Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Threat Challenges on RFID Based NFC Applications
The IoT involves Radio Frequency Identification (RFID) as a part of the infrastructure that helps with the data gathering from different types of sensors. In general, security worries have increased significantly as these types of technologies have become more common.
  • 800
  • 01 Nov 2023
Topic Review
Commerce Transaction Requests Encryption
The proliferation of wireless communication networks, credit cards, smartphones, and the continuous growth of e-commerce have led to increased product sales and delivery. E-commerce involves a complex system comprising various elements, including the Internet, online shopping websites, servers, payment methods, product delivery, and customers. However, the transactional information in e-commerce faces potential breaches and threats, emphasizing the need to protect data privacy. To ensure information security, researchers propose a high-performance and secure protocol.
  • 798
  • 14 Aug 2023
Topic Review
Enhancing Ransomware Attack Detection on Cloud-Encrypted Data
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and privacy of cloud-based businesses and their consumers. RANSOMNET+, a state-of-the-art hybrid model that combines Convolutional Neural Networks (CNNs) with pre-trained transformers, to efficiently take on the challenging issue of ransomware attack classification. RANSOMNET+ excels over other models because it combines the greatest features of both architectures, allowing it to capture hierarchical features and local patterns. The findings demonstrate the exceptional capabilities of RANSOMNET+. The model had a fantastic precision of 99.5%, recall of 98.5%, and F1 score of 97.64%, and attained a training accuracy of 99.6% and a testing accuracy of 99.1%. The loss values for RANSOMNET+ were impressively low, ranging from 0.0003 to 0.0035 throughout training and testing. RANSOMNET+ excelled over the other two models in terms of F1 score, accuracy, precision, and recall. The algorithm’s decision-making process was also illuminated by RANSOMNET+’s interpretability analysis and graphical representations. The model’s openness and usefulness were improved by the incorporation of feature distributions, outlier detection, and feature importance analysis. Finally, RANSOMNET+ is a huge improvement in cloud safety and ransomware research. As a result of its unrivaled accuracy and resilience, it provides a formidable line of defense against ransomware attacks on cloud-encrypted data, keeping sensitive information secure and ensuring the reliability of cloud-stored data. Cybersecurity professionals and cloud service providers now have a reliable tool to combat ransomware threats thanks to this research.
  • 795
  • 11 Dec 2023
Topic Review
WSN-IoT
The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as another global breakthrough over the past. The WSN-IoT is reforming the way we live today by spreading through all areas of life, including the dangerous demographic aging crisis and the subsequent decline of jobs. For a company to increase revenues and cost-effectiveness growth should be customer-centered and agile within an organization. WSN-IoT networks have simultaneously faced threats, such as sniffing, spoofing, and intruders. However, WSN-IoT networks are often made up of multiple embedded devices (sensors and actuators) with limited resources that are joined via various connections in a low-power and lossy manner.
  • 793
  • 11 Apr 2023
Topic Review
Development of a Smart Signalization for Emergency Vehicles
As the population increases, the number of motorized vehicles on the roads also increases. As the number of vehicles increases, traffic congestion occurs. Traffic lights are used at road junctions, intersections, pedestrian crossings, and other places where traffic needs to be controlled to avoid traffic chaos. Due to traffic lights installed in the city, queues of vehicles are formed on the streets for most of the day, and many problems arise because of this. One of the most important problems is that emergency vehicles, such as ambulances, fire engines, police cars, etc., cannot arrive on time despite traffic priorities. Emergency vehicles such as hospitals and police departments need to reach the scene in a very short time. Time loss is a problem that needs to be addressed, especially for emergency vehicles traveling in traffic.
  • 791
  • 26 May 2023
Topic Review
IIoT and Privacy-Preserving Architectures
Unlike traditional industrial systems that operate in isolation or with limited connectivity, IIoT systems enable seamless communication between devices and systems, both within a single industrial facility and across multiple sites or locations. This interconnectedness allows for the exchange of data and information, facilitating the integration of operational technology (OT) with information technology (IT) systems.
  • 791
  • 08 Aug 2023
Topic Review
Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks
The domain of information-centric networking (ICN) is expanding as more devices are becoming a part of connected technologies. New methods for serving content from a producer to a consumer are being explored, and Named Data Networking (NDN) is one of them. The NDN protocol routes the content from a producer to a consumer in a network using content names, instead of IP addresses. This facility, combined with content caching, efficiently serves content for very large networks consisting of a hybrid and ad hoc topology with both wired and wireless media.
  • 786
  • 06 Jun 2022
Topic Review
Athlos: A Framework for Developing Scalable MMOG Backends
The development of resource-intensive, distributed, real-time applications like Massively Multiplayer Online Game (MMOG) backends entails a variety of challenges, some of which have been extensively studied. Despite some advancements, the development and deployment of MMOG backends on commodity clouds and high-level computing layers continues to face several obstacles, including a non-standardized development methodology, lack of provisions for scalability, and the need for abstractions and tools to support the development process. In this paper, we describe a set of models, methods, and tools for developing scalable MMOG backends and hosting them on commodity cloud platforms. We present Athlos, a framework that allows game developers to leverage our methodology to rapidly prototype MMOG backends that can run on any type of cloud environment. We evaluate this framework by conducting simulations based on several case-study MMOGs to benchmark its performance and scalability, and compare the development effort needed, and quality of the code produced with other approaches. We find that MMOGs developed using this framework: (a) can support a very high number of simultaneous players under a given latency threshold, (b) elastically scale both in terms of runtime and state, and (c) significantly reduce the amount of effort required to develop them. Coupled with the advantages of high-level computing layers such as Platform, Backend, and Function-as-a-Service, we argue that our framework accelerates the development of high-performance, scalable MMOGs, that leverage the resources of commodity cloud platforms.
  • 786
  • 25 Mar 2022
Topic Review
User-Based Testing with Users with Disabilities
Human-centered design (HCD) “is an approach to interactive systems development that aims to make systems usable and useful by focusing on the users, their needs and requirements, and by applying human factors/ergonomics, and usability knowledge and techniques“. Developing usable and accessible solutions demands conducting usability testing, also called user-based testing, in which users perform real tasks with a prototype or a real system, usually using one or more specific User Interfaces (UIs). A comprehensive understanding of the challenges users face when using solutions, especially when developing accessible solutions, requires including real users with disabilities in user-based testing. An inclusive HCD approach enables the detection and addressing of real problems and barriers experienced by users with disabilities, ultimately improving usability and accessibility based on their valuable feedback. Involving users with disabilities in user-based testing, on the other hand, requires adequate planning and execution of testing considering the different capabilities and limitations of users with disabilities.
  • 782
  • 06 Jul 2023
Topic Review
Augmented Reality-Artificial Intelligence Tools in Manufacturing
An important research area in the field of Industry 4.0 is to find a user-interface that is as convenient and intuitive to use as possible to ensure optimal human–machine interaction. Augmented Reality (AR) together with Advanced Image Recognition, powered by Artificial Intelligence (AI) seem to be a set of technologies supportive in this topic. Apart from user friendly interface, AR-AI tools are proved to provide time savings in manufacturing tasks, while simplifying the job at the same time, enabling inexperienced, unskilled, or less skilled employees to perform the work in the selected manual production processes.
  • 776
  • 24 Jun 2022
Topic Review
Track Warrant
Track warrants are systematized permissions used on some railroad lines to authorize a train's use of the main line. Dispatchers issue these permissions to train crews instead of using signals. The crews receive track warrants by radio, phone, or electronic transmission from a dispatcher.
  • 774
  • 29 Nov 2022
Topic Review
OpenJ9
Eclipse OpenJ9 (previously known as IBM J9) is a high performance, scalable, Java virtual machine (JVM) implementation that is fully compliant with the Java Virtual Machine Specification. OpenJ9 can be built from source, or can be used with prebuilt binaries available at the AdoptOpenJDK project for a number of platforms including Linux and Windows. OpenJ9 is also a core component of the IBM developer kit, which is embedded in many IBM middleware products, including WebSphere Application Server and Websphere Liberty. OpenJ9 is also a component of Open Liberty. Extensive configuration options ensure that the JVM can be tuned to satisfy the requirements of a wide range of Java applications, from complex enterprise applications that run on mainframe hardware to short-lived applications that run on container-based cloud services.
  • 774
  • 29 Nov 2022
Topic Review
TUTOR (Programming Language)
TUTOR (also known as PLATO Author Language) is a programming language developed for use on the PLATO system at the University of Illinois at Urbana-Champaign around 1965. TUTOR was initially designed by Paul Tenczar for use in computer assisted instruction (CAI) and computer managed instruction (CMI) (in computer programs called "lessons") and has many features for that purpose. For example, TUTOR has powerful answer-parsing and answer-judging commands, graphics, and features to simplify handling student records and statistics by instructors. TUTOR's flexibility, in combination with PLATO's computational power (running on what was considered a supercomputer in 1972), also made it suitable for the creation of many non-educational lessons—that is, games—including flight simulators, war games, dungeon style multiplayer role-playing games, card games, word games, and medical lesson games such as Bugs and Drugs (BND).
  • 771
  • 03 Nov 2022
Topic Review
Lexibank
Lexibank is a linguistics database managed by the Max Planck Institute for Evolutionary Anthropology in Leipzig, Germany. The database consists of over 100 standardized wordlists (datasets) that are independently curated.
  • 769
  • 16 Nov 2022
Topic Review
Blockchain-Based Approaches for User Reputation on E-Commerce
User trust is a fundamental issue in e-commerce. To address this problem, recommendation systems have been widely used in different application domains including social media healthcare, e-commerce, and others. In the literature, on the one hand, blockchain-based reputation systems have been highlighted as possible solutions to effectively provide the necessary transparency, as well as effective identity management. On the other hand, new challenges are posed in terms of user privacy and performance, due to the specific characteristics of the blockchain. According to the literature, two major approaches have been proposed based on public and permissioned blockchains. Each approach applies adjusted models for calculating reputation scores.
  • 765
  • 18 Jan 2023
Topic Review
Cybersecurity in the Maritime Sector
Global maritime sector is increasingly reliant on digitalisation, operational integration, and automation. Leading shipbuilders and operators seek to innovate by utilizing cutting-edge technologies and systems that go beyond traditional designs to create ships with advanced remote control, communication, and connectivity capabilities. Those capabilities are tested through various autonomous vessel projects.
  • 763
  • 25 Mar 2022
Topic Review
Blockchain-Based Federated Learning System in UAV-MEC Networks
The widespread use of UAVs in smart cities for tasks like traffic monitoring and environmental data collection creates significant privacy and security concerns due to the transmission of sensitive data. Traditional UAV-MEC systems with centralized data processing expose this data to risks like breaches and manipulation, potentially hindering the adoption of these valuable technologies. UBFL, is a novel privacy-preserving federated learning mechanism that integrates blockchain technology for secure and efficient data sharing. Unlike traditional methods relying on differential privacy (DP), UBFL employs an adaptive nonlinear encryption function to safeguard the privacy of UAV model updates while maintaining data integrity and accuracy. 
  • 760
  • 07 Mar 2024
Topic Review
Virtual Assistants in Industry 4.0
Information and Communication Technologies are driving the improvement of industrial processes. According to the Industry 4.0 (I4.0) paradigm, digital systems provide real-time information to humans and machines, increasing flexibility and efficiency in production environments. Based on the I4.0 Design Principles concept, Virtual Assistants can play a vital role in processing production data and offer contextualized and real-time information to the workers in the production environment. 
  • 759
  • 17 Oct 2023
Topic Review
The Theory of Mobile Usability
The success of a new mobile application depends on a variety of factors ranging from business understanding, customer value, and perceived quality of use. In this sense, the topic of usability testing of mobile applications is relevant from the point of view of user satisfaction and acceptance. 
  • 759
  • 01 Mar 2024
Topic Review
A Proactive Protection by Computational Intelligence Methods
A combination of computational intelligence methods: identifying anomalies in network traffic by evaluating its self-similarity, detecting and classifying cyberattacks in anomalies, and taking effective protection measures using Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) cells.
  • 758
  • 25 Oct 2022
  • Page
  • of
  • 25
Academic Video Service