Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Avatar Authentication
Anonymity forms the basis of decentralized ecosystems, leading to an increase in criminal activities such as money laundering and illegal currency trading. Especially in blockchain-based metaverse services, activities such as preventing sexual crimes and verifying the identity of adults are becoming essential. Therefore, avatar authentication and the KYC (Know Your Customer) process have become crucial elements.
  • 756
  • 06 Nov 2023
Topic Review
Cross-Layer Methods for Ad Hoc Networks
The Open systems interconnection (OSI)model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of multiple layers. The existing cross-layer methods classification is too complicated because it is based on the whole manifold of network model layer combinations, regardless of their importance.
  • 756
  • 29 Jan 2024
Topic Review
X-ray Images for Cargo Inspection of Nuclear Items
As part of establishing a management system to prevent the illegal transfer of nuclear items, automatic nuclear item detection technology is required during customs clearance. Multiple item insertions to respond to actual X-ray cargo inspection situations and the resulting occlusion expressions significantly affect the performance of the segmentation models.
  • 753
  • 15 Sep 2023
Topic Review
Predicting the Quality of a Website
The main channel for disseminating information is now the Internet. Users have different expectations for the calibre of websites regarding the posted and presented content. The website’s quality is influenced by up to 120 factors, each represented by two to fifteen attributes.
  • 753
  • 25 Sep 2023
Topic Review
Blockchain for Pharmaceutical Distribution System of Counterfeiting Drugs
Counterfeiting drugs has been a global concern for years. Considering the lack of transparency within the current pharmaceutical distribution system, research has shown that blockchain technology is a promising solution for an improved supply chain system. A solution is proposed to provide a transparent flow of medicine between entities within the distribution system. Entities such as hospitals, pharmacies, and government bodies can trace their products back to the manufacturer to ensure the integrity and avoid counterfeit drugs and improve public health using a trust-based reputation decentralized system.
  • 752
  • 14 Apr 2022
Topic Review
Multiagent System and Rainfall-Runoff Model in Hydrological Problems
Typically, hydrological problems require approaches capable of describing and simulating part of the hydrological system, or the environmental consequences of natural or anthropic actions. Tools such as Multiagent System (MAS) and Rainfall-Runoff Model (RRM) can help researchers to develop and better understand water systems. 
  • 750
  • 06 Jan 2022
Topic Review
Transformation of Business Process Manager Profession
The increasing role of emerging technologies, such as big data, the Internet of Things, artificial intelligence (AI), cognitive technologies, cloud computing, and mobile technologies, is essential to the business process manager profession’s sustainable development.  Nevertheless, these technologies could involve new challenges in labor markets.
  • 749
  • 11 Jan 2022
Topic Review
VR and Natural Heritage
Caves can be considered as features of the landscape that have been formatted through a long period and are signs of the past climatological conditions, of prehistoric animal and human inhabitation, and provide habitat for species. The sustainability and protection of cave heritage have been recently discussed mainly because over-tourism has been proven to have negative side effects on the preservation of the heritage site. Technology today has provided widely adopted inexpensive technical means to support immersive visiting experiences to sites of heritage interest that could support their valorization and sustainability in forms more friendly to the site. An alternative visiting approach is explored through a use case applied to the Alistrati cave near Serres, Greece, where a VR tour guide can support immersive visiting experiences to the heritage site. By employing means of digital preservation of heritage sites the VR solution aspires to offer immersive close to reality engaging visiting experiences.
  • 745
  • 12 May 2022
Topic Review
IoT Blockchain-based Applications Classification According to Performance Requirements
A Distributed Ledger Technology (DLT) is a decentralized log of records, the ledger, managed by multiple, usually autonomous, participants (also called users or subjects), across multiple nodes. A blockchain is a type of DLT where transactions are recorded according to an immutable order obtained by means of cryptographic hash functions that chain the blocks in which transactions are recorded. Since DLT gained attention through the diffusion of the blockchain, it is common practice to use the term blockchain even when talking about other types of DLT.
  • 743
  • 08 Jun 2022
Topic Review
Game Theory-Based Incentive Design in Blockchain Networks
Blockchain technology has permeated various sectors and has been lauded for its potential to instill immutability, transparency, and decentralization in systems, thereby revolutionizing traditional systems. At the core of these decentralized networks, nodes are imperative for executing and validating transactions, thereby safeguarding the integrity of the blockchain. Within this ecosystem, nodes, particularly those executing transactions encompassing native currency transfers and function executions, are pivotal yet often lack adequate incentives, in contrast to mining nodes.
  • 740
  • 31 Jan 2024
Topic Review
The Evolution of Artificial Intelligence
Artificial Intelligence (AI) has transitioned from a speculative concept to an integral part of modern life, influencing various sectors and redefining human interaction with technology. This article explores the historical development of AI, its current applications, and the ethical considerations accompanying its rapid advancement.
  • 731
  • 08 Apr 2025
Topic Review
IoT/IIoT and Edge/Fog Computing
The Internet of Things (IoT) can be defined as a paradigm that utilizes intelligent devices that can communicate through the internet. The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. Edge computing is an enabling paradigm that exclusively processes data on the network’s edge. Fog computing is another emerging technology that enables edge devices (i.e., end devices and edge platforms) to perform additional computations, handle data, and allocate network resources.
  • 730
  • 15 Sep 2023
Topic Review
Blockchain-Based Model for the Prevention of Superannuation Fraud
Superannuation is the fund set aside by employers to provide their employees with a dignified retirement. The issues can arise with retirement funds from employers, such as failure to make required contributions to an employee’s superannuation fund, incorrect payments, or debiting the wrong fund, contrary to legal or contractual obligations. Blockchain technology has gained popularity because of its ability to improve security and prevent fraud across many sectors, including finance.
  • 723
  • 27 Nov 2023
Topic Review
Consumerization
Consumerization is the reorientation of product and service designs to focus on (and market to) the end user as an individual consumer, in contrast with an earlier era of only organization-oriented offerings (designed solely for business-to-business or business-to-government sales). Technologies whose first commercialization was at the inter-organization level thus have potential for later consumerization. The emergence of the individual consumer as the primary driver of product and service design is most commonly associated with the IT industry, as large business and government organizations dominated the early decades of computer usage and development. Thus the microcomputer revolution, in which electronic computing moved from exclusively enterprise and government use to include personal computing, is a cardinal example of consumerization. But many technology-based products, such as calculators and mobile phones, have also had their origins in business markets, and only over time did they become dominated by high-volume consumer usage, as these products commoditized and prices fell. An example of enterprise software that became consumer software is optical character recognition software, which originated with banks and postal systems (to automate cheque clearing and mail sorting) but eventually became personal productivity software. In a different sense, consumerization of IT is the proliferation of personally owned IT at the workplace (in addition to, or even instead of, company-owned IT), which originates in the consumer market, to be used for professional purposes. This bring your own device trend has significantly changed corporate IT policies, as employees now often use their own laptops, netbooks, tablets, and smartphones on the hardware side, and social media, web conferencing, cloud storage, and software as a service on the software side.
  • 720
  • 07 Nov 2022
Topic Review
Cybersecurity Analysis of Wearable Devices
Wearable devices are starting to gain popularity, which means that a large portion of the population is starting to acquire these products. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, as they recollect sensitive data, they are starting to be targets for cybercriminals. The number of attacks on wearable devices forces manufacturers to improve the security of these devices to protect them. Many vulnerabilities have appeared in communication protocols, specifically Bluetooth. A passive attack on six different smartwatches was performed to discover their vulnerabilities during the pairing process. Furthermore, a proposal of requirements was developed needed for maximum security of wearable devices, as well as the minimum requirements needed to have a secure pairing process between two devices via Bluetooth.
  • 718
  • 29 Jun 2023
Topic Review
Cryptographic Electronic Voting
Electronic voting (e-voting) is an electronic system that allows users to make a collaborative decision or vote for candidates in an election. It handles the registration of voters, input of vote, vote casting, vote encryption, the transmission of the ballot to the server, vote storing, vote counting, and tabulation of the election result. 
  • 713
  • 06 May 2022
Topic Review
Semantic Analysis of Tabular Data
Understanding the semantics of a table makes it possible to find relationships between various data, form a general picture of the contents of the table, and extract information in a convenient form for further processing.
  • 713
  • 13 Nov 2023
Topic Review
Consumerization of Information Technology
Consumerization is the reorientation of product and service designs to focus on (and market to) the end user as an individual consumer, in contrast with an earlier era of only organization-oriented offerings (designed solely for business-to-business or business-to-government sales). Technologies whose first commercialization was at the inter-organization level thus have potential for later consumerization. The emergence of the individual consumer as the primary driver of product and service design is most commonly associated with the IT industry, as large business and government organizations dominated the early decades of computer usage and development. Thus the microcomputer revolution, in which electronic computing moved from exclusively enterprise and government use to include personal computing, is a cardinal example of consumerization. But many technology-based products, such as calculators and mobile phones, have also had their origins in business markets, and only over time did they become dominated by high-volume consumer usage, as these products commoditized and prices fell. An example of enterprise software that became consumer software is optical character recognition software, which originated with banks and postal systems (to automate cheque clearing and mail sorting) but eventually became personal productivity software. In a different sense, consumerization of IT is the proliferation of personally owned IT at the workplace (in addition to, or even instead of, company-owned IT), which originates in the consumer market, to be used for professional purposes. This bring your own device trend has significantly changed corporate IT policies, as employees now often use their own laptops, netbooks, tablets, and smartphones on the hardware side, and social media, web conferencing, cloud storage, and software as a service on the software side.
  • 712
  • 10 Nov 2022
Topic Review
Atari Microsoft BASIC
The Atari Microsoft BASIC and Atari Microsoft BASIC II variants of the 6502-version of Microsoft BASIC ported to the Atari 8-bit machines. The first version, released 1981, required 32 KB of RAM and was supplied on floppy disk. The second version, released the next year, had most of the code on a ROM cartridge with additional functions on an optional floppy. Atari Microsoft BASIC was highly compatible with contemporary BASICs like AppleSoft BASIC and Commodore BASIC, in contrast to their own Atari BASIC which was a somewhat different dialect and incompatible in many ways. Like Atari BASIC, Atari Microsoft BASIC included a number of new commands and features to take advantage of the Atari platform. These were only partially compatible with the similar features of Atari BASIC.
  • 710
  • 08 Nov 2022
Topic Review
Gamification System to Motivate Human Resources
In the age of Industry 4.0, competition between companies is becoming increasingly intense, and companies are turning to trends that aim to improve overall performance. Accordingly, the company ITEK decided to create a global gamification mechanism focused on motivating employees and encouraging them to perform their tasks in order to obtain incentives.
  • 709
  • 15 Jan 2024
  • Page
  • of
  • 25
Academic Video Service