Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Self-Sovereign Identity Technology
Self-sovereign identity (SSI) is a set of technologies that build on core concepts in identity management, blockchain technology, and cryptography. SSI enables entities to create fraud-proof verifiable credentials and instantly verify the authenticity of a digital credential.
  • 1.3K
  • 29 Nov 2022
Topic Review
Elastic Load Balancing
Amazon Elastic Compute Cloud (EC2) is a part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), that allows users to rent virtual computers on which to run their own computer applications. EC2 encourages scalable deployment of applications by providing a web service through which a user can boot an Amazon Machine Image (AMI) to configure a virtual machine, which Amazon calls an "instance", containing any software desired. A user can create, launch, and terminate server-instances as needed, paying by the second for active servers – hence the term "elastic". EC2 provides users with control over the geographical location of instances that allows for latency optimization and high levels of redundancy. In November 2010, Amazon switched its own retail website platform to EC2 and AWS.
  • 1.3K
  • 27 Oct 2022
Topic Review
Moving Target Defense Techniques
Represented by reactive security defense mechanisms, cyber defense possesses a static, reactive, and deterministic nature, with overwhelmingly high costs to defend against ever-changing attackers. To change this situation, researchers have proposed moving target defense (MTD), which introduces the concept of an attack surface to define cyber defense in a brand-new manner, aiming to provide a dynamic, continuous, and proactive defense mechanism. With the increasing use of machine learning in networking, researchers have discovered that MTD techniques based on machine learning can provide omni-bearing defense capabilities and reduce defense costs at multiple levels. 
  • 1.3K
  • 05 May 2023
Topic Review
List of 16-bit Computer Hardware Palettes
This is a list of notable 16-bit RGB color palettes, which were primarily manufactured from 1985 to 1995. Due to mixed-bit architectures, the n-bit distinction is not always a strict categorization.
  • 1.3K
  • 10 Nov 2022
Topic Review
Blockchain Enabled Cyber-Physical Systems
Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. 
  • 1.3K
  • 25 Apr 2022
Topic Review
Structure-Borne Noise in Offshore Piling
The growing demand for renewable energy supply stimulates a drastic increase in the deployment rate of offshore wind energy. Offshore wind power generators are usually supported by large foundation piles that are driven into the seabed with hydraulic impact hammers or vibratory devices. The pile installation process, which is key to the construction of every new wind farm, is hindered by a serious by-product: the underwater noise pollution. 
  • 1.2K
  • 14 Sep 2021
Topic Review
Smart Parking System Based on Edge-Cloud-Dew Computing Architecture
In a smart parking system, the license plate recognition service controls the car’s entry and exit and plays the core role in the parking lot system. When the Internet is interrupted, the parking lot’s business will also be interrupted. Hence, an Edge-Cloud-Dew architecture for the mobile industry was proposed in order to tackle this critical problem. The architecture has an innovative design, including LAN-level deployment, Platform-as-a-Dew Service (PaaDS), the dew version of license plate recognition, and the dew type of machine learning model training. Based on these designs, the architecture presents many benefits, such as: (1) reduced maintenance and deployment issues and increased dew service reliability and sustainability; (2) effective release of the network constraint on cloud computing and increase in the horizontal and vertical scalability of the system; (3) enhancement of dew computing to resolve the heavy computing process problem; and (4) proposal of a dew type of machine learning training mechanism without requiring periodic retraining, but with acceptable accuracy. 
  • 1.2K
  • 03 Jul 2023
Topic Review
Exploring the Potential of Quantum Computing
Quantum computing is a rapidly evolving field with the potential to revolutionize computing as we know it. It presents significant benefits in fields such as drug discovery, cryptography, and artificial intelligence, but also poses risks such as the potential to break current encryption methods and compromise sensitive data. This research provides an overview of the potential benefits and risks of quantum computing, as well as the challenges associated with its development. The research also discusses the pioneers in the field, open challenges, and security aspects.
  • 1.2K
  • 22 May 2023
Topic Review
Metaheuristic Approach for University Course Timetabling Problems
The university course timetabling problem (UCTP) is a multidimensional assignment problem that involves assigning students and teachers to events (or courses), which are then allocated to appropriate timeslots and rooms. The UCTP can be categorized into two categories: post-enrollment-based course timetabling problems (PE-CTPs) and curriculum-based course timetabling problems (CB-CTPs). 
  • 1.2K
  • 09 Aug 2023
Topic Review
Asperitas Microdatacenter
A microdatacenter is a small, self contained data center consisting of computing, storage, networking, power and cooling. Micro data centers typically employ water cooling to achieve compactness, low component count, low cost and high energy efficiency. Its small size allows decentralised deployment in places where traditional data centers cannot go, for instance edge computing for Internet of things.
  • 1.2K
  • 01 Nov 2022
Topic Review
Blockchain Networks Privacy
One of the most widely researched areas in the field of blockchain networks is the domain of preserving blockchain privacy. The reason being the growing concern of several industries and business enterprises to protect their data and trade secrets from unauthorized access. 
  • 1.2K
  • 03 Aug 2021
Topic Review
Security in V2I Communications
The number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. 
  • 1.1K
  • 09 Dec 2022
Topic Review
Timeline of Computing 1980–89
This article presents a detailed timeline of events in the history of computing from 1980 to 1989. For narratives explaining the overall developments, see the History of computing.
  • 1.1K
  • 17 Oct 2022
Topic Review
Deep Convolutional Neural Networks
The effectiveness of Convolutional Neural Networks in image recognition motivates the researchers to extend its applications in the field of agriculture for recognition of plant species, yield management, weed detection, soil, and water management, fruit counting, diseases, and pest detection, evaluating the nutrient status of plants, and much more. The availability of voluminous research works in applying deep learning models in agriculture leads to difficulty in selecting a suitable model according to the type of dataset and experimental environment. In this manuscript, the authors present a survey of the existing literature in applying deep Convolutional Neural Networks to predict plant diseases from leaf images.
  • 1.1K
  • 10 Aug 2021
Topic Review
Oriented Crossover in Genetic Algorithms
A genetic algorithm is a formula for resolving optimization issues that incorporate a constraint and natural selection similar to the biological process that propels evolution.
  • 1.1K
  • 11 May 2023
Topic Review
WebQuest
A WebQuest is an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web. These can be created using various programs, including a simple word processing document that includes links to websites.
  • 1.1K
  • 29 Nov 2022
Topic Review
Service Loose Coupling Principle
Within the service-orientation design paradigm, service loose coupling is a design principle that is applied to the services in order to ensure that the service contract is not tightly coupled to the service consumers and to the underlying service logic and implementation. This results in service contracts that could be freely evolved without affecting either the service consumers or the service implementation.
  • 1.1K
  • 22 Nov 2022
Topic Review
Resilience in the Cyberworld
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. 
  • 1.1K
  • 25 Nov 2021
Topic Review
Discrete Event Simulation
A discrete-event simulation (DES) models the operation of a system as a discrete sequence of events in time. Each event occurs at a particular instant in time and marks a change of state in the system. Between consecutive events, no change in the system is assumed to occur; thus the simulation can directly jump in time from one event to the next. This contrasts with continuous simulation in which the simulation continuously tracks the system dynamics over time. Instead of being event-based, this is called an activity-based simulation; time is broken up into small time slices and the system state is updated according to the set of activities happening in the time slice. Because discrete-event simulations do not have to simulate every time slice, they can typically run much faster than the corresponding continuous simulation. A more recent method is the three-phased approach to discrete event simulation (Pidd, 1998). In this approach, the first phase is to jump to the next chronological event. The second phase is to execute all events that unconditionally occur at that time (these are called B-events). The third phase is to execute all events that conditionally occur at that time (these are called C-events). The three phase approach is a refinement of the event-based approach in which simultaneous events are ordered so as to make the most efficient use of computer resources. The three-phase approach is used by a number of commercial simulation software packages, but from the user's point of view, the specifics of the underlying simulation method are generally hidden.
  • 1.1K
  • 02 Nov 2022
Topic Review
Future Proof
Future-proofing is the process of anticipating the future and developing methods of minimizing the effects of shocks and stresses of future events. Future-proofing is used in industries such as electronics, medical industry, industrial design, and more recently, in design for climate change. The principles of future-proofing are extracted from other industries and codified as a system for approaching an intervention in an historic building.
  • 1.1K
  • 11 Nov 2022
  • Page
  • of
  • 7
Academic Video Service