Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Bluetooth 5.0 for Emergency Response within Fire Environments
Natural disasters, such as wildfires, can cause widespread devastation. Future-proofing infrastructure, such as buildings and bridges, through technological advancements is crucial to minimize their impact. Fires in disasters often stem from damaged fuel lines and electrical equipment, such as the 2018 California wildfire caused by a power line fault. To enhance safety, IoT applications can continuously monitor the health of emergency personnel. Using Bluetooth 5.0 and wearables in mesh networks, these apps can alert others about an individual’s location during emergencies.
  • 490
  • 22 Nov 2023
Topic Review
Satellite-Assisted Disrupted Communications
The space industry has witnessed a resurgence, characterized by a notable proliferation of satellites operating at progressively lower altitudes, promising extensive global coverage and terrestrial-level data transfer speeds, while remaining cost-effective solutions. In particular, Wireless Sensor Networks (WSNs) can benefit from the wide coverage of space infrastructure due to their extensive deployment, disrupted communication nature, and the potential absence of terrestrial support. 
  • 490
  • 09 Jan 2024
Topic Review
Data-Driven Management of Vaccination
Vaccination is critical to preventing the spread of diseases. It stimulates the immune system to produce antibodies that fight specific diseases, eradicating and reducing their incidence.
  • 486
  • 24 Nov 2023
Topic Review
Cloud-Based Platforms for Health Monitoring
The main objective of the most popular healthcare platforms, including Apple Health, Google Fit, Samsung Health, and Fitbit, is to provide a well-coordinated, personalized, and satisfying user experience while reducing the overall cost of care. Health platforms can improve the health status of the population by fostering collaboration and integration among the various stakeholders in the health sector. Successful efforts to improve population health require that stakeholders are open and willing to leverage each other’s assets, such as data, skills, and resources.
  • 486
  • 03 Jan 2024
Topic Review
Digital Twins for Access Networks
As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by providing a virtual representation of the physical network, enabling analysis, diagnosis, emulation, and control. The emergence of Software-defined network (SDN) has facilitated a holistic view of the network topology, enabling the use of Graph neural network (GNN) as a data-driven technique to solve diverse problems in future networks.
  • 484
  • 06 Dec 2023
Topic Review
Information Consumer Experience
This text addresses the information consumer experience (ICX) in a Chilean Higher Education institution through the design and implementation of an user-centric centralized information management system. This system was created using an adapted design thinking methodology with an ICX perspective to identify and integrate the information consumers’ demands and other factors correlated with ICX into the system’s design. This approach also helps to address data quality and information management quality (IMQ) problems of the organization, representing a centralized data source for all information consumers into the organization, offering consistent, accessible, and good quality data to address daily work and enhance information consumers experience, and managerial work.
  • 473
  • 01 Dec 2023
Topic Review
Taxonomic Exploration of Healthcare IoT
An Internet of things (IoT) ecosystem is a fast-developing network in which users can connect a heterogeneity of physical and virtual devices, including customized healthcare areas. As medical resources are scarce, populations are aging with chronic diseases and require remote monitoring, medical expenses are rising, and telemedicine is being demanded in developing nations, the IoT is an attractive topic in healthcare. Through the IoT, people can enjoy better health and diminish pressure on sanitary systems.
  • 463
  • 30 Jan 2024
Topic Review
Multicast Joining Node Selection Method
Network layer multicast is a powerful method for transmitting data from sources to multiple group members. When joining a multicast group, a group member first sends a request to a designated router (DR). Then, the DR selects a node in the existing multicast tree (known as a multicast joining node, or MJN) to establish a multicast distribution path from the MJN to itself. The MJN selection method runs on the DR and has a significant impact on the distribution of the multicast tree, that directly affects the load distribution in the network. However, the current MJN selection method cannot effectively detect the load status of the downlink multicast path in the case of asymmetric routing, leading to network congestion and limiting the number of multicast groups that the network can accommodate (multicast capacity). 
  • 417
  • 24 Oct 2023
Topic Review
MapReduce Job Scheduling Exploiting Heterogeneity in Cloud Environments
In cyber-physical systems (CPS), micromachines are typically deployed across a wide range of applications, including smart industry, smart healthcare, and smart cities. Providing on-premises resources for the storage and processing of huge data collected by such CPS applications is crucial. The cloud provides scalable storage and computation resources, typically through a cluster of virtual machines (VMs) with big data tools such as Hadoop MapReduce.
  • 413
  • 18 Oct 2023
Topic Review
Advanced Persistent Threat Predictive Analytics
Advanced persistent threat (APT) audit logs information and uses a combination of causal graphs and deep learning techniques to perform predictive analysis of APT.
  • 413
  • 28 Dec 2023
Topic Review
Cyber Warriors Conclave
In today's digital age, cybersecurity is a crucial skill for everyone. Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. These attacks aim to access, change, or destroy sensitive information, extort money from users, or interrupt normal business processes. Everyday citizens need to understand the basics of cybersecurity to protect themselves from these threats.
  • 400
  • 03 Jul 2024
Topic Review
Optimizing Data Processing
Intelligent applications in several areas increasingly rely on big data solutions to improve their efficiency, but the processing and management of big data incur high costs. Although cloud-computing-based big data management and processing offer a promising solution to provide scalable and abundant resources, the current cloud-based big data management platforms do not properly address the high latency, privacy, and bandwidth consumption challenges that arise when sending large volumes of user data to the cloud. Computing in the edge and fog layers is quickly emerging as an extension of cloud computing used to reduce latency and bandwidth consumption, resulting in some of the processing tasks being performed in edge/fog-layer devices. Although these devices are resource-constrained, recent increases in resource capacity provide the potential for collaborative big data processing. 
  • 390
  • 05 Feb 2024
Topic Review Peer Reviewed
Horizontal Autoscaling of Virtual Machines in Hybrid Cloud Infrastructures: Current Status, Challenges, and Opportunities
The deployment of virtual machines (VMs) within the Infrastructure as a Service (IaaS) layer across public, private, or hybrid cloud infrastructures is prevalent in various organisational settings for hosting essential business services. However, achieving rapid elasticity, or autoscaling, and ensuring quality of service amidst fluctuating service demands and available computing resources present significant challenges. Unlike the Platform as a Service (PaaS) and Software as a Service (SaaS) layers, where cloud providers offer managed elasticity features, the VMs at the IaaS layer often lack such capabilities. This paper scrutinises the constraints surrounding the rapid elasticity of VMs within single and hybrid cloud environments at the IaaS layer. It provides a critical analysis of the existing research gaps, emphasising the necessity for the horizontal elasticity of VMs extended across hybrid clouds, coupled with predictive capabilities integrated into the elasticity mechanism. This paper’s focus is particularly beneficial in scenarios where workloads require VM provisioning from multiple clouds to eliminate vendor lock-in and enhance quality of service (QoS) assurances, especially in instances of platform failures. Through critical examination, several research challenges are identified, delineating the existing research gap and outlining future research directions. This paper contributes to the research challenges of VM elasticity in complex cloud environments and underscores the imperative for innovative solutions to address these challenges effectively.
  • 369
  • 07 Mar 2025
Topic Review
Data Visualization Tools for Business Applications
In today’s data-driven business landscape, the ability to extract insights and communicate complex information effectively is paramount. Data visualization has emerged as a powerful tool for businesses to make informed decisions, uncover patterns, and present findings in a compelling manner. From executives seeking strategic insights to analysts delving into operational data, the demand for intuitive and informative visualizations spans across all levels of an organization. Data Visualization Tools for Business Applications comprehensively equips professionals with the knowledge and skills necessary to leverage data visualization tools effectively. Through a blend of theory and hands-on case studies, this book explores a wide range of data visualization tools, techniques, and methodologies. Covering topics such as business analytics, cyber security, and financial reporting, this book is an essential resource for business executives and leaders, marketing professionals, data scientists, entrepreneurs, academicians, educators, students, decision-makers and stakeholders, and more.
  • 322
  • 31 Oct 2024
Topic Review Peer Reviewed
Classifying Cyber Ranges: A Case-Based Analysis Using the UWF Cyber Range
To address the gaps in cyber range survey research, this entry develops and applies a structured classification taxonomy to support the comparison, evaluation, and design of cyber ranges. The entry will address the following question: What are the objectives and key features of current cyber ranges, and how can they be classified into a comprehensive taxonomy? The entry synthesizes existing frameworks and analyzes and classifies a variety of documented cyber ranges to find similarities and gaps in the current classification methods. The findings indicate recurring design elements across ranges, persistent gaps in standardization, and demonstrate how the University of West Florida (UWF) Cyber Range exemplifies the taxonomy application in practice. The goal is to facilitate informed decision-making by cybersecurity professionals when choosing platforms and to support academic research in cybersecurity education. Pulling information from studies about other cyber ranges to compare with the UWF Cyber Range, this taxonomy aims to contribute to the documentation of cyber ranges by providing a clear understanding of the current cyber range landscape.
  • 131
  • 15 Oct 2025
Topic Review
Attribute-Based Data Access Control in Resource-constrained Environments
The elastic computing has significantly facilitated communication and collaboration among all stakeholders, but security is still a major concern in public cloud environment. Attribute based encryption (ABE) can implement fine-grained access control on encrypted data, but most ABE schemes involve in much complex computation to guarantee robust security. It is hard to enable consistent ABE encryption and decryption among resource-constrained nodes. It is a practical and fundamental problem to realize lightweight ABE owing to constrained computing resources and storage capacity of terminal devices.
  • 5
  • 21 Jan 2026
  • Page
  • of
  • 25
Academic Video Service