You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Ansible
Ansible is an open-source software provisioning, configuration management, and application-deployment tool enabling infrastructure as code. It runs on many Unix-like systems, and can configure both Unix-like systems as well as Microsoft Windows. It includes its own declarative language to describe system configuration. Ansible was written by Michael DeHaan and acquired by Red Hat in 2015. Ansible is agentless, temporarily connecting remotely via SSH or Windows Remote Management (allowing remote PowerShell execution) to do its tasks.
  • 1.3K
  • 18 Oct 2022
Topic Review
IoT-Enabled Precision Agriculture
The Internet of Things (IoT) has the potential to revolutionize agriculture by providing real-time data on crop and livestock conditions. As the network becomes denser with a decrease in the network area, there is an increase in network connectivity and a decrease in hop count. In terms of future improvements, incorporating advanced technologies such as machine learning algorithms and edge computing can enhance the performance and scalability of the proposed framework. Additionally, integrating more sophisticated sensor technologies such as drones and cameras can provide a more comprehensive understanding of the farm environment. 
  • 1.3K
  • 02 Feb 2024
Topic Review
Information Culture
Information culture is closely linked with Information Technology, Information Systems and the digital world. It is difficult to give one definition of Information Culture and many approaches exist.
  • 1.3K
  • 21 Oct 2022
Topic Review
ITunes LP
iTunes LP (referred to in pre-launch press by the code name Cocktail) is a format for interactive album artwork introduced by Apple Inc. on September 9, 2009. It is similar to the CMX format being developed by the three major record labels, and operates within the iTunes 9 to iTunes 12 software, allowing the user to view multimedia elements alongside the music. This format is also used to bundle extra content (known as iTunes Extras) with selected movies at the iTunes Store. iTunes LP downloads use a proprietary file format with the extension .itlp, which is essentially a WebArchive adhering to special conventions using HTML, CSS, JavaScript, CSS Animations, and plists. This technology is referred to in iTunes LP files as TuneKit. On November 28, 2009, the iTunes LP SDK was released to the public. In 2011, MTV introduced the O Music Awards, intended artists, fans, and innovators at this online awards show. One of the OMAs' inaugural categories was Best iTunes LP. The winner of this category was Pink's Greatest Hits...So Far!!! (Deluxe Edition). Apple stopped accepting new submissions of iTunes LPs after March 2018. Existing LPs will be deprecated from the store during the remainder of 2018. Customers who have previously purchased an album containing an iTunes LP will still be able to download the additional content using iTunes Match.
  • 1.3K
  • 03 Nov 2022
Topic Review
Current Threat Landscape of Botnets
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure. They have become one of the more-preferred options in the toolkit of hackers and cybercriminals; particularly due to their ability to subvert and overrun secure infrastructures within a relatively short time. Research has greatly advanced in trying to keep up with the rapid evolution of the botnet threat. At this time, it is important to review the status of the threat, vis-á-vis the extent of research that has emerged in relation to the threat. This is crucial for understanding the future prospects of the threat, in terms of where it is headed next; as well as what research areas require more work. This exploratory research serves this purpose. It introduces the botnet threat from its early origins; then it traverses the current status of botnets, and summarizes research efforts so far (highlighting some limitations of modern countermeasures). It further goes on to discuss the future trends of botnets and botnet research, before bringing it together to present the current threat landscape.
  • 1.3K
  • 28 Oct 2020
Topic Review
Edge Computing Simulators for IoT
The deployment of Internet of Things (IoT) applications is complex since many quality characteristics should be taken into account, for example, performance, reliability, and security. In this study, we investigate to what extent the current edge computing simulators support the analysis of qualities that are relevant to IoT architects who are designing an IoT system. We first identify the quality characteristics and metrics that can be evaluated through simulation. Then, we study the available simulators in order to assess which of the identified qualities they support. The results show that while several simulation tools for edge computing have been proposed, they focus on a few qualities, such as time behavior and resource utilization. Most of the identified qualities are not considered and we suggest future directions for further investigation to provide appropriate support for IoT architects.
  • 1.3K
  • 28 Oct 2020
Topic Review
Fog Computing
Fog computing provides an effective solution to various problems by extending the cloud’s functionality to typically more limited computing units closer to user devices. Fog computing can provide a higher level of user experience due to its geographic and network topology location and distribution. IoT services also need to be managed seamlessly to ensure adequate QoS (due to the mobility of devices or the temporary periods without an internet connection). Such domains are combined under the auspices of Dew computing, as in critical cases, extending an IoT service to the end user’s device is a feasible task. Such scenarios can hardly be investigated at a large scale due to the lack of dedicated simulation environments. 
  • 1.3K
  • 21 Sep 2022
Topic Review
Real-time Person Identification
Technologies enabling for real-time person identification are largely available and present differences in multiple characteristics. The use of these technologies within healthcare becomes increasingly relevant, for example in the trauma room where a critical situation calls for a real-time overview of attending healthcare worker. In this context, a systematic litterature research was conducted to determine the presently available systems for real-time person identification in healthcare.
  • 1.3K
  • 04 Aug 2020
Topic Review
Edge Computing
Edge computing is a distributed computing paradigm such that client data are processed at the periphery of the network, as close as possible to the originating source. 
  • 1.3K
  • 28 Mar 2022
Topic Review
Blockchain in the Healthcare Sector
The emergence of blockchain technology makes it possible to address disparate distributed system security concerns in formerly ridiculous practices. A key factor of this ability is the decentralization of the symmetrically distributed ledgers of blockchain. Such decentralization has replaced several security functionalities of centralized authority with the use of cryptographic systems. That is, public or asymmetric cryptography is the key part of what makes blockchain technology possible. The blockchain experience introduces the chance for the healthcare field to implement these knowhows in their electronic records. This adoption supports retaining and sharing the symmetrical patient records with the appropriate alliance of hospitals and healthcare providers in a secure decentralized system, using asymmetric cryptography like hashing, digitally signed transactions, and public key infrastructure. These include specialized applications for drug tracking, applications for observing patients, or Electronic Health Records (EHR). Therefore, it is essential to notice that the principled awareness of the healthcare professionals is the leading point of the right perception ethics. 
  • 1.3K
  • 09 Sep 2022
Topic Review
Building a Super Smart Nation
Globally, countries are increasingly facing challenges regarding their national future post the COVID-19 pandemic with respect to decreasing and aging populations; dwindling workforces; trade wars due to restricted movement of goods, people, and services; and overcoming economic development and societal problems. 
  • 1.3K
  • 21 Mar 2022
Topic Review
Classifications of Sustainable Factors in Blockchain Adoption
Blockchains are a decentralized storage network that is completely unrelated to the data included within each block and that exhibits crucial qualities such as decentralization, anonymity, immutability, and transparency.
  • 1.3K
  • 18 May 2022
Topic Review
Amazon Relational Database Service
Amazon Relational Database Service (or Amazon RDS) is a distributed relational database service by Amazon Web Services (AWS). It is a web service running "in the cloud" designed to simplify the setup, operation, and scaling of a relational database for use in applications. Administration processes like patching the database software, backing up databases and enabling point-in-time recovery are managed automatically. Scaling storage and compute resources can be performed by a single API call to the AWS control plane on-demand. AWS does not offer an SSH connection to the underlying virtual machine as part of the managed service.
  • 1.3K
  • 12 Oct 2022
Topic Review
Cybersecurity in ICT Supply Chains
According to the US National Institute for Standards and Technology (NIST), cyber resilience is defined as “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that include cyber resources”. The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. Today, the resilience of ICT systems is premium, and every ICT system is expected to implement at least a set of basic mechanisms to prevent, resist, and recover from any type of disruption in a timely manner, thus minimizing the impact on service quality and user experience. Particularly in complex ICT supply chain scenarios, the ICT implementation of physical supply chains, serving multiple actors in finance, manufacturing, healthcare, and many other sectors, not only individual parts of the supply chain need to be secured and reliably provisioned, but also the end-to-end process of securing the ICT supply chain. The concept of cyber resilience is expected to become the norm, and one of the key measures of an ICT system’s ability to continue its operations in the event of a cyber attack (be it either software or hardware) or incident.
  • 1.2K
  • 08 Oct 2021
Topic Review
Disaster Management Systems
Disaster management is a critical area that requires efficient methods and techniques to address various challenges. An increasing number of studies have elaborated on the importance and applications of remote sensing in disaster management. A major reason for the adoption of remote sensing is that it is one of the fastest means of acquiring data for pre-disaster and post-disaster studies. It is used to provide data for damage assessment in a timely manner and to assist in evaluation and rehabilitation plans. During the pre-disaster phase, remote sensing can be applied to identify and develop adequate systems and resources before the occurrence of a disaster. Adequate systems and resources can ensure that the response to a disaster is coordinated and efficient and that the recovery time is minimal.
  • 1.2K
  • 06 Jun 2024
Topic Review
Facial Information for Healthcare Applications
The document is not limited to global face analysis but it also concentrates on methods related to local cues (e.g. the eyes). A research taxonomy is introduced by dividing the face in its main features: eyes, mouth, muscles, skin, and shape. For each facial feature, the computer vision-based tasks aiming at analyzing it and the related healthcare goals that could be pursued are detailed.
  • 1.2K
  • 28 Oct 2020
Topic Review
Interference in B5G Network Design
Beyond Fifth Generation (B5G) networks are expected to be the most efficient cellular wireless networks with greater capacity, lower latency, and higher speed than the current networks. Key enabling technologies, such as millimeter-wave (mm-wave), beamforming, Massive Multiple-Input Multiple-Output (M-MIMO), Device-to-Device (D2D), Relay Node (RN), and Heterogeneous Networks (HetNets) are essential to enable the new network to keep growing. In the forthcoming wireless networks with massive random deployment, frequency re-use strategies and multiple low power nodes, severe interference issues will impact the system. Consequently, interference management represents the main challenge for future wireless networks, commonly referred to as B5G.
  • 1.2K
  • 28 Sep 2022
Topic Review
Problems and Proposed Solutions of Cloud Security Frameworks
Cloud computing has its roots in several fundamental concepts and technologies. In the 1960s, J.C.R. Licklider, a prominent computer scientist, envisioned an “Intergalactic Computer Network” that allowed remote access to programs and data, laying the groundwork for distributed computing models. 
  • 1.2K
  • 22 Sep 2023
Topic Review
Finder
The Finder is the default file manager and graphical user interface shell used on all Macintosh operating systems. Described in its "About" window as "The Macintosh Desktop Experience", it is responsible for the launching of other applications, and for the overall user management of files, disks, and network volumes. It was introduced with the first Macintosh computer, and also exists as part of GS/OS on the Apple IIGS. It was rewritten completely with the release of Mac OS X in 2001. In a tradition dating back to the Classic Mac OS of the 1980s and 1990s, the Finder icon is the smiling screen of a computer, known as the Happy Mac logo.
  • 1.2K
  • 07 Nov 2022
Topic Review
Glossary of Library and Information Science
This page is a glossary of library and information science.
  • 1.2K
  • 28 Sep 2022
  • Page
  • of
  • 25
Academic Video Service