 'internet data center'

982 found
Order:
  1. A Sustainability Improvement Strategy of Interconnected Data Centers Based on Dispatching Potential of Electric Vehicle Charging Stations.Xihao Wang, Xiaojun Wang, Yuqing Liu, Chun Xiao, Rongsheng Zhao, Ye Yang & Zhao Liu - 2022 - Sustainability 14 (11):6814.
    With the rapid development of information technology, the electricity consumption of Internet Data Centers (IDCs) increases drastically, resulting in considerable carbon emissions that need to be reduced urgently. In addition to the introduction of Renewable Energy Sources (RES), the joint use of the spatial migration capacity of IDC workload and the temporal flexibility of the demand of Electric Vehicle Charging Stations (EVCSs) provides an important means to change the carbon footprint of the IDC. In this paper, a sustainability (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  85
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly enhance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  89
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  95
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Ethical Considerations and Science Diplomacy on Coronavirus Disease (Covid-19) Pandemic in Nigeria.Sotonye Big-Alabo & Remigius Achinike Obah - 2020 - Academic Leadership 21 (6):347-356.
    The study investigated ethical considerations and science diplomacy on coronavirus disease (Covid-19) pandemic in Nigeria. The outbreak of the coronavirus disease (Covid-19) in Nigeria has spread quickly to about 34 states out of the 36 states and over 5000 persons have tested positive as at the time of this research after the first index case of an Italian and there is a projection that in coming days and weeks the number of infected persons and states will increase. The study was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Megadatele (Big Data) pe Internet.Sfetcu Nicolae - 2022 - It and C 1 (1):23-27.
    Termenul Big Data se referă la extragerea, manipularea și analiza unor seturi de date care sunt prea mari pentru a fi tratate în mod obișnuit. Din această cauză se utilizează software special și, în multe cazuri, și calculatoare și echipamente hardware special dedicate. În general la aceste date analiza se face statistic. Pe baza analizei datelor respective se fac de obicei predicții ale unor grupuri de persoane sau alte entități, pe baza comportamentului acestora în diverse situații și folosind tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Exploring age-related patterns in internet access: Insights from a secondary analysis of New Zealand survey data.Edgar Pacheco - 2024 - Media Peripheries 18 (1):38-56.
    About thirty years ago, when the Internet started to be commercialised, access to the medium became a topic of research and debate. Up-to-date evidence about key predictors, such as age, is crucial because of the Internet's ever-changing nature and the challenges associated with gaining access to it. This paper aims to give an overview of New Zealand's Internet access trends and how they relate to age. It is based on secondary analysis of data from a larger (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Enhancing Water Productivity of Alfalfa (Medicago Sativa) Under Centre Pivot Irrigation System.Amir Mustafa Abd Aldaim, Adam Bush Adam & Abdelmoneim Elamin Mohamed - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):24-30.
    Abstract: The objective of this study was to evaluate water productivity of alfalfa (Medicago sativa) under centre pivot irrigation system. The experimental works were conducted at three centre pivot irrigation projects (Indian, Arab Authority for Agricultural Investment and Development (AAAID) and Sedonix projects) located at Khartoum State during the period from April 2011 to April 2013. In each project, three irrigation systems were randomly selected for the study treatments. Crop water requirement was obtained using CROPWAT 8 computer model. The parameters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Attitude and Ethical Behaviors of Healthcare Providers as Antidotes of Health Service Consumer Satisfaction in Mgbuoshimini Primary Health Centre, Port Harcourt, Nigeria.Justina Ikpoko-Ore-Ebirien Dike Isaruk, Ikpoko-Ore-Ebirien Dike Isaruk & Deborah Thelma George - 2023 - Journal of Health, Applied Sciences and Management 6 (3):24-33.
    Health service consumers' satisfaction with the services they receive has been a challenge over the past decade, and this has been attributed to many factors that diverse scholars have investigated using different variables. In this study, the attitude and ethical behaviours of healthcare providers as antidotes to health service consumers' satisfaction in the Primary Health Centre at Mgbuoshimini, Port Harcourt, Nigeria, were investigated. A cross-sectional descriptive research design was used to select participants from pregnant women, nursing mothers, couples for family (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. (1 other version)The internet: which future for organised knowledge, Frankenstein or Pygmalion? Part 1.Luciano Floridi - 1995 - International Journal of Human-Computer Studies 43 (2):261–274.
    The Internet is like a new country, with a growing population of millions of well educated citizens. If it wants to keep track of its own cultural achievements in real time, it will have to provide itself with an infostructure like a virtual National Library system. This paper proposes that institutions all over the world should take full advantage of the new technologies available, and promote and coordinate such a global service. This is essential in order to make possible (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  18. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. National Center for Biomedical Ontology: Advancing biomedicine through structured organization of scientific knowledge.Daniel L. Rubin, Suzanna E. Lewis, Chris J. Mungall, Misra Sima, Westerfield Monte, Ashburner Michael, Christopher G. Chute, Ida Sim, Harold Solbrig, M. A. Storey, Barry Smith, John D. Richter, Natasha Noy & Mark A. Musen - 2006 - Omics: A Journal of Integrative Biology 10 (2):185-198.
    The National Center for Biomedical Ontology is a consortium that comprises leading informaticians, biologists, clinicians, and ontologists, funded by the National Institutes of Health (NIH) Roadmap, to develop innovative technology and methods that allow scientists to record, manage, and disseminate biomedical information and knowledge in machine-processable form. The goals of the Center are (1) to help unify the divergent and isolated efforts in ontology development by promoting high quality open-source, standards-based tools to create, manage, and use ontologies, (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. The divide between us: Internet access among people with and without disabilities in the post-pandemic era.Edgar Pacheco & Hannah Burgess - 2024 - Disability and Society 1:1-22.
    The COVID-19 pandemic highlighted the importance of internet access across various aspects of life, from remote work and online education to healthcare services and social connections. As we transition to a post-pandemic era, a pressing need arises to update our understanding of the multifaceted nature of internet access. This study is one of the first attempts to do so. Using survey data from New Zealand adult internet users (n=960), it compares internet connection types, frequency of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  22. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. The National Center for Biomedical Ontology.Mark A. Musen, Natalya F. Noy, Nigam H. Shah, Patricia L. Whetzel, Christopher G. Chute, Margaret-Anne Story & Barry Smith - 2012 - Journal of the American Medical Informatics Association 19 (2):190-195.
    The National Center for Biomedical Ontology is now in its seventh year. The goals of this National Center for Biomedical Computing are to: create and maintain a repository of biomedical ontologies and terminologies; build tools and web services to enable the use of ontologies and terminologies in clinical and translational research; educate their trainees and the scientific community broadly about biomedical ontology and ontology-based technology and best practices; and collaborate with a variety of groups who develop and use (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  83
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. (1 other version)Enabling posthumous medical data donation: an appeal for the ethical utilisation of personal health data.Jenny Krutzinna, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 25 (5):1357-1387.
    This article argues that personal medical data should be made available for scientific research, by enabling and encouraging individuals to donate their medical records once deceased, similar to the way in which they can already donate organs or bodies. This research is part of a project on posthumous medical data donation developed by the Digital Ethics Lab at the Oxford Internet Institute at the University of Oxford. Ten arguments are provided to support the need to foster posthumous (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The relationship between future self-continuity and intention to use Internet wealth management: The mediating role of tolerance of uncertainty and trait anxiety.Rongzhao Wang, Xuanxuan Lin, Zetong Ye, Hua Gao & Jianrong Liu - 2022 - Frontiers in Psychology 13:939508.
    This study aimed to analyze the mediating effect of tolerance of uncertainty and trait anxiety on future self-continuity and intention to use Internet wealth management systems. A questionnaire survey was distributed online and a total of 388 participants completed questionnaire, The questionnaire included the following scales: Chinese version of the FSC, Intention to Use the Internet Wealth Management, TU, and TA. Pearson correlation was used to investigate the correlation coefficient between variables while the sequential regression method was used (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. (1 other version)Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  71
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Gender, age and staff preparedness to adopt Internet tools for research sharing during Covid-19 in African varsities.Valentine Joseph Owan, Michael Ekpenyong Asuquo, Samuel Okpon Ekaette, Sana Aslam, Moses Eteng Obla & Mercy Valentine Owan - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 6133.
    This study assessed the partial as well as the collaborative impact of age and gender on academic staff preparedness to adopt Internet tools for research sharing in African universities during Covid-19. Although evidence abounds in the literature on gender and age as they affect relatively, scholars’ utilisation of digital tools for research communication, such studies did not examine scholars’ preparedness to adopt from a broad perspective of Africa. This study was conducted based on the argument that the preparedness of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  74
    Smart City and IoT Data Collection Leveraging Generative AI.Eric Garcia - manuscript
    The rapid urbanization of modern cities necessitates innovative approaches to data collection and integration for smarter urban management. With the Internet of Things (IoT) at the core of these advancements, the ability to efficiently gather, analyze, and utilize data becomes paramount. Generative Artificial Intelligence (AI) is revolutionizing data collection by enabling intelligent synthesis, anomaly detection, and real-time decision-making across interconnected systems. This paper explores how generative AI enhances IoT-driven data collection in smart cities, focusing on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Cultura e Internet: Actividad de extensión vinculada al análisis del sitio web del Teatro Solís.Esther Hochsztain & Carolina Asuaga - 2008 - I Jornadas de Extensión Del Area Social, 2008.
    La actividad de extensión que se presenta está vinculada al Teatros Solís, principal referente de la cultura montevideana. Trata sobre el estudio de la conducta del usuario al momento de la visita al sitio web del Teatro. El análisis se efectúa por medio de Web Usage Mining que consiste en la aplicación de técnicas de Data Mining para la identificación de patrones de uso de dicho sitio web. Se utiliza software de uso público y se diseña e implementa en (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. (1 other version)The Czech Republic: From the Center of Christendom to the Most Atheist Nation of the 21st Century. Part 1. The Persecuted Church: The Clandestine Catholic Church (Ecclesia Silentii) in Czechoslovakia During Communism 1948-1991.Scott Vitkovic - 2023 - Occasional Papers on Religion in Eastern Europe (Opree) 43 (1):18 - 59.
    This research examines the most important historical, political, economic, social, cultural, and religious factors before, during, and after the reign of Communism in Czechoslovakia from 1918 to 2021 and their effect on the extreme increase in atheism and decrease in Christianity, particularly Roman Catholicism, in the present-day Czech Republic. It devotes special attention to the role of the Clandestine Catholic Church (Ecclesia Silentii) and the changing policies of the Holy See vis-à-vis this Church, examining these policies' impact on the continuing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Data and Afrofuturism: an emancipated subject?Aisha Paulina Lami Kadiri - 2021 - Internet Policy Review 10 (4):1-26.
    The concept of an individual, liberal data subject, who was traditionally at the centre of data protection efforts has recently come under scrutiny. At the same time, the particularly destructive effect of digital technology on Black people establishes the need for an analysis that not only considers but brings racial dimensions to the forefront. I argue that because Afrofuturism situates the Black struggle in persistent, yet continuously changing structural disparities and power relations, it offers a powerful departure point (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Synthetic Health Data: Real Ethical Promise and Peril.Daniel Susser, Daniel S. Schiff, Sara Gerke, Laura Y. Cabrera, I. Glenn Cohen, Megan Doerr, Jordan Harrod, Kristin Kostick-Quenet, Jasmine McNealy, Michelle N. Meyer, W. Nicholson Price & Jennifer K. Wagner - 2024 - Hastings Center Report 54 (5):8-13.
    Researchers and practitioners are increasingly using machine‐generated synthetic data as a tool for advancing health science and practice, by expanding access to health data while—potentially—mitigating privacy and related ethical concerns around data sharing. While using synthetic data in this way holds promise, we argue that it also raises significant ethical, legal, and policy concerns, including persistent privacy and security problems, accuracy and reliability issues, worries about fairness and bias, and new regulatory challenges. The virtue of synthetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Social Implications of Big Data and Fog Computing.Jeremy Horne - 2018 - International Journal of Fog Computing 1 (2):50.
    In the last half century we have gone from storing data on 5-1/4 inch floppy diskettes to cloud and now fog computing. But one should ask why so much data is being collected. Part of the answer is simple in light of scientific projects but why is there so much data on us? Then, we ask about its “interface” through fog computing. Such questions prompt this chapter on the philosophy of big data and fog computing. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Professional variables and staff readiness to utilise internet-based channels for research communication in an Era of Covid-19.Valentine Joseph Owan, Levi Udochukwu Akah, Ogbeche Mary Mark & Moses Eteng Obla - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 5863.
    This study assessed the professional variables of academic staff in African varsities and their readiness to Utilise Internet-Based Channels for Research Communication in an era of Covid-19. Drawing from Maslow’s hierarchy of needs theory, the study was guided by four null hypotheses. The quantitative research method based on the virtual cross-sectional survey design was adopted. A total of 8,591 academics in African universities were the targeted demographic of this study. However, data were collected from a virtual snowball sample (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  75
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. REVISITING THE HUMAN RESOURCE AND MANAGEMENT PROGRAM OF THE EARLY YEARS LEARNING CENTER IN MANDALUYONG CITY.Fe Jocelyn G. Dioquino, Albert S. Billones, Ana Katrina S. Caldeira, Melanie Carl T. Espe & Alfredo G. Sy Jr - 2023 - Get International Research Journal 1 (2).
    This study sought to investigate the Human Resource and Management (HRM) Program of a preschool hereinafter referred to as the Early Years Learning Center (EYLC) in Mandaluyong City for purposes of this research study. This is a qualitative case study that delved particularly into the issue of employee retention, especially of seasoned teachers and staff of the subject learning center. It used the interview method to generate an in-depth analysis as it revisited its HRM Program. To triangulate the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. La situation professionnelle : entre invariance et perspective?Paul Olry - 2012 - Revue Phronesis 1 (1):68-84.
    This contribution is an invitation to consider the professional situation in a way that goes beyond a social meaning or a subjective approach. Understood as an intermediate object, the professional situation is studied as a result of tension between invariance and perspective. The data centre on the activity of counselors whose role is to guide farmers confronted with agro-environmental standards. This text brings into question on one hand the attributions qualifying the situation as «professional» and that attest to a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Britchenko Igor. University as a core of e-learning ecosystem/Polishchuk Y., Kornyliuk A., Britchenko I.//14th conference reader, Prague: Center for Higher Education Studies Location: Microsoft, Prague, CZECH REPUBLIC Date: JUN 20-21, 2019. – P. 309-319.Igor Britchenko, Polishchuk Yevhenia & Kornyliuk Anna - 2019 - In Igor Britchenko, Polishchuk Yevhenia & Kornyliuk Anna (eds.), 14th conference reader, Prague: Center for Higher Education Studies. Praga, Czechy: pp. 309-319.
    The concept and the main stakeholders of E-learning ecosystem are investigated at the article. University is regarded as a center of such ecosystem due to skilled knowledge providers and technical equipment availability. Studying different cases authors prove that higher educational institution plays a driver role in different projects, especially social start-up projects. Different models of partnership between universities and other stakeholders are considered. In authors’ opinion, one of the most perspective collaborative projects are in frame of “students – schoolchildren” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Disaster Data Centre—An Innovative Educational Tool for Disaster Reduction through Education in Schools.Lekkas Efthymis - 2014 - Journal of Power and Energy Engineering 2:25-40.
    During the last decades, mankind has suffered from devastation caused by natural disasters and technological accidents of increased frequency and children are among the most vulnerable population group, especially those attending school during times of disaster. The importance of education in promoting and enabling disaster risk reduction has already been identified by researchers. In this paper “Disaster Date Center (DDC)” is presented, a new, powerful and innovative tool for the study of and education on disasters. One noteworthy application of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Effectiveness of Enhanced Basic Education Information System (EBEIS)/ Learner Information System (LIS)Data and School Management.Alven Lopez & Rufino Lorejo - 2023 - International Journal of Interdisciplinary Organizational Studies 18 (1):689-707.
    Accessing reliable and accurate information is essential to the proliferation of information through various channels. This can help individuals make informed decisions and avoid misinformation or disinformation. In such a case, creating an online information system should be prioritized to provide available data and information for planning, budgeting, and allocating resources and operational targets. This study assessed the level of satisfaction with the usability of EBEIS/LIS data and school management by the Department of Education among public secondary schools (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Real-Life Data of Neoadjuvant Chemotherapy in Breast Cancer: Aegean Region Experience.Atike Pınar Erdoğan, Ferhat Ekinci, Ahmet Özveren, Emine Bihter Eniseler, Bilgin Demir & Mustafa Şahbazlar - 2023 - European Journal of Therapeutics 29 (2):123-127.
    Objective: The use of neoadjuvant chemotherapy (NACT) in breast cancer is increasing. The management of locally advanced breast cancer differs due to the approach of the center to which the patient applied and the approach of the following physician. From this point of view, we aimed to evaluate the real life data of our region. -/- Methods: The study included 106 patients treated with neoadjuvant chemotherapy in the medical oncology clinic of two different university hospitals. Association between clinicopathological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. M2M Networking Architecture for Data Transmission and Routing.Soujanya Ambala - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):59-63.
    We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server free and router free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases routing and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 982