You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Java Card Open Platform
Java Card OpenPlatform (JCOP) is a smart card operating system for the Java Card platform developed by IBM Zürich Research Laboratory. On 31 January 2006 the development and support responsibilities transferred to the IBM Smart Card Technology team in Böblingen, Germany . Since July 2007 support and development activities for the JCOP operating system on NXP / Philips silicon are serviced by NXP Semiconductors. The title originates from the standards it complies with: A Java Card JCOP has a Java Card Virtual Machine (JCVM) which allows it to run applications written in Java programming language.
  • 1.6K
  • 22 Nov 2022
Topic Review
A Beginner's Python Tutorial
Python is an interpreted programming language.
  • 1.5K
  • 04 Nov 2022
Topic Review
LPC (Programming Language)
LPC (short for Lars Pensjö C) is an object-oriented programming language derived from C and developed originally by Lars Pensjö to facilitate MUD building on LPMuds. Though designed for game development, its flexibility has led to it being used for a variety of purposes, and to its evolution into the language Pike. LPC syntax places it in the family of C-like languages, with C and C++ its strongest influences.
  • 1.5K
  • 25 Oct 2022
Topic Review
Internet-of-Things technologies for Assisted Living
An ambient assisted living (AAL) environment is an integration of stand-alone assistive technologies, solutions, and services. AAL (or simply assisted living) solutions can provide a positive influence on the health and quality of life of people, especially older people. 
  • 1.5K
  • 14 Sep 2021
Topic Review
Blockchain Applications in Agribusiness
Blockchain is a communication network where data is stored and shared in a distributed manner among all its nodes and links, eliminating any reliable authority centralized in different business models and where each node can assume coordination without a unified data center. Blockchain is a chain of blocks of information forming a distributed database where a group of people controls, records, and shares information used in various types of applications and is interconnected through platforms and hardware worldwide.
  • 1.5K
  • 27 Apr 2021
Topic Review
Dell EMC ScaleIO
Dell EMC PowerFlex (previously known as ScaleIO and VxFlex OS), is a commercial software-defined storage product from Dell EMC that creates a server-based storage area network (SAN) from local server storage using x86 servers. It converts this direct-attached storage into shared block storage than runs over an IP-based network. PowerFlex can scale from three compute/storage nodes to over 1,000 nodes that can drive up to 240 million IOPS of performance. PowerFlex is bundled with Dell EMC commodity computing servers (officially called VxFlex Ready Nodes, PowerFlex appliance, and PowerFlex rack). PowerFlex can be deployed as storage only or as a converged infrastructure combining storage, computational and networking resources into a single block. Capacity and performance of all available resources are aggregated and made available to every participating PowerFlex server and application. Storage tiers can be created with media types and drive types that match the ideal performance or capacity characteristics to best suit the application needs.
  • 1.5K
  • 01 Nov 2022
Topic Review
IoT Intrusion Detection Using Feature Selection Method
The Internet of Things (IoT) ecosystem has experienced significant growth in data traffic and consequently high dimensionality. Intrusion Detection Systems (IDSs) are essential self-protective tools against various cyber-attacks. However, IoT IDS systems face significant challenges due to functional and physical diversity. These IoT characteristics make exploiting all features and attributes for IDS self-protection difficult and unrealistic. 
  • 1.5K
  • 17 Jun 2022
Topic Review
Quantum Stream Cipher
Quantum cryptography includes quantum key distribution (QKD) and quantum stream cipher, but the researchers point out that the latter is expected as the core technology of next-generation communication systems. Various ideas have been proposed for QKD quantum cryptography, but most of them use a single-photon or similar signal. Then, although such technologies are applicable to special situations, these methods still have several difficulties to provide functions that surpass conventional technologies for social systems in the real environment. Thus, the quantum stream cipher has come to be expected as one promising countermeasure, which artificially creates quantum properties using special modulation techniques based on the macroscopic coherent state. In addition, it has the possibility to provide superior security performance than one-time pad cipher.
  • 1.5K
  • 25 May 2022
Topic Review
Vehicle Forensics
Traffic accident investigation has been used to reconstruct the cause and condition of the accident by using images and driving record data that introduce IT technology, and to analyze both sides of the accident, skid marks, and vehicle damage to identify the perpetrators and victims. However, level 3 self-driving vehicles are the most important factor in determining the cause and imputation of the accident by the driver or manufacturer with control information at the time of the accident. It is also developing into a network and connected vehicle with various restrictions such as the burden of the price of sensors equipped with self-driving cars and climate and rapidly changing road traffic information. In addition, network and connected vehicle driving data are stored on the outside, or various devices and sensors are installed to store information on the outside for convenience in operation, and efforts to enact laws are continuing.
  • 1.5K
  • 13 Feb 2021
Topic Review
LPWAN
LPWAN stands for Low Power Wide Area Network;  LPWAN provides long-distance communication for rural and urban areas to support IIoT devices considered by a ten-year provision time to acclimate IIoT applications with higher extensibility, availability of intelligent monitoring infrastructure for a small portion of data exchanges. LoRa is favorable to use with smart sensing applications working IIoT non-authored spectrum. NBIoT is suitable for supporting agriculture and environmental data collection and observations, industrial data tracking and monitoring, inventory tracking, smart billing, and smart buildings, smart metering, and smart cities. Machine-to-machine (M2M) communication uses the Bluetooth Low Energy (BLE) technique for the data communication, the other IIoT applications used in healthcare, smart agriculture, intelligent home, smart vehicles, smart city, smart gadgets, and industries use the cognitive LPWAN, LoRA, Sigfox.  There is a need to mix most LPWAN technologies in heterogeneous IIoT applications to provide more efficient and convenient intelligent services. In heterogeneous IIoT applications, there a need to mix most LPWAN technologies to provide more efficient and convenient intelligent services. This will be deployed by cognitive LPWAN 
  • 1.5K
  • 20 Jan 2021
Topic Review
Link Grammar
Link grammar (LG) is a theory of syntax by Davy Temperley and Daniel Sleator which builds relations between pairs of words, rather than constructing constituents in a phrase structure hierarchy. Link grammar is similar to dependency grammar, but dependency grammar includes a head-dependent relationship, whereas Link Grammar makes the head-dependent relationship optional (links need not indicate direction). Colored Multiplanar Link Grammar (CMLG) is an extension of LG allowing crossing relations between pairs of words. The relationship between words is indicated with link types, thus making the Link grammar closely related to certain categorial grammars. For example, in a subject–verb–object language like English, the verb would look left to form a subject link, and right to form an object link. Nouns would look right to complete the subject link, or left to complete the object link. In a subject–object–verb language like Persian, the verb would look left to form an object link, and a more distant left to form a subject link. Nouns would look to the right for both subject and object links.
  • 1.5K
  • 27 Oct 2022
Topic Review
Digital Marketing for SMEs in Tourism
Social media has become an essential tool for travel planning, with tourists increasingly using it to research destinations, book accommodation, and make travel arrangements. Small and medium-sized enterprises’(SMEs) most common use of social media is to promote their products or services, but they can also use it to build customer relationships, provide customer service, and gather feedback.
  • 1.5K
  • 15 Dec 2023
Topic Review
IoT Word's Hardware Requirements
The growth of the number of devices connected to the Internet is steadily increasing. In the future, more and more everyday objects will host embedded electronics to make them smarter and more useful then before, under the name of Internet of Things (IoT). Most of these items will be powered by small batteries and thus will have a limited energy budget. They will have to accurately balance performances and power usage to extend their lifespan. This can be implemented at various level, from the lowest one, the technology, to the highest, the algorithm. It is not possible to send all the data to a cloud server for processing, in particular if data can be preprocessed effectively to save computational resources on the cloud and to send only useful information. This paradigm is called edge-computing, as the end devices act at the "edge" of the cloud. This survey paper presents various recent ultra-low power hardware architectures for IoT, along with the explanation of some low power techniques to make the IoT tasks possibile at the large scales required. Some newest research topics are discussed, leading to the description of a fully functional digital system which encloses all the presented techniques.
  • 1.5K
  • 28 Oct 2020
Topic Review
ODEX's Actions Against File-sharing
ODEX's actions against file sharing were Japan copyright owners' pre-action discovery to Singapore Internet Service Providers (ISPs) to request for subscribers details in Singapore who were traced to illegal download activities of their licensed anime series. ODEX is a Singapore-based company that licenses and releases anime for local and regional Southeast Asian consumption. As Japanese copyright owners are located in Japan, ODEX, being holder of the Japanese anime license in Singapore, were appointed to submit legal documents and court proceedings on their behalf in Singapore.
  • 1.5K
  • 21 Oct 2022
Topic Review
Blockchain for Smart Mobility
The concept of a smart city aims to help cities to address these challenges by adapting modern information and communication technology. Smart mobility and transportation form one important aspect of smart cities. Inefficient mobility in cities can lead to problems such as traffic congestion, which results in frustration for residents and a decrease in the quality of life. In the context of smart mobility, blockchain can be used for transactions relating to ridesharing and electric charging, handling of interactions of platoon members, or serving as a foundation for communication between vehicles.
  • 1.5K
  • 17 Jan 2022
Topic Review
Wireless Technologies for Social Distancing in COVID-19 Pandemic
So-called “social distance” refers to measures that work to prevent disease spread through minimizing human physical contact frequency and intensity, including the closure of public spaces (e.g., schools and offices), avoiding large crowds, and maintaining a safe distance between individuals. Because it reduces the likelihood that an infected person would transmit the illness to a healthy individual, social distance reduces the disease’s progression and impact. During the early stages of a pandemic, social distancing techniques can play a crucial role in decreasing the infection rate and delaying the disease’s peak. Consequently, the load on healthcare systems is reduced, and death rates are reduced. The concept of social distancing may not be as easy as physical distancing, given the rising complexity of viruses and the fast expansion of social interaction and globalization. It encompasses numerous non-pharmaceutical activities or efforts designed to reduce the spread of infectious diseases, including monitoring, detection, and alerting people. Different technologies can assist in maintaining a safe distance (e.g., 1.5 m) between persons in the adopted scenarios. There are a number of wireless and similar technologies that can be used to monitor people and public locations in real-time.
  • 1.5K
  • 25 Mar 2022
Topic Review
Wi-Fi
Indoor positioning poses a number of challenges as several effects, such as signal attenuation, signal fluctuations, interference, and multipath occur in signal propagation. The severity depends on the method and technology adopted to perform user localization. Wi-Fi is a popular method because of its ubiquity with already available public and private infrastructure in many environments and the ability for mobile clients, such as smartphones, to receive these signals.
  • 1.5K
  • 14 Jan 2021
Topic Review
Vice News
Vice News (stylized as VICE News) is Vice Media's current affairs channel, producing daily documentary essays and video through its website and YouTube channel. It promotes itself on its coverage of "under-reported stories". Vice News was created in December 2013 and is based in New York City , though it has bureaus worldwide.
  • 1.5K
  • 14 Oct 2022
Topic Review
Blockchains and Artificial Intelligence
It is undeniable that the adoption of blockchain- and artificial intelligence (AI)-based paradigms is proceeding at lightning speed. Both paradigms provide something new to the market, but the degree of novelty and complexity of each is different. In the age of digital money, blockchains  may automate installments to allow for the safe, decentralized exchange of personal data, information, and logs. AI and blockchains are two of the most talked about technologies right now. Using a decentralized, secure, and trustworthy system, blockchain technology can automate bitcoin payments and provide users access to a shared ledger of records, transactions, and data. Through the use of smart contracts, a blockchain may also regulate user interactions without the need for a central authority. As an alternative, AI provides robots with the ability to reason and make decisions and human-level intellect.
  • 1.5K
  • 26 Dec 2022
Topic Review
Information Technology (Intermediary Guidelines (Amendment) Rules) 2018
The draft Information Technology [Intermediary Guidelines (Amendment) Rules] 2018 seeks to amend India 's Intermediary Guidelines Rules 2011 by making intermediaries legally required to provide time-bound assistance to any government agency, provide traceability requirements, as well as deploy "technology-based automated tools to identify and remove public access to unlawful information". Intermediaries with more than 5,000,000 users must set up a company in India. The changes also include prohibited hosting of another category of content, i.e. ‘public health or safety’. The draft Rules have been framed under Section 79 of the Information Technology Act, 2000 which covers intermediary liability. The Indian Government’s Ministry of Electronics and Information Technology (MeitY) had invited comments on proposed amendments early in 2019. The amendments were seen by many to "overstep the aforesaid intention sparking concerns of violating free speech and privacy rights of individuals." It is seen that "the guidelines suffer with excessive delegation of powers and shift the burden of responsibility of identification of unlawful content from a government/ judiciary to intermediaries." A total of 171 comments were received by MeitY; all of the comments were published for counter comments. On 21 October 2019, MeitY asked the court for three months’ time for finalisation of the Intermediary Rules, 2018.
  • 1.5K
  • 06 Dec 2022
  • Page
  • of
  • 25
Academic Video Service