Review of Mohammed Rustom, The Triumph of Mercy: Philosophy and Scripture in... - Academia.edu

Academia.edu
TOP PAPERS FROM YOUR NEWSFEED

Muhammad U Faruque Muhammad U Faruque
Fordham UniversityReligion and Philosophy, Faculty Member

Review of Mohammed Rustom, The Triumph of Mercy: Philosophy and Scripture in Mullā Ṣadrā. Albany, ny: State University of New York Press, 2012. xii + 243 pages.

Download Bookmark

IJCSMC  Journal IJCSMC Journal
International Journal of Computer Science and Mobile ComputingComputer Science, Post-Doc

A Proposal of Decentralised and Distributed Blockchain Secured Educational Network for Higher Education

The top use case of Blockchain is Identity Management. IndiaChain is the Government of India's plan to implement a complete blockchain infrastructure that will match IndiaStack. In future, IndiaChain will be linked with IndiaStack & other government Digital Identification Databases. IndiaStack is a set of code developed around India's unique Identity project Aadhar. If implemented, IndiaChain will be the largest blockchain implementation across the globe. With such massive plans of moving towards Digital India, in this paper we present a blockchain implementation on education system, in...

Download Bookmark

IJCSMC  Journal IJCSMC Journal
International Journal of Computer Science and Mobile ComputingComputer Science, Post-Doc

Image Steganography using K-LSB Embedding with Edge Detection and Chaotic Map

Steganography is the science of embedding secret data inside data so they can be sent to destination security. Image steganography is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images; the least significant bit algorithm (LSB) is one of these algorithms that is widely used in steganography. In this paper, we introduced propose steganography method by using edge detection of 6 bits in the image by edge detection and chaotic map. In work, we use 1-LSB or 2-LSB embedding, it depends on the threshold for edge...

Download Bookmark

Simplice  Asongu (PhD) Simplice Asongu (PhD)
African Governance and Development Institute (AGDI)Research Department, Faculty Member

Recent finance advances in information technology for inclusive development: a systematic review

The overarching question tackled in this paper is: to what degree has financial development contributed to providing opportunities of human development for those on low-incomes and by what information technology mechanisms? We systematically review about 180 recently published papers to provide recent information technology advances in finance for inclusive development. Retained financial innovations are structured along three themes. They are: (i) the rural-urban divide, (ii) women empowerment and (iii) human capital in terms of skills and training. The financial instruments are...

Download Bookmark

Simplice  Asongu (PhD) Simplice Asongu (PhD)
African Governance and Development Institute (AGDI)Research Department, Faculty Member

Technology and persistence in global software piracy

This study examines the persistence of software piracy with internet penetration vis-à-vis of PC users, conditional on Intellectual Property Rights (IPRs) institutions. The empirical evidence is based on a panel of 99 countries for the period 1994-2010 and the Generalised Method of Moments. The main finding is that, compared to internet penetration, PC usage is more responsible for the persistence of global software piracy. Knowing how technology affects the persistence of piracy is important because it enables more targeted policy initiatives. We show that the sensitivity of software...

Download Bookmark

Jason  Hoelscher Jason Hoelscher
Georgia Southern UniversityBetty Foy Sanders Department of Art, Faculty Member

Direct Experience, Once Removed: Unconcealing the Environmental Interface

In this paper I will propose that as the physical infrastructure of computation approaches the invisibility and abstraction of software, its interface becomes environmentalized—interwoven with and increasingly indistinguishable from the context in which and on which it operates. While readiness and routine eventually cause all tools to disappear into engaged usefulness and habit, ambient technologies—designed as they are to preempt their users' notice—would seem to operate in an altogether different category, blending into and in some ways supplanting one's apparent, everyday...

Download Bookmark

Jason  Hoelscher Jason Hoelscher
Georgia Southern UniversityBetty Foy Sanders Department of Art, Faculty Member

Preening for the Algorithmic Gaze: Bioinformatic Media and Panopticonic Performance

Operating at the intersections of technology, biopolitics and social physics, the algorithmic gaze is an acquisitive, ambient computational force that influences and sculpts the behavior of those within its field of vision. While the human gaze is one of mutual accountability and consideration, the algorithmic gaze is non-reciprocal—a distributed visual memory that stores and extrapolates residual biodata to construct high-granularity representations mined for trends and behavior patterns. This paper will consider how augmentation, behavioral camouflage and technologies of the quantified...

Download Bookmark

Som Naidu Som Naidu
The University of the South PacificCenter for Flexible Learning, Faculty Member

Computer Conferencing in Distance Education

ED310734 - Computer Conferencing in Distance Education.

Download Bookmark

Assoc. Prof. Ibrahim  ARPACI Assoc. Prof. Ibrahim ARPACI
Gaziosmanpasa UniversityComputer and instructional technology education, Faculty Member

A hybrid modeling approach for predicting the educational use of mobile cloud computing services in higher education

A B S T R A C T The decision to integrate mobile cloud computing (MCC) in education without determining optimal use scenarios is a universal problem as the adoption of such services becomes widespread. Accordingly, this study developed and validated a predictive model that explains the role of students' information management (i.e. retrieve, store, share, and apply) practices in predicting their attitudes toward using the MCC services for educational purposes. This study validated the model by the complementary use of machine learning algorithms alongside a classical SEM-based approach...

Download Bookmark

Bipin Bakshi Bipin Bakshi
CHAUDHARY CHARAN SINGH UNIVERSITY MEERUTDepartment of Defence Studies, Post-Doc

Information Warfare : Redefining National Security

Information Warfare, uses elements of information and technology to disrupt thought processes and paralyze an adversary with non- kinetic mean, violating sovereignty and achieving objectives without using conventional forces. We need to defend against such warfare and develop capability to strike back in similar coin. The conceptual construct of National Security itself has undergone a transformation in the digital era, hence there is a need to redefine the concept of National Security and review security systems in the era of Information Warfare. Information Security has to include...

Download Bookmark


Academia, 580 California St., Suite 400, San Francisco, CA, 94104

Unsubscribe   Privacy Policy   Terms of Service   © 2018 Academia

Previous
Next Post »