You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Internet of Medical Things applications
The Internet of Things (IoT) have been adopted by several areas of the society, such as smart transportation systems, smart cities, smart agriculture, smart energy and smart healthcare. The healthcare is an area that takes a lot of benefits from IoT technology (composing the Internet of Medical Things (IoMT)), since low cost devices and sensors can be use to create medical assistance systems, reducing the deployment and maintenance costs, and at the same time, improving the patients and their family quality of life. However, only IoT is not able to support the complexity of e-health applications. For instance, sensors can generate large amount of data, and the IoT devices do not have enough computational capabilities to process and store these data. Thus, the cloud and fog technologies emerge to mitigate the IoT limitations, expanding the IoMT applications capacities. The cloud computing provides virtual unlimited computational resources, while the fog push the resources closest to the end users, reducing the data transfer latency. Therefore, the IoT, fog, and cloud computing integration provides a robust environment to e-health systems deployment, allowing a plenty of different types of IoMT applications. In this topic review, we present an overview of a systematic mapping with the goal to overview the current state-of-the-art in IoMT applications using IoT, fog and cloud infrastructures.
  • 1.2K
  • 23 Dec 2020
Topic Review
Factors Influencing Blockchain Adoption
The technology of Blockchain may open up new potential for innovation and distinction. It can enable the software sector to develop more safe and transparent systems that can function in an environment without trust. The adoption rate still needs to be higher despite the potential advantages; the relatively low adoption rate may be attributable to issues such as a lack of awareness, the difficulty of adoption, and ambiguity surrounding legal and regulatory frameworks.
  • 1.2K
  • 21 Aug 2023
Topic Review
MAC-Based Physical Layer Security over Wireless Sensor Network
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of physical security causes a great threat to a network. 
  • 1.2K
  • 15 Sep 2022
Topic Review
Multimodal Medical Image Fusion Techniques
Image fusion has become one of the most promising fields in image processing since it plays an essential role in different applications, such as medical diagnosis and clarification of medical images. Multimodal Medical Image Fusion (MMIF) enhances the quality of medical images by combining two or more medical images from different modalities to obtain an improved fused image that is clearer than the original ones. Choosing the best MMIF technique which produces the best quality is one of the important problems in the assessment of image fusion techniques. There are several image modalities, such as Computed Tomography (CT), Positron Emission Tomography (PET), Magnetic Resonance Imaging (MRI), and Single Photon Emission Computed Tomography (SPECT). Medical image fusion techniques are categorized into six main categories: spatial domain, transform fusion, fuzzy logic, morphological methods, and sparse representation methods. 
  • 1.2K
  • 05 Jan 2023
Topic Review
Standard Portable Intermediate Representation
Standard Portable Intermediate Representation (SPIR) is an intermediate language for parallel compute and graphics by Khronos Group. It is used in multiple execution environments, including the Vulkan graphics API and the OpenCL compute API, to represent a shader or kernel. It is also used as an interchange language for cross compilation. SPIR-V was introduced in 2015 by the Khronos Group, and has since replaced the original SPIR, which was introduced in 2012.
  • 1.2K
  • 25 Oct 2022
Topic Review
Blockchain-Based Loyalty Programs
Loyalty platforms are designed to increase customer loyalty and thus increase consumers’ attraction to purchase. Loyalty programs are one of the main options for brands to increase their accessibility and attractiveness. However, these systems have shortcomings that can influence interaction with users. Blockchain is an innovative technology capable of transforming the behavior of these systems and solving current problems.
  • 1.2K
  • 07 Jun 2023
Topic Review
Multisource Fusion UAV Cluster Cooperative Positioning
Due to the functional limitations of a single UAV, UAV clusters have become an important part of smart cities, and the relative positioning between UAVs is the core difficulty in UAV cluster applications. Existing UAVs can be equipped with satellite navigation, radio navigation, and other positioning equipment, but in complex environments, such as urban canyons, various navigation sources cannot achieve full positioning information due to occlusion, interference, and other factors, and existing positioning fusion methods cannot meet the requirements of these environments. Therefore, demand exists for the real-time positioning of UAV clusters. Aiming to solve the above problems, multisource fusion UAV cluster cooperative positioning using information geometry (UCP-IG), which converts various types of navigation source information into information geometric probability models and reduces the impact of accidental errors is proposed, and the Kullback–Leibler divergence minimization (KLM) fusion method to achieve rapid fusion on geometric manifolds and creatively solve the problem of difficult fusion caused by different positioning information formats and parameters is presented.
  • 1.2K
  • 02 Dec 2022
Topic Review
Fitting Model for Indoor Positioning on Bluetooth
Bluetooth Low Energy (BLE) is a positioning technology that is commonly used in indoor positioning systems (IPS) such as shopping malls or underground parking lots, because of its low power consumption and the low cost of Bluetooth devices. It also maintains high positioning accuracy. However, it is necessary to configure a large number of devices in the environment to obtain accurate positioning results. A planar model that conforms to the signal strength in the environment was generated, wherein the database comparison method is replaced by an equation solution, to improve various costs but diminish the positioning accuracy. Researchers propose to further replace the planar model with a cost-effective fitting model to both save costs and improve positioning accuracy
  • 1.2K
  • 05 Sep 2022
Topic Review
Urban Digitization Governance in Birth Registration Field
Digitization governance is one of the most significant current discussions in the urban governance field. Especially, with the spreading of Blockchain Technology (BCT), researchers have shown an increased interest in the application of the technology in solving birth registration challenges as a digital infrastructure in developing countries.
  • 1.2K
  • 17 Aug 2022
Topic Review
Energy Efficient Clustering Protocol for FANETS
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power and high mobility. Due to these topological restrictions, FANETS routing is considered more complicated than MANETs or VANETs. Clustering approaches based on artificial intelligence (AI) approaches can be used to solve complex routing issues when static and dynamic routings fail. Evolutionary algorithm-based clustering techniques, such as moth flame optimization, and ant colony optimization, can be used to solve these kinds of problems with routes. Moth flame optimization gives excellent coverage while consuming little energy and requiring a minimum number of cluster heads (CHs) for routing. Researchers employ a moth flame optimization algorithm for network building and node deployment. Then, researchers employ a variation of the K-Means Density clustering approach to choosing the cluster head. Choosing the right cluster heads increases the cluster’s lifespan and reduces routing traffic. Moreover, it lowers the number of routing overheads. This step is followed by MRCQ image-based compression techniques to reduce the amount of data that must be transmitted. Finally, the reference point group mobility model is used to send data by the most optimal path. Particle swarm optimization (PSO), ant colony optimization (ACO), and grey wolf optimization (GWO) were put to the test against the proposed EECP-MFO. Several metrics are used to gauge the efficiency of the proposed method, including the number of clusters, cluster construction time, cluster lifespan, consistency of cluster heads, and energy consumption.
  • 1.2K
  • 06 Jun 2022
Topic Review
Health Information Systems for Healthcare
Health information system deployment has been driven by the transformation and digitalization confronting healthcare. The need and potential of these systems within healthcare have been tremendously driven by the global instability that has affected several interrelated sectors. Accordingly, many research studies have reported on the inadequacies of these systems within the healthcare arena, which have distorted their potential and offerings to revolutionize healthcare.
  • 1.2K
  • 11 Apr 2023
Topic Review
Information System for Security Auditing
Information security and cybersecurity management play a key role in modern enterprises. There is a plethora of standards, frameworks, and tools, ISO 27000 and the NIST Cybersecurity Framework being two relevant families of international Information Security Management Standards (ISMSs). Globally, these standards are implemented by dedicated tools to collect and further analyze the information security auditing that is carried out in an enterprise. The overall goal of the auditing is to evaluate and mitigate the information security risk. The risk assessment is grounded by auditing processes, which examine and assess a list of predefined controls in a wide variety of subjects regarding cybersecurity and information security. For each control, a checklist of actions is applied and a set of corrective measures is proposed, in order to mitigate the flaws and to increase the level of compliance with the standard being used. The auditing process can apply different ISMSs in the same time frame. However, as these processes are time-consuming, involve on-site interventions, and imply specialized consulting teams, the methodology usually adopted by enterprises consists of applying a single ISMS and its existing tools and frameworks. This strategy brings overall less flexibility and diversity to the auditing process and, consequently, to the assessment results of the audited enterprise.
  • 1.2K
  • 05 May 2022
Topic Review
Routing Protocols for Mobile IoT
IoT (Internet of Things) is the connection of devices to the Internet where devices are able to communicate with each other and their users, such as cameras, medical sensors, light-bulbs, and smoke alarms. IoT allows devices to assist daily routines, such as cars can be synced with calendars for appointment or meeting tracking to plan the best routes. According to the research done by IDC, there are already 13 billion connected devices in use worldwide in 2017 and the number could reach over 40 billion by 2025.
  • 1.2K
  • 15 Oct 2021
Topic Review
Homothetic Behavior of Betweenness Centralities
       In mathematics, a homothetic behavior is characterized by a transformation of an affine space by a factor λ and results in an invariance of this space form or configuration, albeit its overall scale changes. In this sense, if two objects or parts of those objects have distinct sizes, but conserve the same appearance, they can be considered homothetic. In networks, the occurrence of homothetic behaviors would imply that a section of the network, when modelled independently, ought to retain a certain regularity in their distribution of centrality hierarchies (visual similitude) when compared to a larger section, independently modelled as well, that contains it. Hence, the smaller network maintains its overall proportions (configuration, hierarchies and values) across scales. This visual similitude was perceived while apposing several Normalized Angular Choice (NACH) models, a Space Syntax’ derivative from mathematical betweenness. Network homotheties, due to their invariability in form and value, can be used as an alternative to extensive network generalization for the construction of large spatial networks. Hence, data maps can be constructed sooner and more accurately as “pieces of a puzzle”, since each individual lesser scale graph possesses a faster processing time.
  • 1.2K
  • 21 Feb 2021
Topic Review
Quantum-Resistant Blockchain System
Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantum signatures are required to preserve integrity and reliability. Furthermore, combining the InterPlanetary File System (IPFS) with blockchain provides a long-term strategy for data storage and sharing.
  • 1.2K
  • 20 Sep 2023
Topic Review
Heart Health Monitoring Service Platform
Heart Health Monitoring Service Platform is a concept that allows medical device manufacturers to offer diagnosis support for a range of diseases to healthcare providers. The proposed platform is based on heart rate monitoring and the diagnosis support is achieved with deep learning. 
  • 1.2K
  • 17 Feb 2021
Topic Review
Enhancing the Decision-Making Process through Industry 4.0 Technologies
In order to meet the increasingly complex expectations of customers, many companies must increase efficiency and agility. In this sense, Industry 4.0 technologies offer significant opportunities for improving both operational and decision-making processes. These developments make it possible to consider an increase in the level of operational systems and teams’ autonomy. However, the potential for strengthening the decision-making process by means of these new technologies remains unclear in the current literature. To fill this gap, a Delphi study using the Régnier Abacus technique was conducted with a representative panel of 24 experts. The novelty of this study was to identify and characterize the potential for enhancing the overall decision-making process with the main Industry 4.0 groups of technologies. Our results show that cloud computing appears as a backbone to enhance the entire decision-making process. However, certain technologies, such as IoT and simulation, have a strong potential for only specific steps within the decision-making process. This research also provides a first vision of the manager’s perspectives, expectations, and risks associated with implementing new modes of decision-making and cyber-autonomy supported by Industry 4.0 technologies.
  • 1.2K
  • 20 Jan 2022
Topic Review
List of Open Formats
An open format is a file format for storing digital data, defined by a published specification usually maintained by a standards organization, and which can be used and implemented by anyone. For example, an open format can be implemented by both proprietary and free and open source software, using the typical software licenses used by each. In contrast to open formats, closed formats are considered trade secrets. Open formats are also called free file formats if they are not encumbered by any copyrights, patents, trademarks or other restrictions (for example, if they are in the public domain) so that anyone may use them at no monetary cost for any desired purpose. Open formats (in alphabetical order) include:
  • 1.2K
  • 21 Oct 2022
Topic Review
The Internet of Things in Poland
One definition of the Internet of Things refers to devices that can be directly connected to the internet or other devices using wireless networks or, less frequently, cables. This definition of the IoT includes contemporary telephones, cameras, movement sensors, weather stations, even dishwashers, vehicles, industrial machinery, and daily outfits. Almost any object can get connected to the internet even if it was not manufactured as intended for the IOT, because in the majority of cases its functionality can be extended. The IOT has been growing dynamically, offering smart technological solutions. IoT-based applications are client-server operable which requires a specific communication protocol that can be used to determine a client-server communication model, allowing all clients to perform specific tasks thanks to communications via the internet. Poland’s rural areas that are diversified in terms of economic development are poorly equipped with basic infrastructure, which is a barrier to the functioning of people with limited mobility. 
  • 1.2K
  • 03 Aug 2022
Topic Review
IoT Serverless Computing at the Edge
Serverless computing is a new concept allowing developers to focus on the core functionality of their code, while abstracting away the underlying infrastructure. Even though there are existing commercial serverless cloud providers and open-source solutions, dealing with the explosive growth of new Internet of Things (IoT) devices requires more efficient bandwidth utilization, reduced latency, and data preprocessing closer to the source, thus reducing the overall data volume and meeting privacy regulations. One way of achieving this is to move serverless computing to the network edge.
  • 1.2K
  • 26 Oct 2021
  • Page
  • of
  • 25
Academic Video Service