Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
P-IOTA
The recent widespread novel network technologies for programming data planes are remarkably enhancing the customization of data packet processing. In this direction, the Programming Protocol-independent Packet Processors (P4) is envisioned as a disruptive technology, capable of configuring network devices in a highly customizable way. P4 enables network devices to adapt their behaviors to mitigate malicious attacks (e.g., denial of service). Distributed ledger technologies (DLTs), such as blockchain, allow secure reporting alerts on malicious actions detected across different areas. IOTA is a next-generation distributed ledger engineered to tackle the scalability limits while still providing the same security capabilities such as immutability, traceability, and transparency. P-IOTA integrates a P4-based data plane software-defined network (SDN) and an IOTA layer employed to notify about networking attacks. 
  • 577
  • 14 Mar 2024
Topic Review
Authentication Paradigms in the Internet of Things
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation of robust security measures such as authentication has become paramount to safeguarding sensitive data and maintaining the integrity of connected devices. Symmetry in the IoT commonly denotes the uniformity or equilibrium in data distribution and processing across devices or nodes in a network. Leveraging symmetric patterns can enhance the robustness and scalability of IoT authentication. 
  • 568
  • 08 Feb 2024
Topic Review
An Ontology-Based Approach for Knowledge Acquisition
Selecting the right supplier is a critical decision in sustainable supply chain management. Sustainable supplier selection plays an important role in achieving a balance between the three pillars of a sustainable supply chain: economic, environmental, and social.
  • 566
  • 27 Dec 2022
Topic Review
New ICT
New ICT is an open, customer-driven ecosystem which is proposed by the information technology company Huawei. In simple terms, the new ICT fully converges IT and CT technologies to offer large-scale communication, storage, and processing capabilities. The new ICT works as a flexible, agile platform to adapt to ever-changing business goals, system environments, and application configurations. The new ICT era has three compelling characteristics: business-driven development, agile innovation, and a new ecosystem.
  • 565
  • 14 Oct 2022
Topic Review
The Microverse
The proliferation of Internet of Things (IoT) technology combined with evolving artificial intelligence (AI) and machine learning (ML) promote unprecedented advancements in ubiquitous and seamless services for human activities. In the context of smart cities, the fusion of the metaverse with the IoT—an expansive network of interlinked devices and sensors—heralds a transformative era in urban interaction, blending the digital with the physical.
  • 563
  • 01 Mar 2024
Topic Review
Multiauthority Ciphertext Policy-Attribute-Based Encryption
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers brings a significant dilemma in implementing fog computing. The computational power of the resources constrains Internet of Things (IoT) devices in the fog-computing environment. Therefore, an attacker can easily attack. Traditional methods like attribute-based encryption (ABE) techniques are inappropriate for resource-constraint devices with protracted computing and limited computational capabilities. In this regard, researchers investigate a multiauthority ciphertext policy-attribute-based encryption (MA-CP-ABE) method that enables multiauthority attribute revocation and computation outsourcing.
  • 561
  • 30 Oct 2023
Topic Review
Machine Learning in Cloud Computing
Cloud Computing is one of the emerging fields in the modern-day world. Due to the increased volume of job requests, job schedulers have received updates one at a time. The evolution of machine learning in the context of cloud schedules has had a significant impact on cost reduction in terms of energy consumption and makespan. 
  • 556
  • 23 Oct 2023
Topic Review
Sequential Spacecraft Depth Completion
The recently proposed spacecraft three-dimensional (3D) structure recovery method based on optical images and LIDAR has enhanced the working distance of a spacecraft’s 3D perception system.
  • 550
  • 20 Oct 2023
Topic Review
Stepping-Stone Intrusion Detection Resistant to Intruders’ Chaff-Perturbation
Using stepping-stone intrusion (SSI), the intruder’s identity is very difficult to discover as it is concealed by a long interactive connection chain of hosts. An effective approach for SSI detection (SSID) is to determine how many connections are contained in a connection chain. 
  • 545
  • 28 Sep 2023
Topic Review
Interplanetary File System, Ethereum, Web3.js, Ethers.js and Dependencies
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of storing data on the blockchain, on the other hand, is prohibitively expensive. 
  • 541
  • 23 Nov 2023
Topic Review
Ele-Monitoring Systems and Ontology-Based Models in Asthma Domain
Asthma is a chronic respiratory disease characterized by severe inflammation of the bronchial mucosa. Allergic asthma is the most common form of this health issue. Asthma is classified into allergic and non-allergic asthma, and it can be triggered by several factors such as indoor and outdoor allergens, air pollution, weather conditions, tobacco smoke, and food allergens, as well as other factors. Asthma symptoms differ in their frequency and severity since each patient reacts differently to these triggers. 
  • 535
  • 24 Jun 2022
Topic Review
BGP Dataset-Based Malicious User Activity Detection
Recent advances in the Internet and digital technology have brought a wide variety of activities into cyberspace, but they have also brought a surge in cyberattacks, making it more important than ever to detect and prevent cyberattacks.
  • 534
  • 22 Sep 2023
Topic Review
Blockchain Technology and Smart Contracts in Energy
The energy sector is undergoing a period of technological transformation, driven by the emergence of blockchain and smart contracts. These technologies have the potential to revolutionize energy markets and significantly reduce transaction costs, improve efficiency, and increase transparency. The rising energy prices in recent years have been a cause for global concern. The prospects of incorporating smart contracts and blockchain technology into the energy sector are promising. 
  • 528
  • 10 Jan 2024
Topic Review
Perceptual Encryption-Based Image Communication System for Tuberculosis Diagnosis
Block-based perceptual encryption (PE) algorithms are becoming popular for multimedia data protection because of their low computational demands and format-compliancy with the JPEG standard. In conventional methods, a colored image as an input is a prerequisite to enable smaller block size for better security. However, in domains such as medical image processing, unavailability of color images makes PE methods inadequate for their secure transmission and storage. A PE method that is applicable for both color and grayscale images is proposed. The EfficientNetV2-based model is implemented for automatic tuberculosis (TB) diagnosis in chest X-ray images.
  • 524
  • 21 Sep 2022
Topic Review
Addressing ZSM Security Issues with Blockchain Technology
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ultra-low latency, high availability and wide service coverage can be met across the network regardless of the network infrastructure ownership. Blockchain technology inherently addresses security in trustless environments such as the infrastructures defined by the Zero-touch Service Management (ZSM) team.
  • 515
  • 19 Jan 2024
Topic Review
Augmented Reality Environments
Contemporary software applications have shifted focus from 2D representations to 3D. Augmented and Virtual Reality (AR/VR) are two technologies that have captured the industry’s interest as they show great potential in many areas. As extended Reality (XR) technology evolves, the development and integration of natural interaction methods into these environments becomes increasingly important. The existing technologies, both software and hardware, are rapidly advancing, requiring developers to constantly learn new tools, and forbidding them from reusing existing components. In addition, companies oblige developers to use specific tools. The lack of frameworks and libraries with which to facilitate this process can discourage developers from engaging with this technology.
  • 511
  • 15 Oct 2023
Topic Review
AI-Based Model for Knowledge Evaluation in Public Organizations
In the construction of knowledge bases, it is very important to evaluate the quality of the knowledge entered into them. Artificial Intelligence (AI) development has led to the research of knowledge management tools for multi-user environments, among many other AI applications. In the knowledge management field, the construction of ontologies as knowledge repositories using various sources requires a means of evaluation of all: the input ontologies and the integration process on the output ontology. The results obtained from the evaluations serve as guides to measure the quality of the repository.
  • 501
  • 01 Nov 2023
Topic Review
Redactable Blockchain and Its Applications in Medical Field
Electronic Health Records (EHRs) are a relatively new computer technology that can help major medical systems cope with the complex problems of traditional medical records, such as storage and sharing. As blockchain technology evolves, it has become a crucial component in medical data sharing.
  • 500
  • 09 Nov 2023
Topic Review
Test-Time Augmentation for Network Anomaly Detection
Machine learning-based Network Intrusion Detection Systems (NIDS) are designed to protect networks by identifying anomalous behaviors or improper uses. In recent years, advanced attacks, such as those mimicking legitimate traffic, have been developed to avoid alerting such systems. Test-Time Augmentation for Network Anomaly Detection (TTANAD), which utilizes test-time augmentation to enhance anomaly detection from the data side.
  • 495
  • 28 Jul 2023
Topic Review
Cyber Resilience
Cyber resilience refers to an organization’s capability to maintain its targeted performance despite a cybersecurity breach.
  • 491
  • 15 Sep 2023
  • Page
  • of
  • 25
Academic Video Service