Journal articles on the topic 'Other information and computing sciences'

To see the other types of publications on this topic, follow the link: Other information and computing sciences.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Other information and computing sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dong, Wen, Shi Qiao, Jia Li Mao, and Miao Yue. "The High Performance Computing of Inversion Algorithms." Advanced Materials Research 791-793 (September 2013): 1145–48. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1145.

Full text
Abstract:
The inverse problem is an important interdisciplinary subject, which receives more and more attention in the fields of mathematics, computer science, information science and other applied natural sciences in recent years. Nowadays, the inverse problem is more and more commonly applied than before, e.g., in image processing and geophysics. This trend promotes the development of both the advanced computing methods and high performance computing techniques. The high performance of computing problems for inverse algorithms is discussed in this paper, which is meaningful for the research of applied inversion subjects.
APA, Harvard, Vancouver, ISO, and other styles
2

Paul, P. K., R. R. Sinha, P. S. Aithal, Ricardo Saavedra, and Bashiru Aremu. "Agro Informatics with Reference to Features, Functions and Emergence as a Discipline in Agricultural Sciences: An Analysis." Asian Review of Civil Engineering 9, no. 1 (May 5, 2020): 23–31. http://dx.doi.org/10.51983/tarce-2020.9.1.2290.

Full text
Abstract:
There are many interdisciplinary subjects worldwide and this trend is growing rapidly. Among these subjects, one of the important is Agricultural Information Science. Information Science deals with the nature of Interdisciplinary Sciences and also falls under the category of Applied Sciences. The field is very much synonymously and treated as equal to Informatics in some countries. The branch therefore also called as Agro Informatics and consists with both practicing nature and as a field of study. The applications of IT and Computing in other subjects and areas led to the development of other subjects such as Bio Informatics, Geo Informatics, Health Informatics, etc. Agricultural Informatics is growing rapidly and emerging as a field internationally in many countries. IT and computing applications in different areas, sectors and subjects including societal areas are considered as Information Science. Thus, Agricultural Informatics is socially connected or touched. Thus, the applications of Computing including the latest technologies in agriculture and allied areas treated as Agricultural Informatics. Though it is the application of more than technologies and includes the techniques, methodologies, procedure, etc into Agriculture. Agricultural Informatics is the analysis, management and processing of agricultural data with the help of IT Systems. Agriculture is also an interdisciplinary field and responsible for cultivating or producing the food, feed, fiber, corn, various plants, vegetables including the domesticated animals with scientific methods. Agricultural Informatics is therefore an interdisciplinary area combines with both Agricultural Sciences and allied areas with IT & Computing. This paper is theoretical as well as conceptual in nature and deals with mainly various aspects of Agricultural Informatics viz. foundation, nature and characteristics, role and functions in detail. It also briefly explores about the stakeholders and technologies of Agro Informatics.
APA, Harvard, Vancouver, ISO, and other styles
3

Paulz, P. K., R. R. Sinha, P. S. Aithal, Ricardo Saavedra, and Bashiru Aremu. "Agro Informatics with Reference to Features, Functions and Emergence as a Discipline in Agricultural Sciences: An Analysis." Asian Journal of Information Science and Technology 10, no. 1 (May 5, 2020): 41–50. http://dx.doi.org/10.51983/ajist-2020.10.1.298.

Full text
Abstract:
There are many interdisciplinary subjects worldwide and this trend is growing rapidly. Among these subjects, one of the important is Agricultural Information Science. Information Science deals with the nature of Interdisciplinary Sciences and falls under the category of Applied Sciences. The field is very much synonymously and treated as equal to Informatics in some countries. The branch therefore also called as Agro Informatics and consists with both practicing nature and as a field of study. The applications of IT and Computing in other subjects and areas led to the development of other subjects such as Bio Informatics, Geo Informatics, Health Informatics, etc. Agricultural Informatics is growing rapidly and emerging as a field internationally in many countries. IT and computing applications in different areas, sectors and subjects including societal areas are considered as Information Science. Thus, Agricultural Informatics is socially connected or touched. Thus, the applications of Computing including the latest technologies in agriculture and allied areas treated as Agricultural Informatics. Though it is the application of more than technologies and includes the techniques, methodologies, procedure, etc into Agriculture. Agricultural Informatics is the analysis, management, and processing of agricultural data with the help of IT Systems. Agriculture is also an interdisciplinary field and responsible for cultivating or producing the food, feed, fiber, corn, various plants, vegetables including the domesticated animals with scientific methods. Agricultural Informatics is therefore an interdisciplinary area combines with both Agricultural Sciences and allied areas with IT & Computing. This paper is theoretical as well as conceptual in nature and deals with mainly various aspects of Agricultural Informatics viz. foundation, nature and characteristics, role and functions in detail. It also briefly explores about the stakeholders and technologies of Agro Informatics.
APA, Harvard, Vancouver, ISO, and other styles
4

Dodig-Crnkovic, G. "Natural morphological computation as foundation of learning to learn in humans, other living organisms, and intelligent machines." Philosophical Problems of Information Technologies and Cyberspace, no. 1 (July 14, 2021): 4–34. http://dx.doi.org/10.17726/philit.2021.1.1.

Full text
Abstract:
The emerging contemporary natural philosophy provides a common ground for the integrative view of the natural, the artificial, and the human-social knowledge and practices. Learning process is central for acquiring, maintaining, and managing knowledge, both theoretical and practical. This paper explores the relationships between the present advances in understanding of learning in the sciences of the artificial (deep learning, robotics), natural sciences (neuroscience, cognitive science, biology), and philosophy (philosophy of computing, philosophy of mind, natural philosophy). The question is, what at this stage of the development the inspiration from nature, specifically its computational models such as info-computation through morphological computing, can contribute to machine learning and artificial intelligence, and how much on the other hand models and experiments in machine learning and robotics can motivate, justify, and inform research in computational cognitive science, neurosciences, and computing nature. We propose that one contribution can be understanding of the mechanisms of ‘learning to learn’, as a step towards deep learning with symbolic layer of computation/information processing in a framework linking connectionism with symbolism. As all natural systems possessing intelligence are cognitive systems, we describe the evolutionary arguments for the necessity of learning to learn for a system to reach humanlevel intelligence through evolution and development. The paper thus presents a contribution to the epistemology of the contemporary philosophy of nature.
APA, Harvard, Vancouver, ISO, and other styles
5

Dodig-Crnkovic, Gordana. "Natural Morphological Computation as Foundation of Learning to Learn in Humans, Other Living Organisms, and Intelligent Machines." Philosophies 5, no. 3 (September 1, 2020): 17. http://dx.doi.org/10.3390/philosophies5030017.

Full text
Abstract:
The emerging contemporary natural philosophy provides a common ground for the integrative view of the natural, the artificial, and the human-social knowledge and practices. Learning process is central for acquiring, maintaining, and managing knowledge, both theoretical and practical. This paper explores the relationships between the present advances in understanding of learning in the sciences of the artificial (deep learning, robotics), natural sciences (neuroscience, cognitive science, biology), and philosophy (philosophy of computing, philosophy of mind, natural philosophy). The question is, what at this stage of the development the inspiration from nature, specifically its computational models such as info-computation through morphological computing, can contribute to machine learning and artificial intelligence, and how much on the other hand models and experiments in machine learning and robotics can motivate, justify, and inform research in computational cognitive science, neurosciences, and computing nature. We propose that one contribution can be understanding of the mechanisms of ‘learning to learn’, as a step towards deep learning with symbolic layer of computation/information processing in a framework linking connectionism with symbolism. As all natural systems possessing intelligence are cognitive systems, we describe the evolutionary arguments for the necessity of learning to learn for a system to reach human-level intelligence through evolution and development. The paper thus presents a contribution to the epistemology of the contemporary philosophy of nature.
APA, Harvard, Vancouver, ISO, and other styles
6

Paul, P. K., R. R. Sinha, Pappachan Baby, K. S. Shivraj, Bashiru Aremu, and S. Mewada. "Agricultural Informatics as a Branch of Study in Information Sciences and Technology Domain-A Proposal towards Digital Agriculture." International Journal of World Policy and Development Studies, no. 66 (August 8, 2020): 56–65. http://dx.doi.org/10.32861/ijwpds.66.56.65.

Full text
Abstract:
Agricultural Informatics is a valuable domain in the field of interdisciplinary sciences. This is responsible for the applications of Information Technology, Computing and similar technologies into the agricultural activities. This is the combination of Agricultural Science and Information Sciences. The field due to technological nature is much closed with the Agricultural Engineering or Agricultural Technology. There are many allied and similar nomenclature of the fields but all of these are primarily responsible for the same purpose. The field is rapidly increasing in recent past and most practiced in the developed nation. However, in developing countries as well Agricultural Informatics becomes an emerging field of practice and growing rapidly. Agricultural Informatics is growing both in pre and post agricultural activity. This branch is considered as branch of Information Sciences & Technology due to its technological applications in the field of agriculture and allied areas. Information Sciences are the broadest field within the allied branches and growing rapidly. Agricultural Informatics educational programs have started in recent past in different level and stream of education viz. science and technology. However within the broad periphery of Information Sciences it could be offered in other streams and under the wide variety of Information Sciences. This paper is broad and interdisciplinary in nature and deals with the aspects of the Information Sciences and Technology including features, nature, scope and also the potentialities in respect of Agricultural Informatics.
APA, Harvard, Vancouver, ISO, and other styles
7

Paul, P. K., R. R. Sinha, Pappachan Baby, K. S. Shivraj, Bashiru Aremu, and S. Mewada. "Agricultural Informatics as a Branch of Study in Information Sciences and Technology Domain: A Proposal towards Digital Agriculture." Asian Journal of Science and Applied Technology 9, no. 1 (May 5, 2020): 1–9. http://dx.doi.org/10.51983/ajsat-2020.9.1.1054.

Full text
Abstract:
Agricultural Informatics is an important and valuable domain in the field of interdisciplinary sciences. This is responsible for the applications of Information Technology, Computing, and similar technologies into the agricultural activities. This is the combination of Agricultural Science and Information Sciences. The field due to technological nature is very closed with the Agricultural Engineering or Agricultural Technology. There are many allied and similar nomenclature of the fields, but all of these are primarily responsible for the same purpose. The field is rapidly increasing in recent past and most practiced in the developed nation. However, in developing countries as well Agricultural Informatics becomes an emerging field of practice and growing rapidly. Agricultural Informatics is growing both in pre and post agricultural activity. This branch is considered as branch of Information Sciences & Technology due to its technological applications in the field of agriculture and allied areas. Information Sciences are the broadest field within the allied branches and growing rapidly. Agricultural Informatics educational programs have started in recent past in different level and stream of education viz. science and technology. However, within the broad periphery of Information Sciences it could be offered in other streams and under the wide variety of Information Sciences. This paper is broad and interdisciplinary in nature and deals with the aspects Information Sciences including features, basic role, Information Sciences and Technology, including features, nature, scope and also the potentialities in respect of Agricultural Informatics.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Arun, Alin Deutsch, Amarnath Gupta, Yannis Papakonstantinou, Babak Salimi, and Victor Vianu. "Database Education at UC San Diego." ACM SIGMOD Record 51, no. 3 (November 21, 2022): 43–46. http://dx.doi.org/10.1145/3572751.3572763.

Full text
Abstract:
We are in the golden age of data-intensive computing. CS is now the largest major in most US universities. Data Science, ML/AI, and cloud computing have been growing rapidly. Many new data-centric job categories are taking shape in industry, e.g., data scientists, ML engineers, analytics engineers, and data associates. The DB/data management/data systems area is naturally a central part of all these transformations. Thus, the DB community must keep evolving and innovating to fulfill the need for DB education in all its facets, including its intersection with other areas such as ML, systems, HCI, various domain sciences, etc., as well as bridging the gap with practice and industry.
APA, Harvard, Vancouver, ISO, and other styles
9

Dong, Wen, and Tao Sun. "Comparison of Tikhonov Regularization and Adaptive Regularization for III-Posed Problems." Applied Mechanics and Materials 380-384 (August 2013): 1193–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1193.

Full text
Abstract:
nverse problems are important interdisciplinary subject, which receive more and more attention in recent years in the areas of mathematics, computer science, information science and other applied natural sciences. There is close relationship between inverse problems and ill-posedness. Regularization is an important strategy when computing the ill-posed problems to maintain the stability of the computation.This paper compares a new regularization method,which is called Adaptive regularization, with the traditional Tikhonov regularization method. The conclusion that Adaptive regularization method is a stronger regularization method than the traditional Tikhonov regularization method can be made by computing some numerical examples.
APA, Harvard, Vancouver, ISO, and other styles
10

Garcia, Paulo, Francine Darroch, Leah West, and Lauren BrooksCleator. "Ethical Applications of Big Data-Driven AI on Social Systems: Literature Analysis and Example Deployment Use Case." Information 11, no. 5 (April 26, 2020): 235. http://dx.doi.org/10.3390/info11050235.

Full text
Abstract:
The use of technological solutions to address the production of goods and offering of services is ubiquitous. Health and social issues, however, have only slowly been permeated by technological solutions. Whilst several advances have been made in health in recent years, the adoption of technology to combat social problems has lagged behind. In this paper, we explore Big Data-driven Artificial Intelligence (AI) applied to social systems; i.e., social computing, the concept of artificial intelligence as an enabler of novel social solutions. Through a critical analysis of the literature, we elaborate on the social and human interaction aspects of technology that must be in place to achieve such enabling and address the limitations of the current state of the art in this regard. We review cultural, political, and other societal impacts of social computing, impact on vulnerable groups, and ethically-aligned design of social computing systems. We show that this is not merely an engineering problem, but rather the intersection of engineering with health sciences, social sciences, psychology, policy, and law. We then illustrate the concept of ethically-designed social computing with a use case of our ongoing research, where social computing is used to support safety and security in home-sharing settings, in an attempt to simultaneously combat youth homelessness and address loneliness in seniors, identifying the risks and potential rewards of such a social computing application.
APA, Harvard, Vancouver, ISO, and other styles
11

Paul, P. K., A. Bhuimali, and P. S. Aithal. "Role of Economics and Allied Sciences into Information and Computing Fields: Emphasizing Economics & IT Programs—World and Indian Context." IRA-International Journal of Management & Social Sciences (ISSN 2455-2267) 10, no. 1 (February 5, 2018): 36. http://dx.doi.org/10.21013/jmss.v10.n1.p4.

Full text
Abstract:
<p>Information Technology is an important and interdisciplinary field of fields. Information Technology is applicable in almost all the areas of Sciences, Arts, and Commerce as well. Even sector wise whether healthcare, government, education, transportation or agriculture—everywhere Information Technology and Computing is required. Hence whether it is a Field or Subject or Sector, Information Technology is very much important and useful. Economics is an important subject for the development; it is more than development today. More importantly, it is valuable to note that Information Technology is not only useful in Economics but also in other contexts viz. Economics also played a great role in the field of Information Technology and Computing. There are many spaces where Economics and Allied Sciences such as Management and Commerce playing an important role. Due to the relationship between Economics and Information Technology, even educational programs worldwide have been developed. The programs are available as Bachelors degree, Masters degree, Doctoral degree etc. In India also in recent past, several improvements were noticed and as a result, educational programs combined with IT and Economics also noted. This paper is conceptual in nature and deals with the analysis and discussion on the application of Economics and allied subjects in the field of Information Technology and Computing. Moreover, the paper also discusses the educational programs available in India combined with IT and Economics.</p>
APA, Harvard, Vancouver, ISO, and other styles
12

Lei, Gen, Hong Yang, Mengliang Li, and Jingjing Wang. "Advanced Computing Technology and Standardization Research." E3S Web of Conferences 236 (2021): 02026. http://dx.doi.org/10.1051/e3sconf/202123602026.

Full text
Abstract:
Advanced computing has become one of the most important technical fields in the 21st century. In the Internet of Things, artificial intelligence, autonomous driving, weather forecasting, aerospace, information research, life sciences, materials engineering and basic scientific research, industry informatization, and data Concentration and other aspects are of great significance and play a fundamental role in the progress of the entire society. This article will start with the introduction of the development process and basic concepts of advanced computing, focusing on the development status and standardization of advanced computing, and will give suggestions for the development of advanced computing in combination with the actual situation in my country.
APA, Harvard, Vancouver, ISO, and other styles
13

Lv, Zhimei. "Design of Cross-Source Education Information Classification Model Based on Cloud Computing Technology." Advances in Multimedia 2022 (May 9, 2022): 1–12. http://dx.doi.org/10.1155/2022/7649317.

Full text
Abstract:
Traditional classification algorithms can be well applied to limited data sets, but the application effect of uncertain data sets was poor. Therefore, this paper proposed a cross-source education information classification model based on cloud computing technology, which aimed to provide support for education information services in the cloud computing environment. Firstly, based on the analysis of the structure and function of the cloud computing platform, this paper expounded the cloud computing service mode and its deployment mode and gave a multisource information processing method based on the cloud computing center combined with the characteristics of information distribution in the cloud computing environment. Secondly, by analyzing the types of educational information resources, this paper summarized the feature extraction of educational information using data mining technology and gave the classification method of educational information based on text features. Finally, a cross-source education information classification model in the cloud computing environment was designed. The experimental comparison showed that the method proposed in this paper can effectively classify the multisource education information under the cloud computing platform. Compared with other traditional classification models, this model not only had higher classification accuracy but also can achieve better classification efficiency. The classification model proposed in this paper can provide a reference for the classification of other information resources in the cloud computing environment.
APA, Harvard, Vancouver, ISO, and other styles
14

Wójcik, Magdalena. "Wearable computing in libraries – applications that meet the needs of users and librarians." Library Hi Tech 37, no. 4 (November 18, 2019): 735–51. http://dx.doi.org/10.1108/lht-04-2019-0081.

Full text
Abstract:
Purpose The subject of this paper is wearable computing technology. The purpose of this paper is to determine its potential in libraries to meet the needs of both users and librarians. The specific goals include: description of the main features of wearable computing from the perspective of its potential usefulness in libraries; analysis of areas of wearable computing use in public institutions; discussion of the potential of wearable computing for library users; and discussion of the potential of wearable computing for librarians to determine its potential in libraries to meet the needs of users and librarians. Design/methodology/approach The method of subject literature overview was used. The state of research from the period 2008 to 2018 on the use of wearable computing in libraries was established based on a search of selected sources Web of Science, Scopus, Elsevier and Emerald databases and LISTA database. Findings Wearable computing can be used in many areas of library activities to serve the needs of users and librarians. In the context of services for users, wearable computing can be used, among others, to help users navigate the library, to provide resources in new and interesting forms, and in education and entertainment. For the needs of librarians, additional data provided via wearable devices can accelerate the process of cataloguing resources and increase motivation to work via gamification options and features that make it possible to measure personal work efficiency. Librarians can also use the data obtained wearable computing devices to more quickly track, identify, select and organize resources. As with users, librarians can also use wearable computing in their education. Research limitations/implications The paper is a viewpoint based on subject literature. It presents only a sketch of potential wearable computing applications in libraries. The aim of the paper is to initiate further discussion on the possibilities of using wearable devices to improve both services for users and internal library processes. The author’s hope is that the concepts presented here will be tested in practice by librarians, which will allow further development of research on this subject. Practical implications The results can be widely used in practice as a framework for the implementation of wearable computing solutions in libraries. Social implications The paper can help to facilitate the debate on the role of the implementation of new technologies in libraries. Originality/value The issue of the use of wearable computing has not yet been widely discussed in library and information science journals. In the very few publications on similar topics, only the perspective on the application of new solutions in services for users is presented. This paper also shows the potential for improving libraries’ internal processes with the use of wearable computing.
APA, Harvard, Vancouver, ISO, and other styles
15

Lv, Zhimei. "The Integrated Processing Method of Educational Information Resources Based on Edge Computing." Journal of Electrical and Computer Engineering 2022 (May 20, 2022): 1–9. http://dx.doi.org/10.1155/2022/9348413.

Full text
Abstract:
Due to the development of information technology, the new type of smart campus integrated teaching, scientific research, office services, and many other applications, online education information resources show a blowout growth. However, huge amounts of data to the campus network carrying capacity put forward high requirements. With the help of edge computing and cloud computing platform and network, the teaching, scientific research, office services, and many other applications of big data integration mining analysis build intelligent management, teaching, scientific research, and life mode, to improve the utilization of education information resources. Improving the school management level and education quality is imperative. The research purpose of this paper is to study the integrated processing method of educational information resources based on edge computing. The research of this paper enriches the relevant optimization theory of edge computing on the one hand and provides reference for the practical integrated processing of practical educational information resources on the other hand, which has the dual significance of theory and practice.
APA, Harvard, Vancouver, ISO, and other styles
16

Wareham, Jonathan D., Xavier Busquets, and Robert D. Austin. "Creative, Convergent, and Social: Prospects for Mobile Computing." Journal of Information Technology 24, no. 2 (June 2009): 139–43. http://dx.doi.org/10.1057/jit.2009.1.

Full text
Abstract:
This paper highlights the over-arching themes salient in the rapidly converging mobile computing industry. Increasingly, the developers of mobile devices and services are looking toward exploratory, non-determinist or, user-driven development methodologies in an effort to cultivate products that consumers will consistently pay for. These include Design Thinking, Living Labs, and other forms of ethnography that embrace serendipity, playfulness, error, and other human responses that have previously rested outside the orthodoxy of technology design. Secondly, the mobile device is likely the world's foremost social computer. Mobile vendors seeking to foster the production, propagation, and consumption of content on mobile devices are increasingly viewing the challenge as a complex social phenomenon, not a merely a well-defined technology problem. Research illustrating these themes is presented.
APA, Harvard, Vancouver, ISO, and other styles
17

Żok, Krzysztof. "Cloud Computing Contracts as Contracts for the Supply of Digital Content: Classification and Information Duty." Masaryk University Journal of Law and Technology 13, no. 2 (September 30, 2019): 133–60. http://dx.doi.org/10.5817/mujlt2019-2-1.

Full text
Abstract:
Cloud computing contracts are among the most frequently concluded contracts over the Internet. Until now, however, they have been considered mainly from the perspective of data protection and intellectual property laws. Although these analyses provide valuable insights, they do not fully cover an important area, i.e. consumer protection. The article focuses on the latter issue, taking Consumer Rights Directive as a reference point. The Directive is one of the latest acts concerning consumer protection in the European Union. It also introduces a new type of agreement that should cover cloud computing contracts. In addition, characteristically for European law, it provides for an information duty as a means of consumer protection. The article examines these two aspects by seeking an answer to the following questions: (1) do cloud computing contracts classify as contracts for the supply of digital content? And (2) do the provisions on information duty suit well cloud computing contracts? The analysis includes the results of empirical studies of these contracts. In the conclusion, the article states that the new type of contract may not significantly improve consumer protection, mainly due to the ambiguity resulting from recital 19 of the Directive. On the other hand, consumers may benefit from the provisions on information duty, though it does not directly address the main problems connected with cloud computing contracts.The article is divided into four parts. The first provides an introduction to the topic. The second discusses cloud computing contracts as contracts for the supply of digital content. The third analyses the provisions on information duty from the point of view of the contracts under consideration. Finally, the fourth summarises previous comments.
APA, Harvard, Vancouver, ISO, and other styles
18

Dahlö, Martin, Frέdέric Haziza, Aleksi Kallio, Eija Korpelainen, Erik Bongcam-Rudloff, and Ola Spjuth. "Biolmg.org: A Catalog of Virtual Machine Images for the Life Sciences." Bioinformatics and Biology Insights 9 (January 2015): BBI.S28636. http://dx.doi.org/10.4137/bbi.s28636.

Full text
Abstract:
Virtualization is becoming increasingly important in bioscience, enabling assembly and provisioning of complete computer setups, including operating system, data, software, and services packaged as virtual machine images (VMIs). We present an open catalog of VMIs for the life sciences, where scientists can share information about images and optionally upload them to a server equipped with a large file system and fast Internet connection. Other scientists can then search for and download images that can be run on the local computer or in a cloud computing environment, providing easy access to bioinformatics environments. We also describe applications where VMIs aid life science research, including distributing tools and data, supporting reproducible analysis, and facilitating education. BioImg.org is freely available at: https://bioimg.org .
APA, Harvard, Vancouver, ISO, and other styles
19

B., Siva Rama Krishna, and Sreenivasa Reddy E. "Improved Context Aware PSO Task Scheduling in Cloud Computing." Webology 19, no. 1 (January 20, 2022): 3709–21. http://dx.doi.org/10.14704/web/v19i1/web19244.

Full text
Abstract:
One of the major advantages of switching to the clouds is the scalability ability of the applications. Contrary to the grids, the ability to scale the cloud resources allows their real-time provisioning so as to meet the application constraints Generation of optimal schedule for given set of tasks and machines. Different experiments show that although having an optimum solution is almost impossible but having a sub-optimal solution using heuristic algorithms seems possible. In this paper, we propose a Context Aware PSO Task Scheduling scheme to analyze various scenarios with different parameters in cloud computing system corresponding to APSO In each scenario, we change one parameter and keep other parameters constant.
APA, Harvard, Vancouver, ISO, and other styles
20

Yuvaraj, Mayank. "Security threats, risks and open source cloud computing security solutions for libraries." Library Hi Tech News 32, no. 7 (September 7, 2015): 16–18. http://dx.doi.org/10.1108/lhtn-04-2015-0026.

Full text
Abstract:
Purpose – In recent years, a large number of organizations have found that cloud computing has many advantages leading to a surge in its adoption. Design/methodology/approach – Cloud computing involves the usage of large servers for the access of data, its storage and manipulation as well as provisioning of other services. Findings – When infrastructure, applications, data and storage are hosted by cloud providers, there are huge security risks associated with each type of service offered. Originality/value – There are a number of considerations, apart from cost which must be evaluated before choosing any particular provider. Sometimes, the physical location of the servers may also be a factor to consider, if sensitive duty is involved.
APA, Harvard, Vancouver, ISO, and other styles
21

Mohammed, Fathey, Othman Ibrahim, Mehrbakhsh Nilashi, and Ensaf Alzurqa. "Cloud computing adoption model for e-government implementation." Information Development 33, no. 3 (June 23, 2016): 303–23. http://dx.doi.org/10.1177/0266666916656033.

Full text
Abstract:
Cloud computing essentially is a scalable, flexible and pay-per-use model for the way IT services are delivered. It can significantly improve the way a government functions, the services it provides to its citizens and institutions. This paper aims to explore the factors that influence adopting cloud computing as a part of public sector organizations’ alternatives to implement e-government services. Based on two dominant theories in the field of adoption of new technology, the Fit-Viability Model and Diffusion of Innovation Theory, a model is proposed. Data were gathered using a structured questionnaire with a sample of 296 IT staff employed in public organizations in Yemen. The results clarify the need to consider factors affecting two dimensions, fit and viability, to make a decision to adopt cloud computing in an e-government context. The fitness of cloud computing to e-government tasks is affected by factors such as relative advantage, compatibility, trialability and security, but is not affected by the complexity of the technology. On the other hand, the viability is influenced by economic factors (return on investment and asset specificity) and technological readiness (IT infrastructure and IT policy and regulations), while the results do not support the relation between the organizational factors such as top management support and cloud knowledge and viability.
APA, Harvard, Vancouver, ISO, and other styles
22

Košmerlj, Aljaž, Marko Grobelnik, and Jure Leskovec. "Report on the 30th the web conference 2021 (TheWebConf2021)." ACM SIGIR Forum 55, no. 1 (June 2021): 1–9. http://dx.doi.org/10.1145/3476415.3476427.

Full text
Abstract:
The Web Conference (TheWebConf2021) is the premier conputer science conference on the state of the Web and its related areas. It covers the Web from a wide spectrum of aspects, including technical areas of artificial intelligence, security, privacy, knowledge representation, mobile computing as well as social sciences, economics, policy, accessibility and others. The year 2021 marked the 30th edition that was organised in Ljubljana, Slovenia, but took place fully online due to the COVID-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
23

Bird, Ian, Simone Campana, Pere Mato Vila, Stefan Roiser, Markus Schulz, Graeme A. Stewart, and Andrea Valassi. "A Software Institute for Data-Intensive Sciences, Joining Computer Science Academia and Natural Science Research." EPJ Web of Conferences 245 (2020): 08020. http://dx.doi.org/10.1051/epjconf/202024508020.

Full text
Abstract:
With the ever-increasing size of scientific collaborations and complexity of scientific instruments, the software needed to acquire, process and analyze the gathered data is increasing in both complexity and size. Unfortunately the role and career path of scientists and engineers working on software R&D and developing scientific software are neither clearly established nor defined in many fields of natural science. In addition, the exchange of information between scientific software development and computer science departments at universities or computing schools is scattered and fragmented into individual initiatives. To address the above issues we propose a new effort on a European level, which concentrates on strengthening the role of software developers in natural sciences, acts as a hub for the exchange of ideas among different stake-holders in computer science and scientific software and forms a lobbying forum for software engineering in natural sciences on an international level. This contribution discusses in detail the motivation, role and interplay with other initiatives of a “Software Institute for Data-Intensive Sciences”, which is currently being discussed between research institutes, universities and funding agencies in Europe. In addition to the current status, an outlook on future prospects of this initiative will be given.
APA, Harvard, Vancouver, ISO, and other styles
24

Senyo, Prince Kwame, John Effah, and Erasmus Addae. "Preliminary insight into cloud computing adoption in a developing country." Journal of Enterprise Information Management 29, no. 4 (July 11, 2016): 505–24. http://dx.doi.org/10.1108/jeim-09-2014-0094.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate the determinants of cloud computing adoption (CCA) in a developing country context through the lens of the technology, organisation and environment (TOE) framework. Design/methodology/approach – The study was carried out using the quantitative research methodology based on a survey of 305 organisations from different industries in Ghana. Based on the TOE framework, a conceptual model consisting of ten hypotheses were proposed and tested through a confirmatory factor analysis and logistic regression analysis. Findings – The findings indicate that relative advantage, security concern, top management support, technology readiness, competitive pressure and trading partners’ pressure were the TOE factors found to be significant in CCA in a developing country context. Conversely, firm size, scope, compatibility and regulatory support were found to be insignificant. Originality/value – This study provides insights into CCA across different industries in a developing country environment. The study is arguably the first kind of empirical research into CCA in a developing country context, specifically in Ghana. The findings from this study provide a foundation for other studies as well as constructive insights for the development of cloud computing, due to its infancy in the developing world.
APA, Harvard, Vancouver, ISO, and other styles
25

Ouda, Alia J., Ali N. Yousif, Ayat S. Hasan, Hassan M. Ibrahim, and Methaq A. Shyaa. "The Impact of Cloud Computing on Network Security and the Risk for Organization Behaviors." Webology 19, no. 1 (January 20, 2022): 195–206. http://dx.doi.org/10.14704/web/v19i1/web19015.

Full text
Abstract:
Cloud computing is currently provided consumer or business IT support via social media or by using the internet. Cloud computing on the other hand, is increasing the level of the network security risk due to the services are basically presented by a third party. This results in hard to control the privacy and data security. In addition, to maintain the service availability and support data collections. Cloud computing clouts several technologies such as virtualization, SOA, and Web 2.0, it is also claimed their security risk matters. In this paper, the most serious and important risks and threats of cloud computing are discussed. The main vulnerability is identifying through a review of the published works on the cloud computing environment with possible solutions to overcome these threats and risks.
APA, Harvard, Vancouver, ISO, and other styles
26

Brooks-Kieffer, Jamene. "Time to play, access to attention: Addressing one academic library’s internal culture around computing tools and skills." College & Research Libraries News 82, no. 3 (March 4, 2021): 121. http://dx.doi.org/10.5860/crln.82.3.121.

Full text
Abstract:
Library employees who try developing their skills with computing tools need to practice in order to use their learning in their work. However, time and space for practice may be elusive. Employees will meet frustration when applying emerging knowledge to problems on the fringes of their learning. Libraries can cultivate employees’ budding computing and data skills by sponsoring time to practice, holding space for peers to support each other, and normalizing the struggle inherent in learning and applying digital tools and methods.
APA, Harvard, Vancouver, ISO, and other styles
27

Ma, Tinghuai, Sen Yan, Jin Wang, and Sungyoung Lee. "Privacy preserving in ubiquitous computing: Classification & hierarchy." Computer Science and Information Systems 8, no. 4 (2011): 1185–206. http://dx.doi.org/10.2298/csis110315055m.

Full text
Abstract:
In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. Privacy system can decrease the interaction, while in other circumstance the system strengthens and enhances the privacy preserving. Thus we strike a balance between two goals of Ubiquitous Computing: interaction and privacy preserving.
APA, Harvard, Vancouver, ISO, and other styles
28

Paul, P. K., P. S. Aithal, and K. S. Shivraj. "Master of Science with Emerging Specializations and Honours/Major: A Case of IT & Computing Fields in Indian Private Universities." Asian Journal of Managerial Science 7, no. 1 (May 5, 2018): 1–6. http://dx.doi.org/10.51983/ajms-2018.7.1.1297.

Full text
Abstract:
Technology is changing day by day with rapid development in many areas of Science and Technology. Higher Educational Institutes (HEIs) worldwide developed and creating many new emerging concepts, fields and study. Computing and Information Technology related fields in recent past developed in rapid speed. There are many organizations, institutions, establishments, and sectors purely and partially depend on computing and allied tools and technologies; and as a result, the field of computing and IT has been changed radically in the different context. The growing requirement of information in diverse areas lead several branches for its nurturing and among these Computing and Information Technology are most important and valuable. Initially, the branch in this field was called as Computer Science but gradually the importance and uses of information have resulted in several other allied branches concentrated on information. Apart from core areas, several new areas of Information Technologies have been developed in recent past; among these few important are Networking Technologies, Web Technologies, Database Technologies, Multimedia Technologies etc. In India, Higher Educational Institutes (HEIs) developed rapidly after 1980’s and most significantly in last decade. The private player plays a lead role in this respect in terms of producing skilled manpower. Private universities are the latest example of higher educational institutions in this regard. The branches of Computing and Information Technology have been changed a lot with the hands of private universities. The educational models and programs in IT and Computing fields have been changed rapidly in last few years by the initiatives undertaken by the private universities. This work is a primary study designed to show the educational systems in India emphasizing emerging programs in IT and Computing in Private Universities in India. The Concept of Major and Concentration of a specific subject previously was important only in Bachelor’s degrees but in recent past Masters degrees are also available with such specializations and concentration with the efforts of private universities in India. The paper is fully dedicated to show such affairs briefly.
APA, Harvard, Vancouver, ISO, and other styles
29

A. Mohamed, Mona, and Sharma Pillutla. "Cloud computing: a collaborative green platform for the knowledge society." VINE 44, no. 3 (August 5, 2014): 357–74. http://dx.doi.org/10.1108/vine-07-2013-0038.

Full text
Abstract:
Purpose – The main aim of this paper is to investigate the potential of Cloud Computing as a multilayer integrative collaboration space for knowledge acquisition, nurturing and sharing. The paper will pinpoint benefits and challenges of Cloud Computing in satisfying the new techno-sociological requirements of the knowledge society through the provision of information technology (IT) green services. Furthermore, the article calls for the engagement of researchers to generate additional discussion and dialog in this emerging and challenging area. Design/methodology/approach – The paper applies a conceptual analysis to explore the utilization of the Cloud ecosystem as a new platform for knowledge management (KM) technologies characterized by environmental and economic benefits. Findings – This paper reveals the emergence of a new layer in the Cloud stack known as Knowledge Management-as-a-Service. The article discusses how KM has the opportunity to evolve in synergy with Cloud Computing technologies using the modified Metcalfe’s law, while simultaneously pursuing other benefits. This research reveals that if Cloud Computing is successfully deployed, it will contribute to the efficient use of the under-utilized computing resources and enable a low carbon economy. However, challenges such as security, information overload and legal issues must be addressed by researchers before Cloud Computing becomes the de facto KM platform. Originality/value – While the technical, legal and environmental complications of Cloud Computing have received the attention warranted, the KM concepts and implementation facets within the realm of the knowledge society have not yet received adequate consideration. This paper provides enterprise KM architects, planners, chief information officers (CIOs) and chief knowledge officers (CKOs) with a comprehensive review of the critical issues, many of which are often overlooked or treated in a fragmented manner within the Cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Gusev, Marjan. "Scalable Dew Computing." Applied Sciences 12, no. 19 (September 22, 2022): 9510. http://dx.doi.org/10.3390/app12199510.

Full text
Abstract:
Dew computing differs from the classical cloud and edge computing by bringing devices closer to the end-users and adding autonomous processing independent from the Internet, but it is still able to collaborate with other devices to exchange information on the Internet. The difference is expressed also on scalability, since edge and cloud providers can provide (almost endless) resources, and in the case of dew computing the scalability needs to be realized on the level of devices, instead of servers. In this paper, we introduce an approach to provide deviceless and thingless computing and ensure scalable dew computing. The deviceless approach allows functions to be executed on nearby devices found closer to the user, and the thingless approach goes even further, providing scalability on a low-level infrastructure that consists of multiple things, such as IoT devices. These approaches introduce the distribution of computing to other smart devices or things on a lower architectural level. Such an approach enhances the existing dew computing architectural model as a sophisticated platform for future generation IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
31

Hassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (October 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.

Full text
Abstract:
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.
APA, Harvard, Vancouver, ISO, and other styles
32

Dodig-Crnkovic, Gordana. "Morphological, Natural, Analog, and Other Unconventional Forms of Computing for Cognition and Intelligence." Proceedings 47, no. 1 (May 7, 2020): 30. http://dx.doi.org/10.3390/proceedings2020047030.

Full text
Abstract:
According to the currently dominant view, cognitive science is a study of mind and intelligence focused on computational models of knowledge in humans. It is described in terms of symbol manipulation over formal language. This approach is connected with a variety of unsolvable problems, as pointed out by Thagard. In this paper, I argue that the main reason for the inadequacy of the traditional view of cognition is that it detaches the body of a human as the cognizing agent from the higher-level abstract knowledge generation. It neglects the dynamical aspects of cognitive processes, emotions, consciousness, and social aspects of cognition. It is also uninterested in other cognizing agents such as other living beings or intelligent machines. Contrary to the traditional computationalism in cognitive science, the morphological computation approach offers a framework that connects low-level with high-level approaches to cognition, capable of meeting challenges listed by Thagard. To establish this connection, morphological computation generalizes the idea of computation from symbol manipulation to natural/physical computation and the idea of cognition from the exclusively human capacity to the capacity of all goal-directed adaptive self-reflective systems, living organisms as well as robots. Cognition is modeled as a layered process, where at the lowest level, systems acquire data from the environment, which in combination with the already stored data in the morphology of an agent, presents the basis for further structuring and self-organization of data into information and knowledge.
APA, Harvard, Vancouver, ISO, and other styles
33

Dodig-Crnkovic, Gordana. "Morphological, Natural, Analog, and Other Unconventional Forms of Computing for Cognition and Intelligence." Proceedings 47, no. 1 (May 7, 2020): 30. http://dx.doi.org/10.3390/proceedings47010030.

Full text
Abstract:
According to the currently dominant view, cognitive science is a study of mind and intelligence focused on computational models of knowledge in humans. It is described in terms of symbol manipulation over formal language. This approach is connected with a variety of unsolvable problems, as pointed out by Thagard. In this paper, I argue that the main reason for the inadequacy of the traditional view of cognition is that it detaches the body of a human as the cognizing agent from the higher-level abstract knowledge generation. It neglects the dynamical aspects of cognitive processes, emotions, consciousness, and social aspects of cognition. It is also uninterested in other cognizing agents such as other living beings or intelligent machines. Contrary to the traditional computationalism in cognitive science, the morphological computation approach offers a framework that connects low-level with high-level approaches to cognition, capable of meeting challenges listed by Thagard. To establish this connection, morphological computation generalizes the idea of computation from symbol manipulation to natural/physical computation and the idea of cognition from the exclusively human capacity to the capacity of all goal-directed adaptive self-reflective systems, living organisms as well as robots. Cognition is modeled as a layered process, where at the lowest level, systems acquire data from the environment, which in combination with the already stored data in the morphology of an agent, presents the basis for further structuring and self-organization of data into information and knowledge.
APA, Harvard, Vancouver, ISO, and other styles
34

KAKESHITA, Tetsuro. "National Survey of Japanese Universities on Computing Education: Analysis of Departments Majored in Computing Discipline." Olympiads in Informatics 12 (May 15, 2018): 69–84. http://dx.doi.org/10.15388/ioi.2018.06.

Full text
Abstract:
We conducted the first national survey of computing education at Japanese universities in 2016. In this paper, we report the survey result of the computing education at a department or a course majored in the computing discipline. The survey covers various aspects including program organization, quality and quantity of educational achievement, students, teaching staff and computing environment. Thus the survey result is expected to be a good fundamental to develop realistic computing curricula and accreditation criteria in Japan. The estimated number of computing departments and students in Japan is about 300 and 28,000 respectively. 50% of the students belong to engineering faculties. Although 25% of the students are learning Computer Science, 50% of the students are learning computing domains other than those defined in CC2005. The information processing society of Japan (IPSJ) and the Japanese Ministry of Education (MEXT) utilize the survey result to develop a new computing curriculum standard J17 and national policy of computing education respectively.
APA, Harvard, Vancouver, ISO, and other styles
35

Loomes, Martin. "Selfconscious or Unselfconscious Software Design?" Journal of Information Technology 5, no. 1 (March 1990): 33–36. http://dx.doi.org/10.1177/026839629000500106.

Full text
Abstract:
Anyone who is involved in computer science education will be used to engaging in passionate debates over questions such as ‘What programming language should we be teaching'? Moreover, if these debates take place in front of colleagues from other disciplines, for example when joint schemes are being developed, then concern is often expressed about the inability of computer scientists to come to any generally accepted conclusions. In this paper the view is proposed that the key questions of computer science education are really manifestations of a much deeper issue in computing which has been alluded to in various publications, but never discussed to a generally accepted conclusion by the computer science community at large.
APA, Harvard, Vancouver, ISO, and other styles
36

Bindhu, V. "Cyber Security Analysis for Quantum Computing." Journal of ISMAC 4, no. 2 (July 21, 2022): 133–42. http://dx.doi.org/10.36548/jismac.2022.2.006.

Full text
Abstract:
The next phase of the quantum revolution is the Quantum computer Network, a network that connects distant quantum devices using quantum links in conjunction with conventional ones. Innovation that has made way for radically improved communications and computing skills. Regular computers use and analyse data in bits (0 or 1), whereas quantum computers use qubits, or quantum bits, which can simultaneously represent other states in addition to ones and zeros. This is how quantum computers vary from traditional computers. The majority of these methods for processing information on computers rely on symmetric or asymmetric cryptography algorithms. These encryption techniques can be vulnerable to attack. We analyse the quantum key distribution (QKD) technique with in a noise-free channel. In addition, we evaluate the QKD protocol with noisy channel to simulate real scenarios on the future Internet. Therefore, it would be essential to explore using quantum cryptography, which cannot be cracked by quantum computing, to secure the standard communications infrastructure used in cyber physical systems (CPS).
APA, Harvard, Vancouver, ISO, and other styles
37

Bernal, Raul Niño. "Evolutionary Immersion, Digital Arts, Science and Technology." ARJ – Art Research Journal / Revista de Pesquisa em Artes 2, no. 2 (September 25, 2015): 11–122. http://dx.doi.org/10.36025/arj.v2i2.7287.

Full text
Abstract:
A theoretical defense of aesthetics as an open science, of knowledge from the perspective of computational information and electronic networks. The transformation of technologies vis-à-vis the evolutionary creation and immersion of digital arts and the use of computing poses a wider conception about interaction, participation and visual concepts in terms of an event horizon. Artists and scientists who use the digital medium face two transformation processes in the creative milieu: in the first place, understanding the transformation of the matter used in the past to represent objects and works of art, now with information bytes, computing codes and algorithms. On the other hand, computational technologies used in order to share and transfer knowledge on the Internet, establishing social, academic and scientific ties leading to the creation of immersive relationships that explain a technological and creative evolution. Revision: Leslie H. Damasceno
APA, Harvard, Vancouver, ISO, and other styles
38

Paul, P. K., R. R. Sinha, Pappachan Baby, K. S. Shivraj, Bashiru Aremu, and S. Mewada. "Usability Engineering, Human Computer Interaction and Allied Sciences: With Reference to its Uses and Potentialities in Agricultural Sectors—A Scientific Report." Scientific Review, no. 67 (July 15, 2020): 71–78. http://dx.doi.org/10.32861/sr.67.71.78.

Full text
Abstract:
Human Computer Interaction is actually responsible for the designing of the computing technologies keeping in mind the aspects of Interaction. Some of the fields viz. Man-Machine Interaction (MMI), User Experience Designing, User Experience Design, Human Centered Designing etc and importantly all these systems and technologies are dedicated to the designing of interface of various tools and systems such as computers, laptops, electronic systems, smart phones etc. Information Technology field is growing rapidly and there are various technologies are increasing viz. Big Data Management, Cloud Computing, Green Computing, Data Science, Internet of Things (IoT), HCI, Usability Engineering etc. Usability Engineering is gaining as a field of study as well and dedicated in creation of the higher usability and user friendliness of the electronic tools and products. In this field few aspects and technologies are most important and emerging viz. Human cognition, behavioral Research Methods, Quantitative techniques etc for the development of usability systems. Designing, implementation, usability even in multimedia material viz. audio-video may also practice in the Usability Engineering and allied fields. Wireframes including few other prototypes are required in maintaining of the better and healthy man and machine interaction. As the field is growing therefore, it is applicable in other sectors and allied areas and among these agriculture is important one. In agricultural sector different applications of information technologies are increasing and among this Usability Engineering and HCI are important one. In pre production and also in post production; directly and indirectly this technology is emerging and growing. This paper talks about the basics of this technologies and also its current and future technologies with reference to academic potentialities of this branch in Agricultural Informatics programs.
APA, Harvard, Vancouver, ISO, and other styles
39

Seoane, Luís F. "Evolutionary aspects of reservoir computing." Philosophical Transactions of the Royal Society B: Biological Sciences 374, no. 1774 (April 22, 2019): 20180377. http://dx.doi.org/10.1098/rstb.2018.0377.

Full text
Abstract:
Reservoir computing (RC) is a powerful computational paradigm that allows high versatility with cheap learning. While other artificial intelligence approaches need exhaustive resources to specify their inner workings, RC is based on a reservoir with highly nonlinear dynamics that does not require a fine tuning of its parts. These dynamics project input signals into high-dimensional spaces, where training linear readouts to extract input features is vastly simplified. Thus, inexpensive learning provides very powerful tools for decision-making, controlling dynamical systems, classification, etc. RC also facilitates solving multiple tasks in parallel, resulting in a high throughput. Existing literature focuses on applications in artificial intelligence and neuroscience. We review this literature from an evolutionary perspective. RC’s versatility makes it a great candidate to solve outstanding problems in biology, which raises relevant questions. Is RC as abundant in nature as its advantages should imply? Has it evolved? Once evolved, can it be easily sustained? Under what circumstances? (In other words, is RC an evolutionarily stable computing paradigm?) To tackle these issues, we introduce a conceptual morphospace that would map computational selective pressures that could select for or against RC and other computing paradigms. This guides a speculative discussion about the questions above and allows us to propose a solid research line that brings together computation and evolution with RC as test model of the proposed hypotheses. This article is part of the theme issue ‘Liquid brains, solid brains: How distributed cognitive architectures process information’.
APA, Harvard, Vancouver, ISO, and other styles
40

Jiang, Jiafu, Linyu Tang, Ke Gu, and WeiJia Jia. "Secure Computing Resource Allocation Framework For Open Fog Computing." Computer Journal 63, no. 4 (January 30, 2020): 567–92. http://dx.doi.org/10.1093/comjnl/bxz108.

Full text
Abstract:
Abstract Fog computing has become an emerging environment that provides data storage, computing and some other services on the edge of network. It not only can acquire data from terminal devices, but also can provide computing services to users by opening computing resources. Compared with cloud computing, fog devices can collaborate to provide users with powerful computing services through resource allocation. However, as many of fog devices are not monitored, there are some security problems. For example, since fog server processes and maintains user information, device information, task parameters and so on, fog server is easy to perform illegal resource allocation for extra benefits. In this paper, we propose a secure computing resource allocation framework for open fog computing. In our scheme, the fog server is responsible for processing computing requests and resource allocations, and the cloud audit center is responsible for auditing the behaviors of the fog servers and fog nodes. Based on the proposed security framework, our proposed scheme can resist the attack of single malicious node and the collusion attack of fog server and computing devices. Furthermore, the experiments show our proposed scheme is efficient. For example, when the number of initial idle service devices is 40, the rejection rate of allocated tasks is 10% and the total number of sub-tasks is changed from 150 to 200, the total allocation time of our scheme is only changed from 15 ms to 25 ms; additionally, when the task of 5000 order matrix multiplication is tested on 10 service devices, the total computing time of our scheme is $\sim$250 s, which is better than that of single computer (where single computer needs more than 1500 s). Therefore, our proposed scheme has obvious advantages when it faces some tasks that require more computational cost, such as complex scientific computing, distributed massive data query, distributed image processing and so on.
APA, Harvard, Vancouver, ISO, and other styles
41

Hakken, David. "Computing and the Crisis: The Significant Role of New Information Technologies in the Current Socio-economic Meltdown." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 8, no. 2 (August 28, 2010): 205–20. http://dx.doi.org/10.31269/vol8iss2pp205-220.

Full text
Abstract:
There is good reason to be concerned about the long-term implications of the current crisis for the reproduction of contemporary social formations. Thus there is an urgent need to understand it character, especially its distinctive features. This article identifies profound ambiguities in valuing assets as new and key economic features of this crisis, ambiguities traceable to the dominant, “computationalist” computing used to develop new financial instruments. After some preliminaries, the article identifies four specific ways in which computerization of finance is generative of crisis. It then demonstrates how computationalist computing is linked to other efforts to extend commodification based on the ideology of so-called “intellectual property” (IP). Several other accounts for the crisis are considered and then demonstrated to have less explanatory value. After considering how some commons-oriented (e.g., Free/Libre and/or Opening Source Software development projects) forms of computing also undermine the IP project, the article concludes with a brief discussion of what research on Socially Robust and Enduring Computing might contribute to fostering alternative, non-crisis generative ways to compute.
APA, Harvard, Vancouver, ISO, and other styles
42

Hosseini, Leila, Shaojie Tang, Vijay Mookerjee, and Chelliah Sriskandarajah. "A Switch in Time Saves the Dime: A Model to Reduce Rental Cost in Cloud Computing." Information Systems Research 31, no. 3 (September 2020): 753–75. http://dx.doi.org/10.1287/isre.2019.0912.

Full text
Abstract:
With the rapid growth of cloud computing, firms face a dizzying array of choices and pricing structures for performing their computing tasks on the cloud. Unlike captive computing resources, cloud computing occurs as a pay-as-you-go contract, similar to the provision of electricity. We develop a method to reduce the rental cost of completing a given computing task with a certain deadline. The current practice is to use a single computing resource that can get the task done in the cheapest possible manner. Instead, costs can be significantly reduced if the task is switched between multiple resources, some more powerful and others less powerful. We apply our method to a real computing task at Cidewalk and show that costs can be significantly reduced.
APA, Harvard, Vancouver, ISO, and other styles
43

Allen, Laurie, Neal Baker, Josh Wilson, Kevin Creamer, and David Consiglio. "Analyzing the MISO Data: Broader Perspectives on Library and Computing Trends." Evidence Based Library and Information Practice 8, no. 2 (June 11, 2013): 129. http://dx.doi.org/10.18438/b82g7v.

Full text
Abstract:
Objective – To analyze data collected by 38 colleges and universities that participated in the Measuring Information Services Outcomes (MISO) survey between 2005 and 2010. Methods – The MISO survey is a Web-based quantitative survey designed to measure how faculty, students, and staff view library and computing services in higher education. Since 2005, over 10,000 faculty, 18,000 students, and 15,000 staff have completed the survey. To date, the MISO survey team has analyzed the data by faculty age group and student cohort. Much of the data analysis has focused on changes in the use, importance, and satisfaction with services over time. Results – Analysis of the data collected during 2008-2010 reveals marked differences in how faculty and students use the library. The most frequently used services by faculty are the online library catalog (3.39 on a 5-point scale), library databases (3.34), and the library website (3.29). In contrast, the most frequently used services by students are public computers in the library (3.61) and quiet work space in the library (3.29). Faculty reported a much higher use of online resources from off campus. Analysis of data from schools where the survey was administered more than once during 2005-2010 reveals that both faculty and students increased their utilization of databases over time. All other significant faculty trends reflected declines in usage, whereas, with the exception of use of the library website, all other student trends reflected no change or increased usage. Conclusion – As the MISO survey has continued and expanded over the years, the usefulness of rich comparable data from a set of peer institutions over time has increased tremendously. In addition to providing a rich source of data, MISO can serve as a model for how a group of schools can collaborate on a share assessment tool that meets the needs of individual institutions and provides a robust, aggregated dataset for deeper analysis.
APA, Harvard, Vancouver, ISO, and other styles
44

Jaiswal, Swati, and Tryambak Hiwarkar. "Cloud Computing Safety Concern and Its Confronts: A Compressive Investigation." International Journal of Computer Science and Mobile Computing 11, no. 11 (November 30, 2022): 4–12. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.002.

Full text
Abstract:
Cloud computing is a new approach to data storage and processing in the field of computer science. Computing in the cloud refers to the use of a network's or the internet's hosted servers and other associated resources. Cloud computing is an expansion of other computing methods such as grid computing and distributed computing. Currently, cloud computing is utilized by both industries and universities. The cloud is a service that helps its users by giving them access to online virtual resources. There are always new methods being developed, and cloud computing is a sector that is growing rapidly. In tandem with the growth of the cloud computing environment comes a corresponding rise in the difficulty of ensuring the system's safety. Users trust the cloud with their data, but if their data isn't secure, they may stop using it. Some of the concerns with cloud security, such as multi-tenancy, will be explored in this paper. Mobility, adaptability, availability, etc. Current security methods and strategies for a safe cloud environment are also discussed in the article. The information presented in this paper will help researchers and practitioners get more familiar with the various security threats and the models and methods provided to combat them.
APA, Harvard, Vancouver, ISO, and other styles
45

M, Ranjani, Unggul Priyadi, Anas A. Salameh, Mochamad Ali Imron, and Kakarla Hari Kishore. "Cloud Computing Based Computing System for Women's Higher Education in Isolated Areas." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 3 (December 23, 2022): 26–35. http://dx.doi.org/10.17762/ijcnis.v14i3.5568.

Full text
Abstract:
A new chapter in information technology is opened by cloud computing in computer science and engineering education. Understanding the importance of using cloud computing (CC) in institutions of higher learning is the aim of this research. This analysis shows some of the benefits that cloud computing can provide to higher education, assesses some of the most significant challenges that academics may encounter as a result of its implementation, and suggests some initial steps toward its adoption while mitigating the risks associated. Enterprise apps have migrated in large numbers to the cloud in recent years. One of the challenges posed by cloud applications is the challenge of allocating resources to the application to ensure a service level along dimensions like performance, availability, and dependability. To do this, a system based on the infrastructure of governmental bodies, non-governmental organisations (NGOs), academic institutions, and other providers of social services has been established. The results of this analysis demonstrate that it is possible to use a few variables, including administrative bodies and governments, internal stakeholders, cloud suppliers, firm attributes, socio-political changes, IT framework, and others, to understand how CC adoption methodologies are used in higher education institutions. In addition to providing insight into how cloud providers, advisers, governments, and academics see various market demands and how they respond to these expectations while expanding services provided by CC in higher education institutions, this analysis opens opportunities for future research. The implications for practice can aid decision-makers in utilizing CC services legally.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Mian. "Mobile Information System of Ceramic Appreciation and Communication Management Based on Mobile Edge Computing." Mobile Information Systems 2021 (September 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/4540664.

Full text
Abstract:
Mobile edge computing is a very popular technology now. It was proposed to eliminate the problem of lack of global computing resources. This article aims to study the use of the latest mobile edge computing technology to study the mobile information system for appreciation, exchange, and management of the traditional ceramic industry. The whole article uses mobile edge computing technology. It enters the network using wireless methods and provides recent users with the required services and cloud computing functions, allowing users to easily query the information and data they want, plus mobile. The information system enables people to use mobile phones, tablets, and other mobile terminals to query information in the ceramic industry and perform functions such as appreciation, communication, and management. From 2016 to 2020, our country’s ceramic industry exports have increased from US$3.067 billion to US$6.826 billion. Traditional ceramics in our country have been loved by various industries at home and abroad. The number of employees in the ceramic industry has also increased to 5 million, an increase of 30% year-on-year. The ceramic industry is also very promising in the long term.
APA, Harvard, Vancouver, ISO, and other styles
47

Sali, Rezvan, Shahnaz Sali, and Fatemeh Pourrezagholi. "To evaluate the effectiveness of cloud computing in hospital." Journal of Management and Accounting Studies 7, no. 04 (September 29, 2020): 29–33. http://dx.doi.org/10.24200/jmas.vol7iss04pp29-33.

Full text
Abstract:
Objective: Today, Growth, expansion, increased network speed and large-scale epidemic during recent years has been a shift in various aspects of human life, and the impact of advances in technology on the sciences, arts and business leads to emergence of new areas such as e-Government, e-Learning and e-Health. Methodology: The importance of knowledge and information in one hand and very high volume growth and the need to constantly update on the other hand leads to create new tools and solutions for processing and access to information. Networks development and their functionality enhancement has a significant role in advance of this field. One of the new emerging ways is cloud computing system. Cloud computing as a new IT infrastructure and new web solutions could have significant benefits in providing electronic medical services. The use of this technology in e-health needs to consider several factors. The main objective of this study is to identify and rank the effective factors on the adoption of cloud computing in e-health. In this thesis, a model based on cloud computing is designed to integrate patient`s information and makes them available for patients and doctors. Results: This comprehensive system significantly reduces processing time and service to the patient and also the display of patient records, including all the problems and diseases such as cardiovascular problems, allergies, lack of vitamins, etc., quality of care and also reduces the risk of diagnostic errors. Conclusion: In This system by using an intelligent module which protects evaluation and selection of proper emergency helps to patients and store patient`s information record by contacting cloud in common storage space. Using this model, we can divide the space between the patient and doctor, and doctor become responsible from the beginning up to end of complete recovery.
APA, Harvard, Vancouver, ISO, and other styles
48

Żok, Krzysztof. "Consumer protection in cloud computing contracts stipulating non-monetary remuneration." International Journal of Law and Information Technology 28, no. 1 (2020): 20–38. http://dx.doi.org/10.1093/ijlit/eaaa006.

Full text
Abstract:
Abstract The convenience of cloud services rapidly increases their popularity among consumers. Although the services are often marketed as free, the consumer may be required to provide remuneration. Instead of charging a fee, however, providers usually collect assets other than money, in particular consumer’s personal data. This raises serious questions about consumer protection which until recently has mainly covered ‘paid’ contracts. Moreover, treating some forms of non-monetary remuneration as payment is controversial due to the special status of the information provided by the consumer in exchange for the service. The article analyses the impact of non-monetary remuneration on consumer protection in cloud computing contracts, taking as reference points Directives 2011/83 (with the latest amendments) and 2019/770. The following considerations highlight the disadvantages of both Directives, concluding that they do not remove all the concerns associated with cloud computing contracts. The article also indicates possible solutions to the issue of non-monetary remuneration.
APA, Harvard, Vancouver, ISO, and other styles
49

Burilina, Maria. "The Role of Super Computer Technologies in Model Building in the Social Spheres." Artificial societies 17, no. 1 (2022): 0. http://dx.doi.org/10.18254/s207751800018140-3.

Full text
Abstract:
The digitalization of society dictates its rules and laws in the process of sharing, storing and processing data. Areas of science less and less every year look like a specific science we are accustomed to, and acquire the outlines of interdisciplinarity and versatility through the development of technology and the introduction of new knowledge in classical science. The social sciences are no exception, as they develop in the age of social networks, messengers, digital transactions and other information, thanks to which you can learn as much as possible about the &quot;digital counterpart&quot; and build the most accurate models. The paper examines how scientists see the development of science through supercomputer technologies, what challenges the world may face, using data about each individual who got on the Internet. In addition, the countries with supercomputer technologies and services that allow using cloud computing to build models without reference to a specific supercomputer are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
50

Lang, Catherine, Annemieke Craig, and MaryAnne Egan. "The Importance of Outreach Programs to Unblock the Pipeline and Broaden Diversity in ICT Education." International Journal of Information and Communication Technology Education 12, no. 1 (January 2016): 38–49. http://dx.doi.org/10.4018/ijicte.2016010104.

Full text
Abstract:
There is a need for outreach programs to attract a diverse range of students to the computing discipline. The lack of qualified computing graduates to fill the growing number of computing vacancies is of concern to government and industry and there are few female students entering the computing pipeline at high school level. This paper presents three outreach programs that have the underlying assumption that students need to be reminded about the creativity and potential of computing so that it remains on the radar of their future career options. Each program instigated social and cultural change through a paradigm shift where girls moved from being ICT consumers to ICT creators. By exposing students to a wide variety of ICT activities and careers during secondary schooling, they were more likely to consider studying information systems, computer science or any other computing course at the university level. Results are presented showing student attitudinal changes as well as observed increases in enrolments at secondary school and university courses.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography