Results for 'Cloud computing'

1000+ found
Order:
  1. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  26
    Cloud Computing : The Next Generation of Outsourcing.Undefined Gartner - 2010 - Analysis:1-17.
    We are in the midst of a fundamental shift, as more enterprises start to use services enabled by cloud technologies. This will heavily impact IT services providers, who must now consider strategies for coping with profound changes in the marketplace or risk being left behind. This research will be of interest to IT services vendors, as well as consumers of IT services.
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Cloud computing assessment for students' social presence in relation to satisfaction and perceived learning.Marva Mirabolghasemi, Noorminshah A. Iahad & Sahar Hosseinikhah Choshaly - 2018 - In A. V. Senthil Kumar (ed.), Optimizing student engagement in online learning environments. Hershey, PA: Information Science Reference.
     
    Export citation  
     
    Bookmark  
  5. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  6.  20
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  38
    The Role of Cloud Computing in Managing the Deluge of Potentially Private Genetic Data.Dov Greenbaum & Mark Gerstein - 2011 - American Journal of Bioethics 11 (11):39-41.
    The American Journal of Bioethics, Volume 11, Issue 11, Page 39-41, November 2011.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  8
    Personal data in cloud computing: Organizational informationrisk perception.Samir Husić - 2015 - Inquiry: Sarajevo Journal of Social Sciences 1.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  23
    Establishing a Cloud Computing Success Model for Hospitals in Taiwan.Jiunn-Woei Lian - 2017 - Inquiry: The Journal of Health Care Organization, Provision, and Financing 54:004695801668583.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  9
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  8
    Design of intelligent acquisition system for moving object trajectory data under cloud computing.Ioan-Cosmin Mihai, Shaweta Khanna, Sudeep Asthana, Abhinav Asthana & Yang Zhang - 2021 - Journal of Intelligent Systems 30 (1):763-773.
    In order to study the intelligent collection system of moving object trajectory data under cloud computing, information useful to passengers and taxi drivers is collected from massive trajectory data. This paper uses cloud computing technology, through clustering algorithm and density-based DBSCAN algorithm combined with Map Reduce programming model and design trajectory clustering algorithm. The results show that based on the 8-day data of 15,000 taxis in Shenzhen, the characteristic time period is determined. The passenger hot spot (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  13
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  9
    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment.Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu & Na Chen - 2021 - Complexity 2021:1-12.
    This article starts with the analysis of the existing electronic commerce system, summarizes its characteristics, and analyzes and solves its existing problems. Firstly, the characteristics of the relational database My Structured Query Language and the distributed database HBase are analyzed, their respective advantages and disadvantages are summarized, and the advantages and disadvantages of each are taken into account when storing data. My SQL is used to store structured business data in the system, while HBase is used to store unstructured data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  7
    Supervision method of indoor construction engineering quality acceptance based on cloud computing.Jian Zhang - 2022 - Journal of Intelligent Systems 31 (1):795-805.
    As an important part of Chinese economy, the construction industry has a great contribution to the economy, and plays an important role in the Chinese economic development. Therefore, it has certain research significance for the quality acceptance supervision method of construction engineering. This article takes Shenzhen S project as an example, combined with cloud computing, discusses the quality acceptance and supervision methods of indoor construction projects. In the introduction to the technical part, this article first briefly introduces the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  7
    A Novel Resource Productivity Based on Granular Neural Network in Cloud Computing.Farnaz Mahan, Seyyed Meysam Rozehkhani & Witold Pedrycz - 2021 - Complexity 2021:1-15.
    In recent years, due to the growing demand for computational resources, particularly in cloud computing systems, the data centers’ energy consumption is continually increasing, which directly causes price rise and reductions of resources’ productivity. Although many energy-aware approaches attempt to minimize the consumption of energy, they cannot minimize the violation of service-level agreements at the same time. In this paper, we propose a method using a granular neural network, which is used to model data processing. This method identifies (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  5
    Emergency Scheduling Optimization Simulation of Cloud Computing Platform Network Public Resources.Dingrong Liu, Zhigang Yao & Liukui Chen - 2021 - Complexity 2021:1-11.
    Emergency scheduling of public resources on the cloud computing platform network can effectively improve the network emergency rescue capability of the cloud computing platform. To schedule the network common resources, it is necessary to generate the initial population through the Hamming distance constraint and improve the objective function as the fitness function to complete the emergency scheduling of the network common resources. The traditional method, from the perspective of public resource fairness and priority mapping, uses incremental (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  51
    Data barns, ambient intelligence and cloud computing: the tacit epistemology and linguistic representation of Big Data.Lisa Portmess & Sara Tower - 2015 - Ethics and Information Technology 17 (1):1-9.
    The explosion of data grows at a rate of roughly five trillion bits a second, giving rise to greater urgency in conceptualizing the infosphere and understanding its implications for knowledge and public policy. Philosophers of technology and information technologists alike who wrestle with ontological and epistemological questions of digital information tend to emphasize, as Floridi does, information as our new ecosystem and human beings as interconnected informational organisms, inforgs at home in ambient intelligence. But the linguistic and conceptual representations of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  11
    Multilayer Architecture Model for Mobile Cloud Computing Paradigm.Higinio Mora, Francisco J. Mora Gimeno, María Teresa Signes-Pont & Bruno Volckaert - 2019 - Complexity 2019:1-13.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  7
    Research on parallel data processing of data mining platform in the background of cloud computing.Lijun Wu, Haiyan Xing, Hui Zhang & Lingrui Bu - 2021 - Journal of Intelligent Systems 30 (1):479-486.
    The efficient processing of large-scale data has very important practical value. In this study, a data mining platform based on Hadoop distributed file system was designed, and then K-means algorithm was improved with the idea of max-min distance. On Hadoop distributed file system platform, the parallelization was realized by MapReduce. Finally, the data processing effect of the algorithm was analyzed with Iris data set. The results showed that the parallel algorithm divided more correct samples than the traditional algorithm; in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  9
    Optimization of the Marketing Management System Based on Cloud Computing and Big Data.Lin Zhang - 2021 - Complexity 2021:1-10.
    With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications. The “big data” era is a challenge and chance for companies and has a great impact on social economy, politics, culture, and people’s lives. An accurate marketing system is developed based on J2EE, and the architecture is selected from the user layer, business logic layer, and data layer and the B/S3 layer application, including three layers of crip-dm and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  33
    Close Reading with Computers: Genre Signals, Parts of Speech, and David Mitchell’s Cloud Atlas.Martin Paul Eve - 2017 - Substance 46 (3):76-104.
    Reading literature with the aid of computational techniques is controversial. For some, digital approaches apparently fetishize the curation of textual archives, lack interpretative rigor, and are thoroughly ’neoliberal’ in their pursuit of Silicon Valley-esque software-tool production. For others, the potential benefits of amplifying reading-labor-power through non-consumptive use of book corpora fulfills the dreams of early twentieth-century Russian formalism and yields new, distant ways in which we can consider textual pattern-making (Jockers; Moretti, Distant Reading; Moretti...
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  42
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the user—the data (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. The downdraft in convective shower-cloud a numerical computation.Takao Takeda - 1965 - In Karl W. Linsenmann (ed.), Proceedings. St. Louis, Lutheran Academy for Scholarship. pp. 45--30.
     
    Export citation  
     
    Bookmark  
  26.  44
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Thinking in the Cloud: The Cognitive Incorporation of Cloud-Based Technology.Robert Clowes - 2015 - Philosophy and Technology 28 (2):261-296.
    Technologies and artefacts have long played a role in the structure of human memory and our cognitive lives more generally. Recent years have seen an explosion in the production and use of a new regime of information technologies that might have powerful implications for our minds. Electronic-Memory, powerful, portable and wearable digital gadgetry and “the cloud” of ever-present data services allow us to record, store and access an ever-expanding range of information both about and of relevance to our lives. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   35 citations  
  28.  11
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  4
    Performance Optimization of Cloud Data Centers with a Dynamic Energy-Efficient Resource Management Scheme.Yu Cui, Shunfu Jin, Wuyi Yue & Yutaka Takahashi - 2021 - Complexity 2021:1-18.
    As an advanced network calculation mode, cloud computing is becoming more and more popular. However, with the proliferation of large data centers hosting cloud applications, the growth of energy consumption has been explosive. Surveys show that a remarkable part of the large energy consumed in data center results from over-provisioning of the network resource to meet requests during peak demand times. In this paper, we propose a solution to this problem by constructing a dynamic energy-efficient resource management (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  28
    Lockbox: mobility, privacy and values in cloud storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31. A Study on Fog Computing Environment Mobility and Migration.R. J. Pedro - 2018 - 22nd International Conference Electronics 22.
    Cloud Computing paradigm has reached a high degree of popularity among all kinds of computer users, but it may not be suitable for mobile devices as they need computing power to be as close as possible to data sources in order to reduce delays. This paper focuses on achieving mathematical models for users moving around and proposes an overlay mobility model for Fog Data Centres based on traditional wireless mobility models aimed at better allocating edge computing (...)
     
    Export citation  
     
    Bookmark  
  32.  82
    Performance Modeling of Load Balancing Techniques in Cloud: Some of the Recent Competitive Swarm Artificial Intelligence-based.Jeremy Pitt, B. Sathish Babu & K. Bhargavi - 2020 - Journal of Intelligent Systems 30 (1):40-58.
    Cloud computing deals with voluminous heterogeneous data, and there is a need to effectively distribute the load across clusters of nodes to achieve optimal performance in terms of resource usage, throughput, response time, reliability, fault tolerance, and so on. The swarm intelligence methodologies use artificial intelligence to solve computationally challenging problems like load balancing, scheduling, and resource allocation at finite time intervals. In literature, sufficient works are being carried out to address load balancing problem in the cloud (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  7
    Fog computing architectures for healthcare.Lisardo Prieto González, Corvin Jaedicke, Johannes Schubert & Vladimir Stantchev - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):334-349.
    Purpose The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment. Design/methodology/approach This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT project in Germany. A clearly outlined three-layer architecture, in the sense of Internet of Things, is presented. It provides the basis for integrating a broad range of sensors into (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  23
    Faces in the Clouds: A New Theory of Religion.Stewart Elliott Guthrie - 1993 - Oxford University Press USA.
    Religion is universal human culture. No phenomenon is more widely shared or more intensely studied, yet there is no agreement on what religion is. Now, in Faces in the Clouds, anthropologist Stewart Guthrie provides a provocative definition of religion in a bold and persuasive new theory. Guthrie says religion can best be understood as systematic anthropomorphism--that is, the attribution of human characteristics to nonhuman things and events. Many writers see anthropomorphism as common or even universal in religion, but few think (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  14
    Intelligent Computation Offloading for IoT Applications in Scalable Edge Computing Using Artificial Bee Colony Optimization.Mohammad Babar, Muhammad Sohail Khan, Ahmad Din, Farman Ali, Usman Habib & Kyung Sup Kwak - 2021 - Complexity 2021:1-12.
    Most of the IoT-based smart systems require low latency and crisp response time for their applications. Achieving the demand of this high Quality of Service becomes quite challenging when computationally intensive tasks are offloaded to the cloud for execution. Edge computing therein plays an important role by introducing low network latency, quick response, and high bandwidth. However, offloading computations at a large scale overwhelms the edge server with many requests and the scalability issue originates. To address the above (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  6
    Understanding the Complex Adoption Behavior of Cloud Services by SMEs Based on Complexity Theory: A Fuzzy Sets Qualitative Comparative Analysis.Ge Zhang, Weijie Wang & Yikai Liang - 2021 - Complexity 2021:1-17.
    To survive in a competitive environment, small and medium enterprises have had to adapt to the digital environment in order to adjust to customer needs globally, particularly in the post-COVID-19 world. The advantages of cloud computing provide opportunities for SMEs with a restricted budget and limited resources. To understand how SMEs adopt cloud computing in a complex digital environment, this study examines how antecedents combine with each other to explain the high adoption of cloud (...). From the perspectives of holism and set theory, we draw on complexity and configuration theories, present a conceptual model including seven antecedents based on the technology-organization-environment framework, and conduct an asymmetric fuzzy-set qualitative comparative analysis. Through an empirical study with 123 Chinese companies, we identify nine combinations of determinant antecedents that lead to the high adoption of cloud computing. The results show that none of the factors are indispensable to explain a high adoption on their own; instead, they are insufficient but necessary parts of the causal combinations that explain a high adoption. This study contributes to the literature on cloud computing adoption by extending current knowledge on how antecedents combine to increase the adoption and identify specific patterns of SMEs for whom these factors are essential and greatly influence their adoption. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  6
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for social security funds (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  8
    Ethics of Quantum Computing: an Outline.Luca M. Possati - 2023 - Philosophy and Technology 36 (3):1-21.
    This paper intends to contribute to the emerging literature on the ethical problems posed by quantum computing and quantum technologies in general. The key ethical questions are as follows: Does quantum computing pose new ethical problems, or are those raised by quantum computing just a different version of the same ethical problems raised by other technologies, such as nanotechnologies, nuclear plants, or cloud computing? In other words, what is new in quantum computing from an (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  39.  21
    The First Droplet in a Cloud Chamber Track.Jonathan F. Schonfeld - 2021 - Foundations of Physics 51 (2):1-18.
    In a cloud chamber, the quantum measurement problem amounts to explaining the first droplet in a charged-particle track; subsequent droplets are explained by Mott’s 1929 wave-theoretic argument about collision-induced wavefunction collimation. I formulate a mechanism for how the first droplet in a cloud chamber track arises, making no reference to quantum measurement axioms. I look specifically at tracks of charged particles emitted in the simplest slow decays, because I can reason about rather than guess the form that wave (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  15
    In silico vs. Over the Clouds: On-the-Fly Mental State Estimation of Aircraft Pilots, Using a Functional Near Infrared Spectroscopy Based Passive-BCI.Thibault Gateau, Hasan Ayaz & Frédéric Dehais - 2018 - Frontiers in Human Neuroscience 12:319696.
    There is growing interest for implementing tools to monitor cognitive performance in naturalistic work and everyday life settings. The emerging field of research, known as neuroergonomics, promotes the use of wearable and portable brain monitoring sensors such as functional near infrared spectroscopy (fNIRS) to investigate cortical activity in a variety of human tasks out of the laboratory. The objective of this study was to implement an on-line passive fNIRS-based brain computer interface to discriminate two levels of working memory load during (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  41.  67
    Identity management in GRID computing and Service Oriented Architectures: research and practice. [REVIEW]Theodora Varvarigou & Vassiliki Andronikou - 2009 - Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  42.  11
    Optimization of Internet of Things E-Commerce Logistics Cloud Service Platform Based on Mobile Communication.Jun Chen, Huan Wu, Xi Zhou, Maoguo Wu, Chenyang Zhao & Shiyan Xu - 2021 - Complexity 2021:1-11.
    E-commerce conceivable future trade, consumption, and service is a new digital employer mode. Therefore, in order to decorate the customary natural environment of operation, it is quintessential to get rid of the preferred desktop in the true field, create a social logistics and transportation administration computing device with commodity agents and distributors as the key features, and mix freight logistics, business enterprise approach waft and data waft advertising and marketing, and advertising and marketing organically. The notion of e-commerce logistics (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  4
    The Domestication of Language: Cultural Evolution and the Uniqueness of the Human Animal.Daniel Cloud - 2014 - Cambridge University Press.
    Language did not evolve only in the distant past. Our shared understanding of the meanings of words is ever-changing, and we make conscious, rational decisions about which words to use and what to mean by them every day. Applying Charles Darwin's theory of "unconscious artificial selection" to the evolution of linguistic conventions, Daniel Cloud suggests a new, evolutionary explanation for the rich, complex, and continually reinvented meanings of our words. The choice of which words to use and in which (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  15
    Students' Performances in Computer Programming of Higher Education for Sustainable Development: The Effects of a Peer-Evaluation System.Tsung-Chih Hsiao, Ya-Hsueh Chuang, Tzer-Long Chen, Chien-Yun Chang & Chih-Cheng Chen - 2022 - Frontiers in Psychology 13.
    Modern education attaches great importance to interdisciplinary skills, among which computational thinking is a core element, and heralds a new era. IT application has shaped education in the 21st century. Computational thinking has provided further impetus for building an all-encompassing social network and fostering a DIY culture enabled by digital technologies. One empirical study used four apps to test children's development in computational thinking and fluency. The article will help students overcome their fears of coding. Peer reviews provide students with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  15
    IoT-enabled edge computing model for smart irrigation system.A. N. Sigappi & S. Premkumar - 2022 - Journal of Intelligent Systems 31 (1):632-650.
    Precision agriculture is a breakthrough in digital farming technology, which facilitates the application of precise and exact amount of input level of water and fertilizer to the crop at the required time for increasing the yield. Since agriculture relies on direct rainfall than irrigation and the prediction of rainfall date is easily available from web source, the integration of rainfall prediction with precision agriculture helps to regulate the water consumption in farms. In this work, an edge computing model is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Dalla produzione al progetto.Cccloud Casalgrande Ceramic Cloud - forthcoming - Techne.
  47.  11
    Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing.Jie Liu & Li Zhu - 2021 - Complexity 2021:1-11.
    Resource allocation has always been a key technology in wireless sensor networks, but most of the traditional resource allocation algorithms are based on single interface networks. The emergence and development of multi-interface and multichannel networks solve many bottleneck problems of single interface and single channel networks, it also brings new opportunities to the development of wireless sensor networks, but the multi-interface and multichannel technology not only improves the performance of wireless sensor networks but also brings great challenges to the resource (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Gefangnisse im romischen Reich. J-U Krause.J. Cloud - 1999 - The Classical Review 49 (1):187-188.
     
    Export citation  
     
    Bookmark  
  49. Hidden in plain sight: the CORONA reconnaissance satellite programme and clandestine Cold War science.John Cloud - 2001 - Annals of Science 58 (2):203-209.
    No categories
     
    Export citation  
     
    Bookmark  
  50.  4
    It's not my fault: the no~excuse plan for overcoming life's obstacles.Henry Cloud - 2007 - Nashville: Thomas Nelson. Edited by John Sims Townsend.
    Eight principles to take responsibility for your life"--Provided by publisher.
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000