You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
The BrIdge voLcanic LIdar—BILLI
Volcanologists have demonstrated that carbon dioxide (CO2) fluxes are precursors of volcanic eruptions. Controlling volcanic gases and, in particular, the CO2 flux, is technically challenging, but we can retrieve useful information from magmatic/geological process studies for the mitigation of volcanic hazards including air traffic security. Existing techniques used to probe volcanic gas fluxes have severe limitations such as the requirement of near-vent in situ measurements, which is unsafe for operators and deleterious for equipment. In order to overcome these limitations, a novel range-resolved DIAL-Lidar (Differential Absorption Light Detection and Ranging) has been developed as part of the ERC (European Research Council) Project “BRIDGE”, for sensitive, remote, and safe real-time CO2 observations.
  • 1.4K
  • 09 Oct 2020
Topic Review
Challenges According to the ‘7Vs’ of Big Data
Big Data has challenges that sometimes are the same as its own characteristics. These characteristics are known as the Vs. The researchers describe ‘7Vs’ that they have found and are the most used and more related to general data used in Big Data, including an explanation and challenges that exist according to them. Some of them have different subtypes according to the differences detected in the literature and working with them. Some authors create a different V for similar purposes, and here, the researcher gather them into one due to the similarities.
  • 1.4K
  • 12 Apr 2023
Topic Review
Text Line Segmentation from Malayalam Documents
After the pandemic situation created by the novel coronavirus, it has become a necessity to encode the local language, conventionally written in pen and paper, in an electronic format. Optical character recognition (OCR) systems convert handwritten documents to a computer-editable digital form. Optical character recognition (OCR) converts pdf files, scanned documents, images containing text and printed and handwritten documents into editable electronic documents. OCR can be implemented for printed character recognition and handwritten character recognition. The latter is further categorized into online and offline recognition systems. Optical Character Recognition system for Malayalam handwritten documents has become an open research area. A major hindrance for this research is the unavailability of a benchmark database. Therefore, a new database of 402 Malayalam handwritten document images and ground truth images of 7535 text lines is developed for the implementation of the proposed technique. This paper proposes a technique for extracting text lines from handwritten documents in Malayalam language, specifically based on the handwriting of the writer. Text lines are extracted based on horizontal and vertical projection values, size of the handwritten characters, height of the text lines and the curved nature of Malayalam alphabets.
  • 1.4K
  • 22 Sep 2023
Topic Review
Information Card
Information cards are personal digital identities that people can use online, and the key component of an identity metasystem. Visually, each i-card has a card-shaped picture and a card name associated with it that enable people to organize their digital identities and to easily select one they want to use for any given interaction. The information card metaphor is implemented by identity selectors like Windows CardSpace, DigitalMe or Higgins Identity Selector. An identity metasystem is an interoperable architecture for digital identity that enables people to have and employ a collection of digital identities based on multiple underlying technologies, implementations, and providers. Using this approach, customers can continue to use their existing identity infrastructure investments, choose the identity technology that works best for them, and more easily migrate from old technologies to new technologies without sacrificing interoperability with others. The identity metasystem is based upon the principles in "The Laws of Identity".
  • 1.4K
  • 10 Nov 2022
Topic Review
External Human–Machine Interface of AVs
In future urban traffic, it is more likely that automated vehicles (AVs) will operate not in separated traffic spaces but in so-called mixed traffic environments where different types of traffic participants interact. Therefore, AVs must be able to communicate with other traffic participants, e.g., pedestrians as vulnerable road users (VRUs), to solve ambiguous traffic situations. Taking current traffic communication patterns into account, a combination of implicit communication via the driving behavior (e.g., deceleration, position in lane) and explicit communication via an external Human–Machine Interface (eHMI) seems to be a promising approach. The eHMI consists of an external interface connected to the vehicle, which can transmit explicit signals enabling interaction between AVs and other TPs.
  • 1.4K
  • 15 Aug 2021
Topic Review
AI Enabling Technologies in Physical Layer Security
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS design and optimization that are based on artificial intelligence (AI) and machine learning (ML) have been corroborated to outperform traditional security technologies. This will allow future 5G networks to be more intelligent and robust in order to significantly improve the performance of system design over traditional security methods.
  • 1.3K
  • 23 May 2022
Topic Review
Efficient Task Offloading in Multi-User Edge Computing
Task offloading is one of the most important issues in edge computing and has attracted continuous research attention in recent years. With task offloading, end devices can offload the entire task or only subtasks to the edge servers to meet the delay and energy requirements.
  • 1.3K
  • 05 Aug 2022
Topic Review
Standardization of Post-Quantum Cryptography
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computers and quantum algorithms, classical cryptographic techniques have been in danger of collapsing because quantum computers can solve complex problems in polynomial time. Stemming from that risk, researchers worldwide have stepped up research on post-quantum algorithms to resist attack by quantum computers.
  • 1.3K
  • 14 Sep 2023
Topic Review
Digital Media Technology Applied in Self-Guided Learning
This research adopts Keller’s ARCS motivation theory as a method to create a teaching experiment by integrating augmented reality (AR) into teaching in order to enhance learning interest and learning effectiveness in a digital media design course. The purpose of this research is to examine the application of AR in quarantine during the COVID-19 pandemic, whereby students can enhance their learning interest, learning satisfaction, and learning performance. Augmented reality acts as a tool for this research, wherein it is applied with the course of a 3D model-based interface and built-in learning contexts for the “digital media design” of the learning topics.The contribution of this research is proving that AR teaching materials are suitable for normal learning programs during the COVID-19 pandemic. At present, it appears as though online learning and self-study at home will become the norm for the students all over the world. Digital media design was the research field, and the coding program and the project development as professional domain knowledge of the Unity platform were found suitable for AR teaching materials for online learning solutions. However, the limitations of the research are that for successful AR teaching experiences, teachers must devote substantial additional time to work on AR-based textbooks,in contrast to other teaching models, which represents a major impediment for educators.
  • 1.3K
  • 05 Jan 2022
Topic Review
USB Dead Drop
A USB dead drop is a USB mass storage device installed in a public space. For example, a USB flash drive might be mounted in an outdoor brick wall and fixed in place with fast concrete. Members of the public are implicitly invited to find files, or leave files, on a dead drop by directly plugging their laptop into the wall-mounted USB stick in order to transfer data. (It is also possible to use smartphones and tablets for this purpose, by utilizing a USB on-the-go cable.) The dead drops can therefore be regarded as an anonymous, offline, peer-to-peer file sharing network. However, in practice USB dead drops are often used for social or artistic reasons, rather than for practical ones.
  • 1.3K
  • 23 Nov 2022
Topic Review
IBM Spectrum Scale
IBM Spectrum Scale is high-performance clustered file system software developed by IBM. It can be deployed in shared-disk or shared-nothing distributed parallel modes. It is used by many of the world's largest commercial companies, as well as some of the supercomputers on the Top 500 List. For example, it was the filesystem of the ASC Purple Supercomputer which was composed of more than 12,000 processors and had 2 petabytes of total disk storage spanning more than 11,000 disks. Before 2015, Spectrum Scale was known as IBM General Parallel File System (GPFS). Like typical cluster filesystems, Spectrum Scale provides concurrent high-speed file access to applications executing on multiple nodes of clusters. It can be used with AIX 5L clusters, Linux clusters, on Microsoft Windows Server, or a heterogeneous cluster of AIX, Linux and Windows nodes. In addition to providing filesystem storage capabilities, Spectrum Scale provides tools for management and administration of the Spectrum Scale cluster and allows for shared access to file systems from remote Spectrum Scale clusters. Spectrum Scale has been available on IBM's AIX since 1998, on Linux since 2001, and on Windows Server since 2008.
  • 1.3K
  • 31 Oct 2022
Topic Review
Mir
Mir is a computer display server and, recently, a Wayland compositor for the Linux operating system that is under development by Canonical Ltd. It was planned to replace the currently used X Window System for Ubuntu; however, the plan changed and Mutter was adopted as part of GNOME Shell. Mir was announced by Canonical on 4 March 2013 as part of the development of Unity 8, intended as the next generation for the Unity user interface. Four years later Unity 8 was dropped although Mir's development continued for Internet of Things (IoT) applications.
  • 1.3K
  • 28 Oct 2022
Topic Review
Knowledge Sharing System (KSS) Design
Numerous ICT instruments, such as communication tools, social media platforms, and collaborative software, bolster and facilitate knowledge sharing activities. Determining the vital success factors for knowledge sharing within its unique context is argued to be essential before implementing it. Therefore, it is imperative to define domain-specific critical success factors when envisioning the design of a knowledge sharing system. 
  • 1.3K
  • 30 Nov 2023
Topic Review
Automated Similarity Judgment Program
The Automated Similarity Judgment Program (ASJP) is a collaborative project applying computational approaches to comparative linguistics using a database of word lists. The database is open access and consists of 40-item basic-vocabulary lists for well over half of the world's languages. It is continuously being expanded. In addition to isolates and languages of demonstrated genealogical groups, the database includes pidgins, creoles, mixed languages, and constructed languages. Words of the database are transcribed into a simplified standard orthography (ASJPcode). The database has been used to estimate dates at which language families have diverged into daughter languages by a method related to but still different from glottochronology, to determine the homeland (Urheimat) of a proto-language, to investigate sound symbolism, to evaluate different phylogenetic methods, and several other purposes. ASJP is not widely accepted among historical linguists as an adequate method to establish or evaluate relationships between language families. It is part of the Cross-Linguistic Linked Data project hosted by the Max Planck Institute for the Science of Human History.
  • 1.3K
  • 23 Nov 2022
Topic Review
Fog-Based IoT Platform Performance Modeling and Optimization
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions.
  • 1.3K
  • 19 Jun 2023
Topic Review
Internet of Things Applications in China’s Hospitality Industry
During the current post-epidemic period, hygiene requirements and health needs in the hospitality industry keep increasing, and consumers become more concerned about the cleanliness of hotels and have stronger demands for contactless services in hotels. The growth and popularity of IoT technology in China make it more accessible to a wider range of service industries and provides the basis for the application of IoT in the hospitality industry. The application of IoT devices in hotels mainly includes intelligent robots, intelligent guest control, systems, etc., which helps to realise contactless services in hotels. 
  • 1.3K
  • 12 Jul 2022
Topic Review
Collaborative Cybersecurity Networked Organisations
The requirements to the governance of collaborative networked organisations (CNOs) can be structured in 33 categories: Geographical Representation or exclusion; Supply chain security; Involvement of external stakeholders; Standards and methodologies; Representation on senior governance bodies; Decision making principles; Auditing; Dispute/conflict management arrangements; Confidentiality & Security; IPR management; Ethics code; Use of slave labour or labour of minors; Green policies; Gender policies and representation; Transparency; Accountability ; Anti-corruption/ integrity policies; Innovation; Adaptiveness; Cohesion; Trust; Sustainability; Resilience; Communication and engagement; Knowledge management; Long-term perspective on collaboration; Interoperability; Leadership; Organisational culture; Competences; Risk management; Evidence-based decision-making; and Competitiveness. As a result of a comprehensive study for CNOs in the field of cybersecurity these governance issues have been structured in two groups (of governance objectives and CNO features) and four tiers in terms of priority. While the governance categories are universally applicable, their prioritisation is relevant for CNOs in the field of cybersecurity.
  • 1.3K
  • 28 Oct 2020
Topic Review
IBM CP-40
CP-40 was a research precursor to CP-67, which in turn was part of IBM's then-revolutionary CP[-67]/CMS – a virtual machine/virtual memory time-sharing operating system for the IBM System/360 Model 67, and the parent of IBM's VM family. CP-40 ran multiple instances of client operating systems – particularly CMS, the Cambridge Monitor System, built as part of the same effort. Like CP-67, CP-40 and the first version of CMS were developed by IBM's Cambridge Scientific Center (CSC) staff, working closely with MIT researchers at Project MAC and Lincoln Laboratory. CP-40/CMS production use began in January 1967. CP-40 ran on a unique, specially modified IBM System/360 Model 40.
  • 1.3K
  • 21 Oct 2022
Topic Review
Blockchain and Fog Based Architecture
Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities’ applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time response applications. There are various frameworks in real-world to support the IoE in smart-cities but they face the issues like security, platform Independence, multi-application assistance, and resource management. This article is motivated from the Blockchain and Fog computing technologies and presents a secured architecture Blockchain and Fog-based Architecture Network (BFAN) for IoE applications in the smart cities. The proposed architecture secures sensitive data with encryption, authentication, and Blockchain. It assists the System-developers and Architects to deploy the applications in smart city paradigm. The goal of the proposed architecture is to reduce the latency and energy, and ensure improved security features through Blockchain technology. The simulation results demonstrate that the proposed architecture performs better than the existing frameworks for smart-cities.
  • 1.3K
  • 28 Oct 2020
Topic Review
Cascading Style Sheets
Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript. CSS is designed to enable the separation of presentation and content, including layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple web pages to share formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and repetition in the structural content. Separation of formatting and content also makes it feasible to present the same markup page in different styles for different rendering methods, such as on-screen, in print, by voice (via speech-based browser or screen reader), and on Braille-based tactile devices. CSS also has rules for alternate formatting if the content is accessed on a mobile device. The name cascading comes from the specified priority scheme to determine which style rule applies if more than one rule matches a particular element. This cascading priority scheme is predictable. The CSS specifications are maintained by the World Wide Web Consortium (W3C). Internet media type (MIME type) text/css is registered for use with CSS by RFC 2318 (March 1998). The W3C operates a free CSS validation service for CSS documents. In addition to HTML, other markup languages support the use of CSS including XHTML, plain XML, SVG, and XUL.
  • 1.3K
  • 10 Oct 2022
  • Page
  • of
  • 25
Academic Video Service