Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Blockchain and Smart Contracts
With the fast development of blockchain technology in the latest years, its application in scenarios that require privacy, such as health area, have become encouraged and widely discussed. An architecture to ensure the privacy of health-related data, which are stored and shared within a blockchain network in a decentralized manner, through the use of encryption with the Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), and Advanced Encryption Standard (AES) algorithms.
  • 1.2K
  • 11 Nov 2022
Topic Review
Hyperledger Fabric
Hyperledger Fabric is a distributed ledger platform for developing applications with modular architecture. Support for pluggable consensus protocols is one of the platforms most distinguished features.
  • 1.2K
  • 26 Sep 2023
Topic Review
IoT Serverless Computing at the Edge
Serverless computing is a new concept allowing developers to focus on the core functionality of their code, while abstracting away the underlying infrastructure. Even though there are existing commercial serverless cloud providers and open-source solutions, dealing with the explosive growth of new Internet of Things (IoT) devices requires more efficient bandwidth utilization, reduced latency, and data preprocessing closer to the source, thus reducing the overall data volume and meeting privacy regulations. One way of achieving this is to move serverless computing to the network edge.
  • 1.2K
  • 26 Oct 2021
Topic Review
The Internet of Things in Poland
One definition of the Internet of Things refers to devices that can be directly connected to the internet or other devices using wireless networks or, less frequently, cables. This definition of the IoT includes contemporary telephones, cameras, movement sensors, weather stations, even dishwashers, vehicles, industrial machinery, and daily outfits. Almost any object can get connected to the internet even if it was not manufactured as intended for the IOT, because in the majority of cases its functionality can be extended. The IOT has been growing dynamically, offering smart technological solutions. IoT-based applications are client-server operable which requires a specific communication protocol that can be used to determine a client-server communication model, allowing all clients to perform specific tasks thanks to communications via the internet. Poland’s rural areas that are diversified in terms of economic development are poorly equipped with basic infrastructure, which is a barrier to the functioning of people with limited mobility. 
  • 1.2K
  • 03 Aug 2022
Topic Review
Blockchain Networks Privacy
One of the most widely researched areas in the field of blockchain networks is the domain of preserving blockchain privacy. The reason being the growing concern of several industries and business enterprises to protect their data and trade secrets from unauthorized access. 
  • 1.2K
  • 03 Aug 2021
Topic Review
Human-Smart Environment Interactions
In the context of the challenges facing human computer interaction (HCI) on the one hand and the future Internet on the other, the purpose of this study is to explore the multi-dimensionality of smart cities, looking at relationships and interdependencies through correlating selected dimensions of smartness. Through a review of the research literature, key dimensions of smartness are identified for exploration in the context of smart cities in this work. Methodologically, this work combines an exploratory case study approach consisting of multiple methods of data collection including survey and in-depth interviews, with an explanatory correlational design. In terms of results, the main findings of this work shed light on relationships between selected dimensions of the multi-dimensionality construct of smartness in data-rich urban environments. This work is significant in that it provides correlational information for smart city dimensionalities while contributing to the research literature in this domain; uses a hybrid case study and correlational design in relation to the study of multi-dimensionality; and opens spaces for the study of innovative urban initiatives, taking the ideas and experiences of people from many sectors into consideration.
  • 1.2K
  • 30 Oct 2020
Topic Review
EncFS
EncFS is a Free (LGPL) FUSE-based cryptographic filesystem. It transparently encrypts files, using an arbitrary directory as storage for the encrypted files. Two directories are involved in mounting an EncFS filesystem: the source directory, and the mountpoint. Each file in the mountpoint has a specific file in the source directory that corresponds to it. The file in the mountpoint provides the unencrypted view of the one in the source directory. Filenames are encrypted in the source directory. Files are encrypted using a volume key, which is stored either within or outside the encrypted source directory. A password is used to decrypt this key.
  • 1.2K
  • 27 Oct 2022
Topic Review
Authority-Based Conversation Tracking in Twitter
Twitter is undoubtedly one of the most widely used data sources to analyze human communication. The literature is full of examples where Twitter is accessed, and data are downloaded as the previous step to a more in-depth analysis in a wide variety of knowledge areas. Unfortunately, the extraction of relevant information from the opinions that users freely express in Twitter is complicated, both because of the volume generated—more than 6000 tweets per second—and the difficulties related to filtering out only what is pertinent to our research. Inspired by the fact that a large part of users use Twitter to communicate or receive political information, we created a method that allows for the monitoring of a set of users (which we will call authorities) and the tracking of the information published by them about an event. Our approach consists of dynamically and automatically monitoring the hottest topics among all the conversations where the authorities are involved, and retrieving the tweets in connection with those topics, filtering other conversations out. Although our case study involves the method being applied to the political discussions held during the Spanish general, local, and European elections of April/May 2019, the method is equally applicable to many other contexts, such as sporting events, marketing campaigns, or health crises.
  • 1.2K
  • 28 Oct 2020
Topic Review
ICTs in Agri-Food Logistics
A major challenge of Sustainable Development Goal 12 “Responsible Consumption and Production” is to reduce food losses along production and supply chains. This is particularly critical for fresh food products, due to their perishable and fragile nature, which makes the coordination of the actors all the more crucial to avoid wastes and losses. The rise of new technologies, referred to as “Industry 4.0” powered by the internet of things, big data analytics and artificial intelligence, could bring new solutions to meet these needs. Information and communication technologies (ICTs) allow for frequent exchanges of huge amounts of information between actors in the agrofood chains to coordinate their activities.
  • 1.1K
  • 02 Feb 2022
Topic Review
Software-Defined Networks and Software-Defined Radios in Maritime Communications
Effective maritime communication is vital for ensuring the safety of crew members, vessels, and cargo. The maritime industry is responsible for the transportation of a significant portion of global trade, and as such, the efficient and secure transfer of information is essential to maintain the flow of goods and services. With the increasing complexity of maritime operations, technological advancements such as unmanned aerial vehicles (UAVs), autonomous underwater vehicles (AUVs), and the Internet of Ships (IoS) have been introduced to enhance communication and operational efficiency.
  • 1.1K
  • 22 Jan 2024
Topic Review
Cloud-Native Future Networks
Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile platform for converged network-cloud/edge service provisioning. Intelligent and autonomous management is one of the most challenging issues in cloud-native future networks, and a wide range of machine learning (ML)-based technologies have been proposed for addressing different aspects of the management challenge. It becomes critical that the various management technologies are applied on the foundation of a consistent architectural framework with a holistic vision. This calls for standardization of new management architecture that supports seamless the integration of diverse ML-based technologies in cloud-native future networks. The goal of this paper is to provide a big picture of the recent developments of architectural frameworks for intelligent and autonomous management for future networks.
  • 1.1K
  • 01 Mar 2021
Topic Review
IoT-Based Payment Protocols
Financial services and the payment industry are constantly evolving to meet customer requirements and to create a competitive advantage by providing better banking and financial services, improving operational efficiency and reducing costs. After plastic cards were successfully replaced by the mobile wallet (m-Wallet), the Internet of Things (IoT) leaves the door wide open for consumers to use their connected devices to access their bank accounts and perform routine banking activities from anywhere, anytime, and with any device.
  • 1.1K
  • 21 Nov 2022
Topic Review
Subject–Action–Object Structure and Patent Image Features
Patent application is one of the important ways to protect innovation achievements that have great commercial value for enterprises; it is the initial step for enterprises to set the business development track, as well as a powerful means to protect their core competitiveness. Manual measurement in patent detection is slow, costly, and subjective, and can only play an auxiliary role in measuring the validity of patents. Protecting the inventive achievements of patent holders and realizing more accurate and effective patent detection were the issues explored by academics. There are five main methods to measure patent similarity: clustering-based method, vector space model (VSM)-based method, subject–action–object (SAO) structure-based method, deep learning-based method, and patent structure-based method. 
  • 1.1K
  • 28 Nov 2023
Topic Review
Blockchain-Based Data Management System for ETO Manufacturing
Engineer-to-order (ETO) is a currently popular production model that can meet customers’ individual needs, for which the orders are primarily non-standard parts or small batches. This production model has caused many management challenges, including the difficulty of tracing the production process data of products and the inability to monitor order status in real-time. 
  • 1.1K
  • 08 Oct 2022
Topic Review
A Generative Adversarial Network Technique for Ransomware Behavior Prediction
The ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique attack patterns for each new target, particularly in the pre-encryption phase where evasiveness is prioritized. 
  • 1.1K
  • 30 Oct 2023
Topic Review
Location-Aware Wi-Fi Authentication Scheme
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. A location-aware authentication scheme was proposed, using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. The smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.
  • 1.1K
  • 01 Nov 2020
Topic Review
Knowledge Management System in Small and Medium Enterprises
Knowledge is a key competitive advantage for small and medium enterprises (SMEs) as a way of competing with other organisations. There is a need to investigate SME adoption of knowledge management systems (KMSs). Knowledge management systems can only assist in this task if they are sufficiently adopted.
  • 1.1K
  • 22 Sep 2022
Topic Review
Attack Graph Based on Vulnerability Correlation
As network technology has advanced, and as larger and larger quantities of data are being collected, networks are becoming increasingly complex. Various vulnerabilities are being identified in such networks, and related attacks are continuously occurring. To solve these problems and improve the overall quality of network security, a network risk scoring technique using attack graphs and vulnerability information must be used. This technology calculates the degree of risk by collecting information and related vulnerabilities in the nodes and the edges existing in the network-based attack graph, and then determining the degree of risk in a specific network location or the degree of risk occurring when a specific route is passed within the network.
  • 1.1K
  • 25 Jul 2022
Topic Review
Location Aware Schemes in IoT
The rapid development in wireless technologies is positioning the Internet of Things (IoT) as an essential part of our daily lives. Localization is one of the most attractive applications related to IoT. In the past few years, localization has been gaining attention because of its applicability in safety, health monitoring, environment monitoring, and security.
  • 1.1K
  • 31 May 2021
Topic Review
Key Drivers of 6G Wireless Communication System
Wireless technology revolutionizes communication by enabling the transfer of data, signals, and information without physical cables or wires. It encompasses wireless communication between devices, utilizing radio frequency waves to create wireless networks that facilitate voice calls, text messaging, data transfer, and other forms of communication. Wireless technology has had a profound impact on personal and professional spheres, providing mobility and convenience, and has evolved through various generations, such as 2G, 3G, 4G, 5G, and the ongoing development of 6G, to deliver faster speeds, increased capacity, and advanced capabilities.
  • 1.1K
  • 06 Dec 2023
  • Page
  • of
  • 25
Academic Video Service