Results for 'Blowfish Algorithm, Cloud Computing, Data Storage in Cloud, Linguistic Steganography, Two Levels Security'

987 found
Order:
  1.  27
    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment.Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu & Na Chen - 2021 - Complexity 2021:1-12.
    This article starts with the analysis of the existing electronic commerce system, summarizes its characteristics, and analyzes and solves its existing problems. Firstly, the characteristics of the relational database My Structured Query Language and the distributed database HBase are analyzed, their respective advantages and disadvantages are summarized, and the advantages and disadvantages of each are taken into account when storing data. My SQL is used to store structured business data in the system, while HBase is used to store (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  19
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  64
    Data barns, ambient intelligence and cloud computing: the tacit epistemology and linguistic representation of Big Data.Lisa Portmess & Sara Tower - 2015 - Ethics and Information Technology 17 (1):1-9.
    The explosion of data grows at a rate of roughly five trillion bits a second, giving rise to greater urgency in conceptualizing the infosphere and understanding its implications for knowledge and public policy. Philosophers of technology and information technologists alike who wrestle with ontological and epistemological questions of digital information tend to emphasize, as Floridi does, information as our new ecosystem and human beings as interconnected informational organisms, inforgs at home in ambient intelligence. But the linguistic and conceptual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  15
    Fog computing architectures for healthcare.Lisardo Prieto González, Corvin Jaedicke, Johannes Schubert & Vladimir Stantchev - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):334-349.
    Purpose The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment. Design/methodology/approach This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT project in Germany. A clearly outlined three-layer architecture, in the sense of Internet of Things, is presented. It provides the basis for integrating a broad range of sensors into smart (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  16
    Generative Linguistics and the Computational Level.Fintan Mallory - 2024 - Croatian Journal of Philosophy 24 (71):195-218.
    Generative linguistics is widely claimed to produce theories at the level of computation in the sense outlined by David Marr. Marr even used generative grammar as an example of a computational level theory. At this level, a theory specifi es a function for mapping one kind of information into another. How this function is computed is then specified at the algorithmic level before an account of how this is algorithm is realised by some physical system is presented at the implementation (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  10
    Improvement and Analysis of Semantic Similarity Algorithm Based on Linguistic Concept Structure.Shan Xiao, Cheng Di & Pei Li - 2021 - Complexity 2021:1-11.
    With the rapid development of information age, various social groups and corresponding institutions are producing a large amount of information data every day. For such huge data storage and identification, in order to manage such data more efficiently and reasonably, traditional semantic similarity algorithm emerges. However, the accuracy of the traditional semantic similarity algorithm is relatively low, and the convergence of corresponding algorithm is poor. Based on this problem, this paper starts with the conceptual structure of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  16
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  84
    The Algorithmic Level Is the Bridge Between Computation and Brain.Bradley C. Love - 2015 - Topics in Cognitive Science 7 (2):230-242.
    Every scientist chooses a preferred level of analysis and this choice shapes the research program, even determining what counts as evidence. This contribution revisits Marr's three levels of analysis and evaluates the prospect of making progress at each individual level. After reviewing limitations of theorizing within a level, two strategies for integration across levels are considered. One is top–down in that it attempts to build a bridge from the computational to algorithmic level. Limitations of this approach include insufficient (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  9.  18
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  5
    Model Organism Databases and Algorithms: A Computing Mechanism for Cross-species Research.Sim-Hui Tee - forthcoming - Foundations of Science:1-26.
    Model organism databases are used extensively for knowledge retrieval and knowledge sharing among biologists. With the invention of genome sequencing and protein profiling technologies, large amount of molecular data provides practical insights into the molecular study of model organisms. The knowledge-intensive characteristic of model organism databases provides a reference point for the comparative study of other species. In this paper, I argue that algorithms could be used to facilitate cross-species research. I emphasize the epistemic significance of algorithms in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  12.  31
    Student reflections on the value of a professionalism module.Lynda Holland - 2013 - Journal of Information, Communication and Ethics in Society 11 (1):19-30.
    PurposeThe purpose of this paper is to analyze written reflections of final year computing students taking a professionalism module that covered the social, legal, professional and ethical aspects of computing. Society's dependence on computers makes it essential that computing students, whose future work may involve the analysis, storage and security of private data, are capable of identifying ethical issues and of making reflective moral judgements. The capacity to make moral judgements has been linked to an ability to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  23
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  22
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  15
    A Novel Resource Productivity Based on Granular Neural Network in Cloud Computing.Farnaz Mahan, Seyyed Meysam Rozehkhani & Witold Pedrycz - 2021 - Complexity 2021:1-15.
    In recent years, due to the growing demand for computational resources, particularly in cloud computing systems, the data centers’ energy consumption is continually increasing, which directly causes price rise and reductions of resources’ productivity. Although many energy-aware approaches attempt to minimize the consumption of energy, they cannot minimize the violation of service-level agreements at the same time. In this paper, we propose a method using a granular neural network, which is used to model data processing. This method (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  14
    Design of intelligent acquisition system for moving object trajectory data under cloud computing.Ioan-Cosmin Mihai, Shaweta Khanna, Sudeep Asthana, Abhinav Asthana & Yang Zhang - 2021 - Journal of Intelligent Systems 30 (1):763-773.
    In order to study the intelligent collection system of moving object trajectory data under cloud computing, information useful to passengers and taxi drivers is collected from massive trajectory data. This paper uses cloud computing technology, through clustering algorithm and density-based DBSCAN algorithm combined with Map Reduce programming model and design trajectory clustering algorithm. The results show that based on the 8-day data of 15,000 taxis in Shenzhen, the characteristic time period is determined. The passenger hot (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  35
    The (Big) Data-security assemblage: Knowledge and critique.Tobias Blanke & Claudia Aradau - 2015 - Big Data and Society 2 (2).
    The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical intervention (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  18.  17
    Modelling with Words: Learning, Fusion, and Reasoning Within a Formal Linguistic Representation Framework.Jonathan Lawry - 2003 - Springer Verlag.
    Modelling with Words is an emerging modelling methodology closely related to the paradigm of Computing with Words introduced by Lotfi Zadeh. This book is an authoritative collection of key contributions to the new concept of Modelling with Words. A wide range of issues in systems modelling and analysis is presented, extending from conceptual graphs and fuzzy quantifiers to humanist computing and self-organizing maps. Among the core issues investigated are - balancing predictive accuracy and high level transparency in learning - scaling (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  49
    The Epistemological Consequences of Artificial Intelligence, Precision Medicine, and Implantable Brain-Computer Interfaces.Ian Stevens - 2024 - Voices in Bioethics 10.
    ABSTRACT I argue that this examination and appreciation for the shift to abductive reasoning should be extended to the intersection of neuroscience and novel brain-computer interfaces too. This paper highlights the implications of applying abductive reasoning to personalized implantable neurotechnologies. Then, it explores whether abductive reasoning is sufficient to justify insurance coverage for devices absent widespread clinical trials, which are better applied to one-size-fits-all treatments. INTRODUCTION In contrast to the classic model of randomized-control trials, often with a large number of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  31
    Data Augmentation: Using Channel-Level Recombination to Improve Classification Performance for Motor Imagery EEG.Yu Pei, Zhiguo Luo, Ye Yan, Huijiong Yan, Jing Jiang, Weiguo Li, Liang Xie & Erwei Yin - 2021 - Frontiers in Human Neuroscience 15.
    The quality and quantity of training data are crucial to the performance of a deep-learning-based brain-computer interface system. However, it is not practical to record EEG data over several long calibration sessions. A promising time- and cost-efficient solution is artificial data generation or data augmentation. Here, we proposed a DA method for the motor imagery EEG signal called brain-area-recombination. For the BAR, each sample was first separated into two ones by left/right brain channels, and the artificial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  38
    Performing Hypo-Linguistics.Minka Stoyanova & Lisa Park SoYoung - 2018 - Technoetic Arts 16 (1):63-73.
    Language is the original technological prosthesis mediating all transfer of human cognition. The relationships between language, communication and cognition have long been the subject of scientific, philosophic and linguistic inquiry. However, it is through contemporary advancements in neuroscience that we now have unprecedented access to the inner workings of the human brain. Particularly, consumer grade neural scanning technologies like the Muse headset allow non-scientists to view, manipulate and draw conclusions from data generated by their own neural processes. Hence, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  55
    Investigations into Information Semantics and Ethics of Computing.Gordana Dodig-Crnkovic - 2005 - Dissertation, Mälardalen
    The recent development of the research field of Computing and Philosophy has triggered investigations into the theoretical foundations of computing and information. This thesis consists of two parts which are the result of studies in two areas of Philosophy of Computing and Philosophy of Information regarding the production of meaning and the value system with applications. The first part develops a unified dual-aspect theory of information and computation, in which information is characterized as structure, and computation is the information dynamics. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  23.  65
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  24.  23
    IoT-enabled edge computing model for smart irrigation system.A. N. Sigappi & S. Premkumar - 2022 - Journal of Intelligent Systems 31 (1):632-650.
    Precision agriculture is a breakthrough in digital farming technology, which facilitates the application of precise and exact amount of input level of water and fertilizer to the crop at the required time for increasing the yield. Since agriculture relies on direct rainfall than irrigation and the prediction of rainfall date is easily available from web source, the integration of rainfall prediction with precision agriculture helps to regulate the water consumption in farms. In this work, an edge computing model is developed (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  16
    Performance Optimization of Cloud Data Centers with a Dynamic Energy-Efficient Resource Management Scheme.Yu Cui, Shunfu Jin, Wuyi Yue & Yutaka Takahashi - 2021 - Complexity 2021:1-18.
    As an advanced network calculation mode, cloud computing is becoming more and more popular. However, with the proliferation of large data centers hosting cloud applications, the growth of energy consumption has been explosive. Surveys show that a remarkable part of the large energy consumed in data center results from over-provisioning of the network resource to meet requests during peak demand times. In this paper, we propose a solution to this problem by constructing a dynamic energy-efficient resource (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  31
    Sculpting Computational‐Level Models.Mark Blokpoel - 2018 - Topics in Cognitive Science 10 (3):641-648.
    In this commentary, I advocate for strict relations between Marr's levels of analysis. Under a strict relationship, each level is exactly implemented by the subordinate level. This yields two benefits. First, it brings consistency for multilevel explanations. Second, similar to how a sculptor chisels away superfluous marble, a modeler can chisel a computational-level model by applying constraints. By sculpting the model, one restricts the set of possible algorithmic- and implementational-level theories.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  27.  15
    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television.Youwen Ma & Yi Wan - 2021 - Complexity 2021:1-10.
    Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. The method selects Hadoop open source cloud platform as the basis, combines the MapReduce distributed programming model and HDFS distributed file storage system and other key cloud computing technologies. In order to cope with different data processing needs of film and television industry, association analysis, cluster analysis, factor analysis, and K-mean + association analysis (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  42
    Two-Level Domain Adaptation Neural Network for EEG-Based Emotion Recognition.Guangcheng Bao, Ning Zhuang, Li Tong, Bin Yan, Jun Shu, Linyuan Wang, Ying Zeng & Zhichong Shen - 2021 - Frontiers in Human Neuroscience 14.
    Emotion recognition plays an important part in human-computer interaction. Currently, the main challenge in electroencephalogram -based emotion recognition is the non-stationarity of EEG signals, which causes performance of the trained model decreasing over time. In this paper, we propose a two-level domain adaptation neural network to construct a transfer model for EEG-based emotion recognition. Specifically, deep features from the topological graph, which preserve topological information from EEG signals, are extracted using a deep neural network. These features are then passed through (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker, Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  35
    Characterizing the perception of urban spaces from visual analytics of street-level imagery.Frederico Freitas, Todd Berreth, Yi-Chun Chen & Arnav Jhala - 2023 - AI and Society 38 (4):1361-1371.
    This project uses machine learning and computer vision techniques and a novel interactive visualization tool to provide street-level characterization of urban spaces such as safety and maintenance in urban neighborhoods. This is achieved by collecting and annotating street-view images, extracting objective metrics through computer vision techniques, and using crowdsourcing to statistically model the perception of subjective metrics such as safety and maintenance. For modeling human perception and scaling it up with a predictive algorithm, we evaluate perception predictions across two points (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  15
    Toward agent-based LSB image steganography system.Budoor Salem Edhah & Fatmah Abdulrahman Baothman - 2021 - Journal of Intelligent Systems 30 (1):903-919.
    In a digital communication environment, information security is mandatory. Three essential parameters used in the design process of a steganography algorithm are Payload, security, and fidelity. However, several methods are implemented in information hiding, such as Least Significant Bit (LBS), Discrete Wavelet Transform, Masking, and Discrete Cosine Transform. The paper aims to investigate novel steganography techniques based on agent technology. It proposes a Framework of Steganography based on agent for secret communication using LSB. The most common image steganography (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  10
    Source code obfuscation with genetic algorithms using LLVM code optimizations.Juan Carlos de la Torre, Javier Jareño, José Miguel Aragón-Jurado, Sébastien Varrette & Bernabé Dorronsoro - forthcoming - Logic Journal of the IGPL.
    With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems. If novel paradigm as confidential computing aims at protecting the data manipulated during the execution, obfuscating techniques (in particular at the source code level) remain a popular solution to conceal the purpose of a program or its logic without altering its functionality, thus (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  21
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  25
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri & Muhammad Ramzan Saeed - 2022 - Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  44
    The Cooper Storage Idiom.Gregory M. Kobele - 2018 - Journal of Logic, Language and Information 27 (2):95-131.
    Cooper storage is a widespread technique for associating sentences with their meanings, used in diverse linguistic and computational linguistic traditions. This paper encodes the data structures and operations of cooper storage in the simply typed linear \-calculus, revealing the rich categorical structure of a graded applicative functor. In the case of finite cooper storage, which corresponds to ideas in current transformational approaches to syntax, the semantic interpretation function can be given as a linear homomorphism (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  31
    Argumentation as a Speech Act: Two Levels of Analysis.Amalia Haro Marchal - 2023 - Topoi 42 (2):481-494.
    Following and extending Searle’s speech act theory, both Pragma-Dialectics and the Linguistic Normative Model of Argumentation characterize argumentation as an illocutionary act. In these models, the successful performance of an illocutionary act of arguing depends on the securing of uptake, an illocutionary effect that, according to the Searlean account, characterizes the successful performance of any illocutionary act. However, in my view, there is another kind of illocutionary effect involved in the successful performance of an illocutionary act of arguing, which (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  36
    Implicit offensiveness from linguistic and computational perspectives: A study of irony and sarcasm.Anna Bączkowska - 2023 - Lodz Papers in Pragmatics 19 (2):353-383.
    The aim of this paper is to shed some light on the linguistic concept of implicit offensiveness. On the one hand, implicitness will be juxtaposed with indirectness as the two concepts are not conceived of here as synonymous. On the other hand, a typology of offensiveness (vs offensive language and vs offendedness) will be proposed, as well as the overarching term ‘covert meaning’ that will span figurative implicitness and non-figurative implicitness. The gradability of various forms of covert meaning and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  14
    New Technology, Big Data and the Law.Marcelo Corrales Compagnucci, Mark Fenwick & Nikolaus Forgó (eds.) - 2017 - Singapore: Imprint: Springer.
    This edited collection brings together a series of interdisciplinary contributions in the field of Information Technology Law. The topics addressed in this book cover a wide range of theoretical and practical legal issues that have been created by cutting-edge Internet technologies, primarily Big Data, the Internet of Things, and Cloud computing. Consideration is also given to more recent technological breakthroughs that are now used to assist, and - at times - substitute for, human work, such as automation, robots, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  13
    Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing.Chenhua Zu - 2021 - Complexity 2021:1-11.
    This paper adopts Hadoop to build and test the storage and retrieval platform for painting resources. This paper adopts Hadoop as the platform and MapReduce as the computing framework and uses Hadoop Distributed Filesystem distributed file system to store massive log data, which solves the storage problem of massive data. According to the business requirements of the system, this paper designs the system according to the process of web text mining, mainly divided into log data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Quantum linguistics and Searle's Chinese room argument.J. M. Bishop, S. J. Nasuto & B. Coecke - 2013 - In Vincent Müller, Philosophy and Theory of Artificial Intelligence. Springer. pp. 17-29.
    Viewed in the light of the remarkable performance of ‘Watson’ - IBMs proprietary artificial intelligence computer system capable of answering questions posed in natural language - on the US general knowledge quiz show ‘Jeopardy’, we review two experiments on formal systems - one in the domain of quantum physics, the other involving a pictographic languaging game - whereby behaviour seemingly characteristic of domain understanding is generated by the mere mechanical application of simple rules. By re-examining both experiments in the context (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41. Quantum linguistics and Searle's Chinese room argument.J. M. Bishop, S. J. Nasuto & B. Coecke - 2013 - In Vincent Müller, Philosophy and Theory of Artificial Intelligence. Springer. pp. 17-29.
    Viewed in the light of the remarkable performance of ‘Watson’ - IBMs proprietary artificial intelligence computer system capable of answering questions posed in natural language - on the US general knowledge quiz show ‘Jeopardy’, we review two experiments on formal systems - one in the domain of quantum physics, the other involving a pictographic languaging game - whereby behaviour seemingly characteristic of domain understanding is generated by the mere mechanical application of simple rules. By re-examining both experiments in the context (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  28
    Locative alternation and two levels of verb meaning.Seizi Iwata - 2005 - Cognitive Linguistics 16 (2):355-407.
    Verbs likeloadorsprayare known to alternate between two variants (John sprayed paint onto the wall / John sprayed the wall with paint ). Both Rappaport and Levin (1988) and Pinker (1989) derive one variant from the other, but these lexical rule approaches have a number of problems. This paper argues for a form-meaning correspondence model which distinguishes between two levels of verb meaning: that of a lexical headsprayon the one hand and that of a phrasal constituentspray paint onto the wallorspray (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  16
    Quranic Reading Between the High-Level Chain of Transmission and Criticism of Grammarians.Sahar Husein Jarallah Almalki - 2023 - European Journal for Philosophy of Religion 15 (3):296-315.
    This research delves into a unique and vital aspect of addressing criticisms by some grammarians (al-nohaat) and interpreters against various continuous Quranic readings, focusing on the robustness of their transmission chains (isnad). These chains, often deemed weak by certain grammarians, are examined to understand how they reinforce the credibility of the readings, given the prevalent view that a solid transmission chain significantly minimizes errors in recitations. The data was collected through desk review of library sources, references, journal articles and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  10
    Anti-monopoly supervision model of platform economy based on big data and sentiment.Sihan Liu - 2022 - Frontiers in Psychology 13.
    With the advent of the cloud computing era, big data technology has also developed rapidly. Due to the huge volume, variety, fast processing speed and low value density of big data, traditional data storage, extraction, transformation and analysis technologies are not suitable, so new solutions for big data application technologies are needed. However, with the development of economic theory and the practice of market economy, some links in the industrial chain of natural monopoly industries (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  46. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  47. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  42
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  24
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  83
    Plausible reasoning and the resolution of quantifier scope ambiguities.Walid S. Saba & Jean-Pierre Corriveau - 2001 - Studia Logica 67 (2):271-289.
    Despite overwhelming evidence suggesting that quantifier scope is a phenomenon that must be treated at the pragmatic level, most computational treatments of scope ambiguities have thus far been a collection of syntactically motivated preference rules. This might be in part due to the prevailing wisdom that a commonsense inferencing strategy would require the storage of and reasoning with a vast amount of background knowledge. In this paper we hope to demonstrate that the challenge in developing a commonsense inferencing strategy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 987