Results for 'storage'

132 found
Order:
  1. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  66
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Carbon capture and storage: where should the world store CO₂? It’s a moral dilemma.Kian Mintz-Woo - 2021 - The Conversation.
    [Newspaper opinion] To give carbon storage sites the greatest chance of success, it makes sense to develop them in places where the geology has been thoroughly explored and where there is lots of relevant expertise. This would imply pumping carbon into underground storage sites in northern Europe, the Middle East and the US, where companies have spent centuries looking for and extracting fossil fuels. On the other hand, it might be important to develop storage sites in economies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Why and Where to Fund Carbon Capture and Storage.Kian Mintz-Woo & Joe Lane - 2021 - Science and Engineering Ethics 27 (6):70.
    This paper puts forward two claims about funding carbon capture and storage. The first claim is that there are moral justifications supporting strategic investment into CO2 storage from global and regional perspectives. One argument draws on the empirical evidence which suggests carbon capture and storage would play a significant role in a portfolio of global solutions to climate change; the other draws on Rawls' notion of legitimate expectations and Moellendorf's Anti-Poverty principle. The second claim is that where (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  81
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  75
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  72
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  89
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  11.  85
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  69
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  71
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  14.  40
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. UTILIZATION OF A DUAL-AXIS SOLAR TRACKER TO INCREASE THE EFFECTIVENESS OF SOLAR PANELS IN THE STORAGE OF POWER IN LITHIUM-ION BATTERIES.Geodizon Iman C. Bermudez, Joanna Patricia U. Develleres, Danniah Shamella N. Palao, Kate Aileen M. Gromia, Rainer Jade T. Daingan & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    This study was conducted to determine the effectiveness of utilizing the Dual-axis Solar Tracker in harnessing solar energy and storing it in lithium-ion batteries in terms of voltage and milliamps per hour gained. This study utilized two solar panel systems, the Static Solar Panel System and the Dual-Axis Solar Tracker and aimed to prove the significant difference generated by solar panel systems in terms of voltage and milliamps per hour. This study employed an Applied Experimental Research Design utilizing Arduino Uno, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Fragmentation of Belief.Joseph Bendana & Eric Mandelbaum - 2021 - In Cristina Borgoni, Dirk Kindermann & Andrea Onofri (eds.), The Fragmented Mind. Oxford: Oxford University Press.
    Belief storage is often modeled as having the structure of a single, unified web. This model of belief storage is attractive and widely assumed because it appears to provide an explanation of the flexibility of cognition and the complicated dynamics of belief revision. However, when one scrutinizes human cognition, one finds strong evidence against a unified web of belief and for a fragmented model of belief storage. Using the best available evidence from cognitive science, we develop this (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  18. Disappearing women, vanishing ladies and property in embryos.Donna Dickenson - 2017 - International Journal of Law and the Biosciences 4:1-6.
    Guidelines on embryo storage prioritise 'respect for the embryo' above the wishes of the women whose labour and tissue have gone into creating the embryo in the first place, effectively making women and the female body disappear. In this article I draw a parallel between this phenomenon relating to embryo storage and other instances of a similar phenomenon that I have called 'the lady vanishes', particularly in stem cell and 'mitochondrial transfer' research. I suggest that a modified property (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. How the Cognitive Science of Belief Can Transform the Study of Mental Health.Eric Mandelbaum & Nicolas Porot - 2023 - JAMA Psychiatry.
    The cognitive science of belief is a burgeoning field, with insights ranging from detailing the fundamental structure of the mind, to explaining the spread of fake news. Here we highlight how new insights into belief acquisition, storage, and change can transform our understanding of psychiatric disorders. Although we focus on monothematic delusions, the conclusions apply more broadly. -/- .
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  57
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The NET effect: Negative emissions technologies and the need–efficiency trade-off.Kian Mintz-Woo - 2023 - Global Sustainability 6:e5.
    Non-technical summary: -/- When developing and deploying negative emissions technologies (NETs), little attention has been paid to where. On the one hand, one might develop NETs where they are likely to contribute most to global mitigation targets, contributing to a global climate solution. On the other hand, one might develop NETs where they can help support development on a regional basis, justified by regional demands. I defend these arguments and suggest that they reflect the values of efficiency and responding to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Is Experience Stored in the Brain? A Current Model of Memory and the Temporal Metaphysic of Bergson.Stephen Robbins - 2021 - Axiomathes 31:15-43.
    In discussion on consciousness and the hard problem, there is an unquestioned background assumption, namely, our experience is stored in the brain. Yet Bergson (1896) argued that this very question, “Is experience stored in the brain?” is the critical issue in the problem of consciousness. His examination of then-current memory research led him, save for motor or procedural memory, to a “no” answer. Others, for example Sheldrake (2012), have continued this negative assessment of the research findings. So, has this assumption (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. What memory is.Stan Klein - 2015 - WIREs Cognitive Science 6 (1):1-38.
    I argue that our current practice of ascribing the term “ memory ” to mental states and processes lacks epistemic warrant. Memory, according to the “received view”, is any state or process that results from the sequential stages of encoding, storage and retrieval. By these criteria, memory, or its footprint, can be seen in virtually every mental state we are capable of having. This, I argue, stretches the term to the breaking point. I draw on phenomenological, historical and conceptual (...)
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  25. Logical ignorance and logical learning.Richard Pettigrew - 2020 - Synthese 198 (10):9991-10020.
    According to certain normative theories in epistemology, rationality requires us to be logically omniscient. Yet this prescription clashes with our ordinary judgments of rationality. How should we resolve this tension? In this paper, I focus particularly on the logical omniscience requirement in Bayesian epistemology. Building on a key insight by Hacking :311–325, 1967), I develop a version of Bayesianism that permits logical ignorance. This includes: an account of the synchronic norms that govern a logically ignorant individual at any given time; (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  26. Polysemy and word meaning: an account of lexical meaning for different kinds of content words.Agustin Vicente - 2018 - Philosophical Studies 175 (4):947-968.
    There is an ongoing debate about the meaning of lexical words, i.e., words that contribute with content to the meaning of sentences. This debate has coincided with a renewal in the study of polysemy, which has taken place in the psycholinguistics camp mainly. There is already a fruitful interbreeding between two lines of research: the theoretical study of lexical word meaning, on the one hand, and the models of polysemy psycholinguists present, on the other. In this paper I aim at (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  27. Thermal Performance of MEMS-Based Heat Exchanger with Micro-Encapsulated PCM Slurry.Samira Mehravar - 2014 - Journal of Power and Energy Engineering 2:15-22.
    Latent heat thermal energy storage technique has demonstrate to be a better engineering option mainly due to its benefit of supplying higher energy storage density in a smaller temperature difference between retrieval and storage. For this purpose, a micro electro-mechanical system, MEMS-based heat exchanger with microencapsulated PCM (MEPCM) slurry as cold fluid, has been simulated three dimensionally. This work investigates the influence of using MEPCM-slurry on the temperature of the cold and hot fluids. The MEPCM and water (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Opening the doors of memory: Is declarative memory a natural kind?Kourken Michaelian - 2015 - Wiley Interdisciplinary Reviews 6 (6):475-482.
    Klein's target article argues that autonoetic consciousness is a necessary condition for memory; this unusually narrow view of the scope of memory implies that only episodic memory is, strictly speaking, memory. The narrow view is opposed to the standard broad view, on which causal connection with past experience is sufficient for memory; on the broad view, both declarative (i.e., episodic and semantic) and procedural memory count as genuine forms of memory. Klein mounts a convincing attack on the broad view, arguing (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  29. (1 other version)The science of belief: A progress report.Nicolas Porot & Eric Mandelbaum - forthcoming - WIREs Cognitive Science 1.
    The empirical study of belief is emerging at a rapid clip, uniting work from all corners of cognitive science. Reliance on belief in understanding and predicting behavior is widespread. Examples can be found, inter alia, in the placebo, attribution theory, theory of mind, and comparative psychological literatures. Research on belief also provides evidence for robust generalizations, including about how we fix, store, and change our beliefs. Evidence supports the existence of a Spinozan system of belief fixation: one that is automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  30. Big data and their epistemological challenge.Luciano Floridi - 2012 - Philosophy and Technology 25 (4):435-437.
    Between 2006 and 2011, humanity accumulated 1,600 EB of data. As a result of this growth, there is now more data produced than available storage. This article explores the problem of “Big Data,” arguing for an epistemological approach as a possible solution to this ever-increasing challenge.
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  31. Which is better for the Earth: Nature-based versus human-made solution?Minh-Hoang Nguyen, Viet-Phuong La & Quan-Hoang Vuong - manuscript
    As global warming is gradually pushing the Earth to the climate tipping point, the reduction of CO2 concentration in the atmosphere has become more urgent than ever. Many high-tech methods, such as Carbon Capture and Storage (CCS) technologies, have been proposed as crucial tools in the fight against climate change. However, this paper argues that the expensiveness and uncertainty of CCS technologies make them not feasibly deployed. Persistent investment in these technologies also reinforces the outdated eco-deficit mindset that prioritizes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. AI training data, model success likelihood, and informational entropy-based value.Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    Since the release of OpenAI's ChatGPT, the world has entered a race to develop more capable and powerful AI, including artificial general intelligence (AGI). The development is constrained by the dependency of AI on the model, quality, and quantity of training data, making the AI training process highly costly in terms of resources and environmental consequences. Thus, improving the effectiveness and efficiency of the AI training process is essential, especially when the Earth is approaching the climate tipping points and planetary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Neurological Disease Ontology.Mark Jensen, Alexander P. Cox, Naveed Chaudhry, Marcus Ng, Donat Sule, William Duncan, Patrick Ray, Bianca Weinstock-Guttman, Barry Smith, Alan Ruttenberg, Kinga Szigeti & Alexander D. Diehl - 2013 - Journal of Biomedical Semantics 4 (42):42.
    We are developing the Neurological Disease Ontology (ND) to provide a framework to enable representation of aspects of neurological diseases that are relevant to their treatment and study. ND is a representational tool that addresses the need for unambiguous annotation, storage, and retrieval of data associated with the treatment and study of neurological diseases. ND is being developed in compliance with the Open Biomedical Ontology Foundry principles and builds upon the paradigm established by the Ontology for General Medical Science (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. Understanding memories of a near-death experience from the perspective of quantum entanglement and in the presence of the supernatural.Contzen Pereira & Janice Harter - 2016 - Journal of Metaphysics and Connected Consciousness 2.
    Near-death experiences are a big challenge to the fields of science and philosophy; termed as hallucinatory by neurologists and “stuff of which fantasies are made off” by sceptics, there are some unique near-death experiences which defy these claims. Memories generated during these experiences are of specific interest as they are created without a body and can be recalled post the experience. Call it the mind, soul, psyche or consciousness, if deliberated as a form of quantum generated energy, a strong correlation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Strategies for scope taking (1997).Anna Szabolcsi - 1997 - In Ways of Scope Taking. Kluwer Academic Publishers.
    Standard theories of scope are semantically blind. They employ a single logico-syntactic rule of scope assignment quantifying in Quantifier Raising, storage, or type change etc which roughly speaking prefixes an expression \aplha.
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  36. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith (eds.), Integration of Intelligence Data through Semantic Enhancement. CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of data sources, types, models, and (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  37. Heidegger and Stiegler on failure and technology.Ruth Irwin - 2020 - Educational Philosophy and Theory 52 (4):361-375.
    Heidegger argues that modern technology is quantifiably different from all earlier periods because of a shift in ethos from in situ craftwork to globalised production and storage at the behest of consumerism. He argues that this shift in technology has fundamentally shaped our epistemology, and it is almost impossible to comprehend anything outside the technological enframing of knowledge. The exception is when something breaks down, and the fault ‘shows up’ in fresh ways. Stiegler has several important addendums to Heidegger’s (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Without a Trace: Why did Corona Apps Fail?Lucie White & Philippe van Basshuysen - 2021 - Journal of Medical Ethics 47 (12):1-4.
    At the beginning of the COVID-19 pandemic, high hopes were put on digital contact tracing, using mobile phone apps to record and immediately notify contacts when a user reports as infected. Such apps can now be downloaded in many countries, but as second waves of COVID-19 are raging, these apps are playing a less important role than anticipated. We argue that this is because most countries have opted for app configurations that cannot provide a means of rapidly informing users of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  39. Toward a Truly Social Epistemology: Babbage, the Division of Mental Labor, and the Possibility of Socially Distributed Warrant.Joseph Shieber - 2011 - Philosophy and Phenomenological Research 86 (2):266-294.
    In what follows, I appeal to Charles Babbage’s discussion of the division of mental labor to provide evidence that—at least with respect to the social acquisition, storage, retrieval, and transmission of knowledge—epistemologists have, for a broad range of phenomena of crucial importance to actual knowers in their epistemic practices in everyday life, failed adequately to appreciate the significance of socially distributed cognition. If the discussion here is successful, I will have demonstrated that a particular presumption widely held within the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  40. Beirut Blast: A port city in crisis.Asma Mehan & Maurice Jansen - 2020 - The Port City Futures Blog.
    On 4th of August 2020, the Lebanese capital and port city, Beirut, was rocked by a massive explosion that has killed hundreds and injured thousands more, ravaging the heart of the city’s nearby downtown business district and neighbouring housing areas, where more than 750,000 people live. The waterfront neighbourhood and a number of dense residential neighbourhoods in the city’s eastern part were essentially flattened. Lebanese Government officials believe that the blast was caused by around 2,700 tonnes of ammonium nitrate stored (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. How not to build a tourism city.Asma Mehan, Pouria Jahanshad & Mahziar Mehan - 2023 - 360Info.
    Despite its aesthetic appeal, the Iranian resort Majara is poised to be a sore point among local residents. Looking at the 200 vibrant oddly-shaped domes might make you feel you’re on a Wes Anderson movie set.The Majara Residence overlooking the Persian Gulf offers homes and resort-like accommodation, complete with cafes, restaurants, souvenir shops, tourist information, a prayer room, laundry, storage and more. Located at Hormuz (or Ormuz) Island, a historic port off the southern coast of Iran, the project is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. The rational dynamics of implicit thought.Brett Karlan - 2021 - Australasian Journal of Philosophy 100 (4):774-788.
    Implicit attitudes are mental states posited by psychologists to explain behaviors including implicit racial and gender bias. In this paper I investigate the belief view of the implicit attitudes, on which implicit attitudes are a kind of implicit belief. In particular, I focus on why implicit attitudes, if they are beliefs, are often resistant to updating in light of new evidence. I argue that extant versions of the belief view do not give a satisfactory account of this phenomenon. This is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Genome Informatics: The Role of DNA in Cellular Computations.James A. Shapiro - 2006 - Biological Theory 1 (3):288-301.
    Cells are cognitive entities possessing great computational power. DNA serves as a multivalent information storage medium for these computations at various time scales. Information is stored in sequences, epigenetic modifications, and rapidly changing nucleoprotein complexes. Because DNA must operate through complexes formed with other molecules in the cell, genome functions are inherently interactive and involve two-way communication with various cellular compartments. Both coding sequences and repetitive sequences contribute to the hierarchical systemic organization of the genome. By virtue of nucleoprotein (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  44. Pharmacogenetics: the bioethical problem of DNA investment banking.Oonagh P. Corrigan & Bryn Williams-Jones - 2004 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 37 (3):550-565.
    Concern about the ethics of clinical drug trials research on patients and healthy volunteers has been the subject of significant ethical analysis and policy development—protocols are reviewed by Research Ethics Committees and subjects are protected by informed consent procedures. More recently attention has begun to be focused on DNA banking for clinical and pharmacogenetics research. It is, however, surprising how little attention has been paid to the commercial nature of such research, or the unique issues that present when subjects are (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Economic Cycles, Crises, and the Global Periphery.Leonid Grinin, Arno Tausch & Andrey Korotayev (eds.) - 2016 - Switzerland: Springer International Publishing Switzerland.
    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. life More Photographic; mapping the networked image.Daniel Rubinstein - 2008 - photographies 1 (1):9-28.
    Twenty two years since the arrival of the first consumer digital camera (Tatsuno 36) Western culture is now characterised by ubiquitous photography. The disappearance of the camera inside the mobile phone has ensured that even the most banal moments of the day can become a point of photographic reverie, potentially shared instantly. Supported by the increased affordability of computers, digital storage and access to broadband, consumers are provided with new opportunities for the capture and transmission of images, particularly online (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  47. The Neoclassical Interpretation of Modern Physics and it Implications for an Information Based Interpretation of Spirituality.Shiva Meucci - 2015 - Cosmos and History 11 (2):8-27.
    The neoclassical interpretation of quantum mechanics which re-introduces older conceptual models of gravity and electromagnetism transformed by modern advancements in the field is discussed as a natural outcome from the interchangeability of quantum mechanics and fluid dynamics in light of recent macro-level experiments which show behaviors previously believed to be confined to the quantum world. This superfluid model of mechanics and the known behaviors of superfluids is suggested as a possible substrate and system for the storage and processing of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The transition to civilization and symbolically stored genomes.Jon Beach - 2003 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 34 (1):109-141.
    The study of culture and cultural selection from a biological perspective has been hampered by the lack of any firm theoretical basis for how the information for cultural traits is stored and transmitted. In addition, the study of any living system with a decentralized or multi-level information structure has been somewhat restricted due to the focus in genetics on the gene and the particular hereditary structure of multicellular organisms. Here a different perspective is used, one which regards living systems as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. (1 other version)Referent Tracking for Command and Control Messaging Systems.Shahid Manzoor, Werner Ceusters & Barry Smith - 2009 - CEUR, Volume 555.
    The Joint Battle Management Language (JBML) is an XML-based language designed to allow Command and Control (C2) systems to interface easily with Modeling and Simulation (M&S) systems. While some of the XML-tags defined in this language correspond to types of entities that exist in reality, others are mere syntactic artifacts used to structure the messages themselves. Because these two kinds of tags are not formally distinguishable, JBML messages in effect confuse data with what the data represent. In this paper we (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Biodiversity and Biocollections: Problem of Correspondence.Igor Pavlinov - 2016 - In Pavlinov Igor (ed.), Aspects of Biodiversity. KMK Sci Press. pp. 733-786.
    This text is an English translation of those several sections of the original paper in Russian, where collection-related issues are considered. The full citation of the original paper is as following: Pavlinov I.Ya. 2016. [Bioraznoobrazie i biokollektsii: problema sootvetstvia]. In: Pavlinov I.Ya. (comp.). Aspects of Biodiversity. Archives of Zoological Museum of Lomonosov Moscow State University, Vol. 54, Pр. 733–786. -/- Orientation of biology, as a natural science, on the study and explanation of the similarities and differences between organisms led in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 132