You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Blockchain Overview
Blockchain technology integrates a hash algorithm, digital signature, point-to-point transmission, consensus mechanism, and other existing technologies, so it is characterized by anti-fraud, traceability, security, and trust. Supply chain refers to the network chain structure formed by upstream and downstream enterprises involved in the activities of providing products or services to end users in the process of production and circulation. 
  • 1.2K
  • 01 Dec 2022
Topic Review
Human-Smart Environment Interactions
In the context of the challenges facing human computer interaction (HCI) on the one hand and the future Internet on the other, the purpose of this study is to explore the multi-dimensionality of smart cities, looking at relationships and interdependencies through correlating selected dimensions of smartness. Through a review of the research literature, key dimensions of smartness are identified for exploration in the context of smart cities in this work. Methodologically, this work combines an exploratory case study approach consisting of multiple methods of data collection including survey and in-depth interviews, with an explanatory correlational design. In terms of results, the main findings of this work shed light on relationships between selected dimensions of the multi-dimensionality construct of smartness in data-rich urban environments. This work is significant in that it provides correlational information for smart city dimensionalities while contributing to the research literature in this domain; uses a hybrid case study and correlational design in relation to the study of multi-dimensionality; and opens spaces for the study of innovative urban initiatives, taking the ideas and experiences of people from many sectors into consideration.
  • 1.2K
  • 30 Oct 2020
Topic Review
Patent Analysis and Tools
Patent analysis is a field that concerns the analysis of patent records, for the purpose of extracting insights and trends, and it is widely used in various fields. Despite the abundance of proprietary software employed for this purpose, there is currently a lack of easy-to-use and publicly available software that can offer simple and intuitive visualizations, while advocating for open science and scientific software development.
  • 1.2K
  • 25 Dec 2023
Topic Review
Blockchain Networks Privacy
One of the most widely researched areas in the field of blockchain networks is the domain of preserving blockchain privacy. The reason being the growing concern of several industries and business enterprises to protect their data and trade secrets from unauthorized access. 
  • 1.2K
  • 03 Aug 2021
Topic Review
Blockchain and Smart Contracts
With the fast development of blockchain technology in the latest years, its application in scenarios that require privacy, such as health area, have become encouraged and widely discussed. An architecture to ensure the privacy of health-related data, which are stored and shared within a blockchain network in a decentralized manner, through the use of encryption with the Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), and Advanced Encryption Standard (AES) algorithms.
  • 1.2K
  • 11 Nov 2022
Topic Review
Authority-Based Conversation Tracking in Twitter
Twitter is undoubtedly one of the most widely used data sources to analyze human communication. The literature is full of examples where Twitter is accessed, and data are downloaded as the previous step to a more in-depth analysis in a wide variety of knowledge areas. Unfortunately, the extraction of relevant information from the opinions that users freely express in Twitter is complicated, both because of the volume generated—more than 6000 tweets per second—and the difficulties related to filtering out only what is pertinent to our research. Inspired by the fact that a large part of users use Twitter to communicate or receive political information, we created a method that allows for the monitoring of a set of users (which we will call authorities) and the tracking of the information published by them about an event. Our approach consists of dynamically and automatically monitoring the hottest topics among all the conversations where the authorities are involved, and retrieving the tweets in connection with those topics, filtering other conversations out. Although our case study involves the method being applied to the political discussions held during the Spanish general, local, and European elections of April/May 2019, the method is equally applicable to many other contexts, such as sporting events, marketing campaigns, or health crises.
  • 1.1K
  • 28 Oct 2020
Topic Review
EncFS
EncFS is a Free (LGPL) FUSE-based cryptographic filesystem. It transparently encrypts files, using an arbitrary directory as storage for the encrypted files. Two directories are involved in mounting an EncFS filesystem: the source directory, and the mountpoint. Each file in the mountpoint has a specific file in the source directory that corresponds to it. The file in the mountpoint provides the unencrypted view of the one in the source directory. Filenames are encrypted in the source directory. Files are encrypted using a volume key, which is stored either within or outside the encrypted source directory. A password is used to decrypt this key.
  • 1.1K
  • 27 Oct 2022
Topic Review
ICTs in Agri-Food Logistics
A major challenge of Sustainable Development Goal 12 “Responsible Consumption and Production” is to reduce food losses along production and supply chains. This is particularly critical for fresh food products, due to their perishable and fragile nature, which makes the coordination of the actors all the more crucial to avoid wastes and losses. The rise of new technologies, referred to as “Industry 4.0” powered by the internet of things, big data analytics and artificial intelligence, could bring new solutions to meet these needs. Information and communication technologies (ICTs) allow for frequent exchanges of huge amounts of information between actors in the agrofood chains to coordinate their activities.
  • 1.1K
  • 02 Feb 2022
Topic Review
Hyperledger Fabric
Hyperledger Fabric is a distributed ledger platform for developing applications with modular architecture. Support for pluggable consensus protocols is one of the platforms most distinguished features.
  • 1.1K
  • 26 Sep 2023
Topic Review
IoT-Based Payment Protocols
Financial services and the payment industry are constantly evolving to meet customer requirements and to create a competitive advantage by providing better banking and financial services, improving operational efficiency and reducing costs. After plastic cards were successfully replaced by the mobile wallet (m-Wallet), the Internet of Things (IoT) leaves the door wide open for consumers to use their connected devices to access their bank accounts and perform routine banking activities from anywhere, anytime, and with any device.
  • 1.1K
  • 21 Nov 2022
Topic Review
Cloud-Native Future Networks
Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile platform for converged network-cloud/edge service provisioning. Intelligent and autonomous management is one of the most challenging issues in cloud-native future networks, and a wide range of machine learning (ML)-based technologies have been proposed for addressing different aspects of the management challenge. It becomes critical that the various management technologies are applied on the foundation of a consistent architectural framework with a holistic vision. This calls for standardization of new management architecture that supports seamless the integration of diverse ML-based technologies in cloud-native future networks. The goal of this paper is to provide a big picture of the recent developments of architectural frameworks for intelligent and autonomous management for future networks.
  • 1.1K
  • 01 Mar 2021
Topic Review
Blockchain-Based Data Management System for ETO Manufacturing
Engineer-to-order (ETO) is a currently popular production model that can meet customers’ individual needs, for which the orders are primarily non-standard parts or small batches. This production model has caused many management challenges, including the difficulty of tracing the production process data of products and the inability to monitor order status in real-time. 
  • 1.1K
  • 08 Oct 2022
Topic Review
A Generative Adversarial Network Technique for Ransomware Behavior Prediction
The ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique attack patterns for each new target, particularly in the pre-encryption phase where evasiveness is prioritized. 
  • 1.1K
  • 30 Oct 2023
Topic Review
Location-Aware Wi-Fi Authentication Scheme
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. A location-aware authentication scheme was proposed, using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. The smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.
  • 1.1K
  • 01 Nov 2020
Topic Review
Knowledge Management System in Small and Medium Enterprises
Knowledge is a key competitive advantage for small and medium enterprises (SMEs) as a way of competing with other organisations. There is a need to investigate SME adoption of knowledge management systems (KMSs). Knowledge management systems can only assist in this task if they are sufficiently adopted.
  • 1.1K
  • 22 Sep 2022
Topic Review
Software-Defined Networks and Software-Defined Radios in Maritime Communications
Effective maritime communication is vital for ensuring the safety of crew members, vessels, and cargo. The maritime industry is responsible for the transportation of a significant portion of global trade, and as such, the efficient and secure transfer of information is essential to maintain the flow of goods and services. With the increasing complexity of maritime operations, technological advancements such as unmanned aerial vehicles (UAVs), autonomous underwater vehicles (AUVs), and the Internet of Ships (IoS) have been introduced to enhance communication and operational efficiency.
  • 1.1K
  • 22 Jan 2024
Topic Review
Location Aware Schemes in IoT
The rapid development in wireless technologies is positioning the Internet of Things (IoT) as an essential part of our daily lives. Localization is one of the most attractive applications related to IoT. In the past few years, localization has been gaining attention because of its applicability in safety, health monitoring, environment monitoring, and security.
  • 1.1K
  • 31 May 2021
Topic Review
Blockchain-Based Internet of Medical Things
The Internet of Things (IoT) or other decentralized platforms may be employed in this context for achieving dispersed coverage. In light of this, healthcare systems are a crucial IoT application. Internet of Medical Things (IoMT) is the kind of IoT that is used in the healthcare industry. IoMTs are the wave of the future in healthcare since they will enable the connectivity and remote monitoring of all medical equipment. Due to these developments, healthcare may now be provided more rapidly and at a lower cost. Medical workers (nurses, physicians, etc.), medical data servers, and medical sensor equipment make up the bulk of an IoMT system that provides remote healthcare.
  • 1.1K
  • 06 Feb 2023
Topic Review
Security and Privacy of Technologies in HISs
Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet patient needs, as well as to ensure the security and privacy of medical data, including confidentiality, integrity, and availability, which are necessary to achieve high-quality healthcare services.
  • 1.1K
  • 19 Feb 2024
Topic Review
Spark Streaming Backpressure for Data-Intensive Pipelines
A significant rise in the adoption of streaming applications has changed the decision-making processes in the last decade. This movement has led to the emergence of several Big Data technologies for in-memory processing, such as the systems Apache Storm, Spark, Heron, Samza, Flink, and others. Spark Streaming, a widespread open-source implementation, processes data-intensive applications that often require large amounts of memory. However, Spark Unified Memory Manager cannot properly manage sudden or intensive data surges and their related in-memory caching needs, resulting in performance and throughput degradation, high latency, a large number of garbage collection operations, out-of-memory issues,  and data loss. This work presents a comprehensive performance evaluation of Spark Streaming backpressure to investigate the hypothesis that it could support data-intensive pipelines under specific pressure requirements.  The results reveal that backpressure is suitable only for small and medium pipelines for stateless and stateful applications. Furthermore, it points out the Spark Streaming limitations that lead to in-memory-based issues for data-intensive pipelines and stateful applications. In addition, the work indicates potential solutions.
  • 1.1K
  • 19 Jul 2022
  • Page
  • of
  • 25
Academic Video Service