Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Urban Flood Monitoring Technology
Owing to rapid climate change, large-scale floods have occurred yearly in cities worldwide, causing serious damage. General flooding and overflow modeling was performed based on a model that utilizes the flow of water and its geographical characteristics. More detailed geographical data and drainage network information are utilized in urban regions.
  • 708
  • 27 Nov 2023
Topic Review
Development of Discrete Global Grid Systems
The rapid growth in Earth’s global geospatial data necessitates an efficient system for organizing the data, facilitating data fusion from diverse sources, and promoting interoperability. Mapping the spheroidal surface of the planet presents significant challenges as it involves balancing distortion and splitting the surface into multiple partitions. The distortion decreases as the number of partitions increases, but, at the same time, the complexity of data processing increases since each partition represents a separate dataset and is defined in its own local coordinate system.
  • 695
  • 07 Sep 2023
Topic Review
Thematic Evolution of Virtual Manufacturing Literature (1983–2023)
Virtual manufacturing (VM) technology emerged in the 1980s as a revolutionary strategy to optimize and streamline the entire product/service manufacturing lifecycle. However, over the years, its popularity appears to have waned. Further, the advent of the fourth industrial revolution (4IR) or Industry 4.0 brings with it other integrated digital technologies, including the Internet of Things (IoT), Blockchain, and digital twin (DT), among others. DT offers functions like VM plus other benefits, including intelligent manufacturing, to revolutionize future manufacturing operations activities and predictive capability using real-time data.
  • 695
  • 30 Oct 2023
Topic Review
Searchable Attribute-Based Encryption Schemes
Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms.
  • 694
  • 01 Jun 2023
Topic Review
Industry 4.0 Innovation
Industry 4.0 has revolutionized manufacturing processes and facilities through the creation of smart and sustainable production facilities. Blockchain technology (BCT) has emerged as an invaluable asset within Industrial Revolution 4.0 (IR4.0), offering increased transparency, security, and traceability across supply chains. 
  • 693
  • 26 Feb 2024
Topic Review
News Analytics
In trading strategy, news analysis refers to the measurement of the various qualitative and quantitative attributes of textual (unstructured data) news stories. Some of these attributes are: sentiment, relevance, and novelty. Expressing news stories as numbers and metadata permits the manipulation of everyday information in a mathematical and statistical way. This data is often used in financial markets as part of a trading strategy or by businesses to judge market sentiment and make better business decisions. News analytics are usually derived through automated text analysis and applied to digital texts using elements from natural language processing and machine learning such as latent semantic analysis, support vector machines, "bag of words" among other techniques.
  • 692
  • 28 Sep 2022
Topic Review
TScript
TScript is an object-oriented embeddable scripting language for C++ that supports hierarchical transient typed variables (TVariable). Its main design criterion is to create a scripting language that can interface with C++, transforming data and returning the result. This enables C++ applications to change their functionality after installation.
  • 692
  • 18 Oct 2022
Topic Review
Multi-Eye to Robot Indoor Calibration Dataset
The METRIC dataset comprises more than 10,000 synthetic and real images of ChAruCo and checkerboard patterns. Each pattern is securely attached to the robot's end-effector, which is systematically moved in front of four cameras surrounding the manipulator. This movement allows for image acquisition from various viewpoints. The real images in the dataset encompass multiple sets of images captured by three distinct types of sensor networks: Microsoft Kinect V2, Intel RealSense Depth D455, and Intel RealSense Lidar L515. The purpose of including these images is to evaluate the advantages and disadvantages of each sensor network for calibration purposes. Additionally, to accurately assess the impact of the distance between the camera and robot on calibration, researchers obtained a comprehensive synthetic dataset. This dataset contains associated ground truth data and is divided into three different camera network setups, corresponding to three levels of calibration difficulty based on the cell size.
  • 689
  • 09 Jun 2023
Topic Review
Rate-Distortion-Based Steganography Via Generative Adversarial Network
Information hiding can imperceptibly transfer secret information into chosen cover media. It can ensure the origins of data and behave as a second channel for data transmission. Steganography is the art of covering or hiding extra data inside a chosen cover message, e.g., an image. The term itself dates back to the 15th century; in a typical scenario, the sender hides a secret message inside a cover image and transmits it to the receiver, who recovers the message. Even if eavesdroppers monitor or intercept the communication in-between, no one besides the sender and receiver should detect the presence of the hidden message.
  • 687
  • 04 Aug 2022
Topic Review
Blockchain-Based Identity and Access Management
Identity and Access Management (IAM) has the ability to provide defense against a great number of security threats. While decentralization of IoT seems to be a solution for improved resource management and scalability, most of the services remain centralized exposing IoT systems to malicious attacks. Blockchain however, is a technology which can natively support decentralization as well as access and authorization management techniques, by using the corresponding programmable logic and leveraging cryptographic mechanisms for privacy and security. Using standardized frameworks (e.g., Decentralized Identifiers and Verifiable Credentials), a blockchain-based access and authorization solution can present the basis for a uniform decentralized IAM framework not only for IoT, but for decentralized systems in general. The two main issues which stand between such a radical system and its broad use are firstly, to be able to seamlessly integrate blockchain and provide the basis for a decentralized IAM framework, while secondly (and most importantly) resolving the challenge of integrating within existing IoT (or other) systems, avoiding redesigning and redeveloping on behalf of the manufacturers.
  • 683
  • 15 Dec 2023
Topic Review
The Principles of Blockchain Technology in Healthcare
A blockchain may be seen as a distributed ledger that allows peers to exchange data. It was launched with Bitcoin and resolved a persistent issue: the double-spend problem. With Bitcoin, this is accomplished by a majority consensus of so-called mining nodes and the addition of legitimate transactions to the blockchain. Bitcoin was the first to use blockchain technology. Therefore, introducing a coin is not required to utilize blockchain and develop decentralized apps. 
  • 679
  • 26 Jul 2023
Topic Review
Application of IoT in Virus Detection
Today, healthcare system models should have high accuracy and sensitivity so that patients do not have a misdiagnosis. For this reason, sufficient knowledge of the area is required, with the medical staff being able to validate the correctness of their decisions. Therefore, artificial intelligence (AI) in combination with other emerging technologies could provide many benefits in the medical sector.
  • 679
  • 11 Mar 2024
Topic Review
Core Technologies for Smart IoHT Applications
Some advanced technologies and solutions have been researched, developed, and deployed in the smart healthcare field, such as smart sensors, autonomous devices, robots, intelligent computing solutions, and virtual reality.
  • 678
  • 11 May 2023
Topic Review
Anonymizing Transaction Data with Set Values
The definition of anonymity emphasizes the fact that the attacker can identify a person based on some of the sensitive set values about which the attacker has prior knowledge of in the set value data.
  • 678
  • 26 Jul 2023
Topic Review
Aspect Weaver
An aspect weaver is a metaprogramming utility for aspect-oriented languages designed to take instructions specified by aspects (isolated representations of significant concepts in a program) and generate the final implementation code. The weaver integrates aspects into the locations specified by the software as a pre-compilation step. By merging aspects and classes (representations of the structure of entities in the program), the weaver generates a woven class. Aspect weavers take instructions known as advice specified through the use of pointcuts and join points, special segments of code that indicate what methods should be handled by aspect code. The implementation of the aspect then specifies whether the related code should be added before, after, or throughout the related methods. By doing this, aspect weavers improve modularity, keeping code in one place that would otherwise have been interspersed throughout various, unrelated classes.
  • 676
  • 13 Oct 2022
Topic Review
Earth Current Field Information Transmission Technology
Starting from the need for emergency rescue information transmission in tunnel engineering accidents focuses on researching and solving the technical problems of information transmission between rescue personnel and trapped personnel after tunnel engineering collapse accidents, before and during the rescue process.
  • 668
  • 10 Jul 2023
Topic Review
Java Security
The Java platform provides a number of features designed for improving the security of Java applications. This includes enforcing runtime constraints through the use of the Java Virtual Machine (JVM), a security manager that sandboxes untrusted code from the rest of the operating system, and a suite of security APIs that Java developers can utilise. Despite this, criticism has been directed at the programming language, and Oracle, due to an increase in malicious programs that revealed security vulnerabilities in the JVM, which were subsequently not properly addressed by Oracle in a timely manner.
  • 667
  • 30 Oct 2022
Topic Review
SBGTool v2.0: An Empirical Study
SBGTool v2.0 differs from SBGTool due to design changes made in response to teacher suggestions, the addition of sorting options to the dashboard table, the addition of a dropdown component to group the students into classrooms, and improvement in some visualizations. By applying SBGTool v2.0, teachers may compare the outcomes of individual students inside a classroom, determine which subjects are the most and least difficult over the period of a week or an academic year, identify the numbers of correct and incorrect responses for the most difficult and easiest subjects, categorize students into various groups based on their learning outcomes, discover the week with the most interactions for examining students’ engagement, and find the relationship between students’ activity and study success. 
  • 665
  • 08 Aug 2022
Topic Review
Enhancing Communication Security an In-Vehicle Wireless Sensor Network
The adoption of wireless sensor networks (WSNs) in vehicle systems represents a transformative development in the automotive sector, broadening the scope of functionalities from simple monitoring and control to facilitating sophisticated driver assistance and self-driving features. Secure in-vehicle communication systems are integral to the realization of fully connected and automated urban environments, where vehicles and city systems operate in harmony to optimize city life.
  • 663
  • 01 Apr 2024
Topic Review
Construction and Analysis of Distributed Processes
CADP (Construction and Analysis of Distributed Processes) is a toolbox for the design of communication protocols and distributed systems. CADP is developed by the CONVECS team (formerly by the VASY team) at INRIA Rhone-Alpes and connected to various complementary tools. CADP is maintained, regularly improved, and used in many industrial projects. 
  • 656
  • 09 Oct 2022
  • Page
  • of
  • 25
Academic Video Service