You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review Video
Graph Burning
The graph burning problem is a relatively new combinatorial optimization problem that helps quantify a graph's vulnerability. It is defined in terms of a fundamental diffusion model.
  • 1.3K
  • 21 Jul 2023
Topic Review
Elastic Load Balancing
Amazon Elastic Compute Cloud (EC2) is a part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), that allows users to rent virtual computers on which to run their own computer applications. EC2 encourages scalable deployment of applications by providing a web service through which a user can boot an Amazon Machine Image (AMI) to configure a virtual machine, which Amazon calls an "instance", containing any software desired. A user can create, launch, and terminate server-instances as needed, paying by the second for active servers – hence the term "elastic". EC2 provides users with control over the geographical location of instances that allows for latency optimization and high levels of redundancy. In November 2010, Amazon switched its own retail website platform to EC2 and AWS.
  • 1.3K
  • 27 Oct 2022
Topic Review
Moving Target Defense Techniques
Represented by reactive security defense mechanisms, cyber defense possesses a static, reactive, and deterministic nature, with overwhelmingly high costs to defend against ever-changing attackers. To change this situation, researchers have proposed moving target defense (MTD), which introduces the concept of an attack surface to define cyber defense in a brand-new manner, aiming to provide a dynamic, continuous, and proactive defense mechanism. With the increasing use of machine learning in networking, researchers have discovered that MTD techniques based on machine learning can provide omni-bearing defense capabilities and reduce defense costs at multiple levels. 
  • 1.3K
  • 05 May 2023
Topic Review
Blockchain Enabled Cyber-Physical Systems
Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. 
  • 1.2K
  • 25 Apr 2022
Topic Review
List of 16-bit Computer Hardware Palettes
This is a list of notable 16-bit RGB color palettes, which were primarily manufactured from 1985 to 1995. Due to mixed-bit architectures, the n-bit distinction is not always a strict categorization.
  • 1.2K
  • 10 Nov 2022
Topic Review
Structure-Borne Noise in Offshore Piling
The growing demand for renewable energy supply stimulates a drastic increase in the deployment rate of offshore wind energy. Offshore wind power generators are usually supported by large foundation piles that are driven into the seabed with hydraulic impact hammers or vibratory devices. The pile installation process, which is key to the construction of every new wind farm, is hindered by a serious by-product: the underwater noise pollution. 
  • 1.2K
  • 14 Sep 2021
Topic Review
Smart Parking System Based on Edge-Cloud-Dew Computing Architecture
In a smart parking system, the license plate recognition service controls the car’s entry and exit and plays the core role in the parking lot system. When the Internet is interrupted, the parking lot’s business will also be interrupted. Hence, an Edge-Cloud-Dew architecture for the mobile industry was proposed in order to tackle this critical problem. The architecture has an innovative design, including LAN-level deployment, Platform-as-a-Dew Service (PaaDS), the dew version of license plate recognition, and the dew type of machine learning model training. Based on these designs, the architecture presents many benefits, such as: (1) reduced maintenance and deployment issues and increased dew service reliability and sustainability; (2) effective release of the network constraint on cloud computing and increase in the horizontal and vertical scalability of the system; (3) enhancement of dew computing to resolve the heavy computing process problem; and (4) proposal of a dew type of machine learning training mechanism without requiring periodic retraining, but with acceptable accuracy. 
  • 1.2K
  • 03 Jul 2023
Topic Review
Exploring the Potential of Quantum Computing
Quantum computing is a rapidly evolving field with the potential to revolutionize computing as we know it. It presents significant benefits in fields such as drug discovery, cryptography, and artificial intelligence, but also poses risks such as the potential to break current encryption methods and compromise sensitive data. This research provides an overview of the potential benefits and risks of quantum computing, as well as the challenges associated with its development. The research also discusses the pioneers in the field, open challenges, and security aspects.
  • 1.2K
  • 22 May 2023
Topic Review
Asperitas Microdatacenter
A microdatacenter is a small, self contained data center consisting of computing, storage, networking, power and cooling. Micro data centers typically employ water cooling to achieve compactness, low component count, low cost and high energy efficiency. Its small size allows decentralised deployment in places where traditional data centers cannot go, for instance edge computing for Internet of things.
  • 1.2K
  • 01 Nov 2022
Topic Review
Metaheuristic Approach for University Course Timetabling Problems
The university course timetabling problem (UCTP) is a multidimensional assignment problem that involves assigning students and teachers to events (or courses), which are then allocated to appropriate timeslots and rooms. The UCTP can be categorized into two categories: post-enrollment-based course timetabling problems (PE-CTPs) and curriculum-based course timetabling problems (CB-CTPs). 
  • 1.2K
  • 09 Aug 2023
Topic Review
Blockchain Networks Privacy
One of the most widely researched areas in the field of blockchain networks is the domain of preserving blockchain privacy. The reason being the growing concern of several industries and business enterprises to protect their data and trade secrets from unauthorized access. 
  • 1.2K
  • 03 Aug 2021
Topic Review
Security in V2I Communications
The number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. 
  • 1.1K
  • 09 Dec 2022
Topic Review
Deep Convolutional Neural Networks
The effectiveness of Convolutional Neural Networks in image recognition motivates the researchers to extend its applications in the field of agriculture for recognition of plant species, yield management, weed detection, soil, and water management, fruit counting, diseases, and pest detection, evaluating the nutrient status of plants, and much more. The availability of voluminous research works in applying deep learning models in agriculture leads to difficulty in selecting a suitable model according to the type of dataset and experimental environment. In this manuscript, the authors present a survey of the existing literature in applying deep Convolutional Neural Networks to predict plant diseases from leaf images.
  • 1.1K
  • 10 Aug 2021
Topic Review
Timeline of Computing 1980–89
This article presents a detailed timeline of events in the history of computing from 1980 to 1989. For narratives explaining the overall developments, see the History of computing.
  • 1.1K
  • 17 Oct 2022
Topic Review
Oriented Crossover in Genetic Algorithms
A genetic algorithm is a formula for resolving optimization issues that incorporate a constraint and natural selection similar to the biological process that propels evolution.
  • 1.1K
  • 11 May 2023
Topic Review
WebQuest
A WebQuest is an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web. These can be created using various programs, including a simple word processing document that includes links to websites.
  • 1.1K
  • 29 Nov 2022
Topic Review
Service Loose Coupling Principle
Within the service-orientation design paradigm, service loose coupling is a design principle that is applied to the services in order to ensure that the service contract is not tightly coupled to the service consumers and to the underlying service logic and implementation. This results in service contracts that could be freely evolved without affecting either the service consumers or the service implementation.
  • 1.1K
  • 22 Nov 2022
Topic Review
Resilience in the Cyberworld
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. 
  • 1.1K
  • 25 Nov 2021
Topic Review
Range Encoding
Range encoding is an entropy coding method defined by G. Nigel N. Martin in a 1979 paper, which effectively rediscovered the FIFO arithmetic code first introduced by Richard Clark Pasco in 1976. Given a stream of symbols and their probabilities, a range coder produces a space-efficient stream of bits to represent these symbols and, given the stream and the probabilities, a range decoder reverses the process. Range coding is very similar to arithmetic encoding, except that encoding is done with digits in any base, instead of with bits, and so it is faster when using larger bases (e.g. a byte) at small cost in compression efficiency. After the expiration of the first (1978) arithmetic coding patent, range encoding appeared to clearly be free of patent encumbrances. This particularly drove interest in the technique in the open source community. Since that time, patents on various well-known arithmetic coding techniques have also expired.
  • 1.1K
  • 14 Oct 2022
Topic Review
Future Proof
Future-proofing is the process of anticipating the future and developing methods of minimizing the effects of shocks and stresses of future events. Future-proofing is used in industries such as electronics, medical industry, industrial design, and more recently, in design for climate change. The principles of future-proofing are extracted from other industries and codified as a system for approaching an intervention in an historic building.
  • 1.0K
  • 11 Nov 2022
  • Page
  • of
  • 7
Academic Video Service