Topic Review
WebQuest
A WebQuest is an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web. These can be created using various programs, including a simple word processing document that includes links to websites.
  • 711
  • 29 Nov 2022
Topic Review
Security in V2I Communications
The number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. 
  • 708
  • 09 Dec 2022
Topic Review
Deep Convolutional Neural Networks
The effectiveness of Convolutional Neural Networks in image recognition motivates the researchers to extend its applications in the field of agriculture for recognition of plant species, yield management, weed detection, soil, and water management, fruit counting, diseases, and pest detection, evaluating the nutrient status of plants, and much more. The availability of voluminous research works in applying deep learning models in agriculture leads to difficulty in selecting a suitable model according to the type of dataset and experimental environment. In this manuscript, the authors present a survey of the existing literature in applying deep Convolutional Neural Networks to predict plant diseases from leaf images.
  • 696
  • 10 Aug 2021
Topic Review
MOS Technology VIC-II
The VIC-II (Video Interface Chip II), specifically known as the MOS Technology 6567/8562/8564 (NTSC versions), 6569/8565/8566 (PAL), is the microchip tasked with generating Y/C video signals (combined to composite video in the RF modulator) and DRAM refresh signals in the Commodore 64 and C128 home computers. Succeeding MOS's original VIC (used in the VIC-20), the VIC-II was one of the two chips mainly responsible for the C64's success (the other chip being the 6581 SID).
  • 674
  • 10 Nov 2022
Topic Review
List of 16-bit Computer Hardware Palettes
This is a list of notable 16-bit RGB color palettes, which were primarily manufactured from 1985 to 1995. Due to mixed-bit architectures, the n-bit distinction is not always a strict categorization.
  • 666
  • 10 Nov 2022
Topic Review
Service Loose Coupling Principle
Within the service-orientation design paradigm, service loose coupling is a design principle that is applied to the services in order to ensure that the service contract is not tightly coupled to the service consumers and to the underlying service logic and implementation. This results in service contracts that could be freely evolved without affecting either the service consumers or the service implementation.
  • 652
  • 22 Nov 2022
Topic Review
Conceptual Modelling in Operational Simulation of Logistics
Logistics problems involve a large number of complexities, which makes the development of models challenging. While computer simulation models are developed for addressing complexities, it is essential to ensure that the necessary operational behaviours are captured, and that the architecture of the model is suitable to represent them. The early stage of simulation modelling, known as conceptual modelling (CM), is thus dependent on successfully extracting tacit operational knowledge and avoiding misunderstanding between the client (customer of the model) and simulation analyst.
  • 650
  • 21 Jun 2022
Topic Review
Asperitas Microdatacenter
A microdatacenter is a small, self contained data center consisting of computing, storage, networking, power and cooling. Micro data centers typically employ water cooling to achieve compactness, low component count, low cost and high energy efficiency. Its small size allows decentralised deployment in places where traditional data centers cannot go, for instance edge computing for Internet of things.
  • 650
  • 01 Nov 2022
Topic Review
Challenges According to the ‘7Vs’ of Big Data
Big Data has challenges that sometimes are the same as its own characteristics. These characteristics are known as the Vs. The researchers describe ‘7Vs’ that they have found and are the most used and more related to general data used in Big Data, including an explanation and challenges that exist according to them. Some of them have different subtypes according to the differences detected in the literature and working with them. Some authors create a different V for similar purposes, and here, the researcher gather them into one due to the similarities.
  • 647
  • 12 Apr 2023
Topic Review
AlphaServer
AlphaServer is a series of server computers, produced from 1994 onwards by Digital Equipment Corporation, and later by Compaq and HP. AlphaServers were based on the DEC Alpha 64-bit microprocessor. Supported operating systems for AlphaServers are Tru64 UNIX (formerly Digital UNIX), OpenVMS, MEDITECH MAGIC and Windows NT (on earlier systems, with AlphaBIOS ARC firmware), while enthusiasts have provided alternative operating systems such as Linux, NetBSD, OpenBSD and FreeBSD. The Alpha processor was also used in a line of workstations, AlphaStation. Some AlphaServer models were rebadged in white enclosures as Digital Servers for the Windows NT server market. These so-called "white box" models comprised the following: As part of the roadmap to phase out Alpha-, MIPS- and PA-RISC-based systems in favor of Itanium-based systems at HP, the most recent AlphaServer systems reached their end of general availability on 27 April 2007. The availability of upgrades and options was discontinued on 25 April 2008, approximately one year after the systems were discontinued. Support for the most recent AlphaServer systems, the DS15A, DS25, ES45, ES47, ES80 and GS1280 is being provided by HP Services as of 2008. These systems are scheduled to reach end of support sometime during 2012, although HP has stated that this event may be delayed.
  • 640
  • 25 Oct 2022
Topic Review
Future Proof
Future-proofing is the process of anticipating the future and developing methods of minimizing the effects of shocks and stresses of future events. Future-proofing is used in industries such as electronics, medical industry, industrial design, and more recently, in design for climate change. The principles of future-proofing are extracted from other industries and codified as a system for approaching an intervention in an historic building.
  • 620
  • 11 Nov 2022
Topic Review
Value Co-Creation in Digital Innovation Ecosystems
The innovation ecosystem guides the transition from individual value creation to multi-actor value co-creation by coordinating the interests of multiple parties for cross-border cooperation and enhancing the efficiency of technological innovation and resource integration in the system.
  • 604
  • 16 May 2023
Topic Review
Shibboleth
Shibboleth is a single sign-on log-in system for computer networks and the Internet. It allows people to sign in using just one identity to various systems run by federations of different organizations or institutions. The federations are often universities or public service organizations. The Shibboleth Internet2 middleware initiative created an architecture and open-source implementation for identity management and federated identity-based authentication and authorization (or access control) infrastructure based on Security Assertion Markup Language (SAML). Federated identity allows the sharing of information about users from one security domain to the other organizations in a federation. This allows for cross-domain single sign-on and removes the need for content providers to maintain user names and passwords. Identity providers (IdPs) supply user information, while service providers (SPs) consume this information and give access to secure content.
  • 595
  • 28 Nov 2022
Topic Review
Timeline of Computing 1980–89
This article presents a detailed timeline of events in the history of computing from 1980 to 1989. For narratives explaining the overall developments, see the History of computing.
  • 588
  • 17 Oct 2022
Topic Review
WebUSB
WebUSB is a JavaScript application programming interface (API) specification for securely providing access to USB devices from web pages. It was published by the Web Platform Incubator Community Group. As of July 2021, it is in Draft Community status, and is supported by Google Chrome, Microsoft Edge, QQ, Opera, and Samsung Internet.
  • 585
  • 30 Nov 2022
Topic Review
Blockchain Technology in Agricultural Products and Food Applications
Compared with the traditional centralized information supervision mode, the application of blockchain as a new scientific and technological innovation technology in the management of agricultural products and food supply chain can promote a more refined management of agricultural products and food, and provide feasible ideas for ensuring the quality and safety of agricultural products and food.  
  • 575
  • 29 Sep 2022
Topic Review
Oriented Crossover in Genetic Algorithms
A genetic algorithm is a formula for resolving optimization issues that incorporate a constraint and natural selection similar to the biological process that propels evolution.
  • 572
  • 11 May 2023
Topic Review
Efficient Authentication Protocol and Its Application
Chaos theory and its extension into cryptography have generated significant applications in industrial mixing, pulse width modulation, and electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism enables the charging of electronic devices devoid of cords and wires.
  • 561
  • 22 Dec 2021
Topic Review
Moving Target Defense Techniques
Represented by reactive security defense mechanisms, cyber defense possesses a static, reactive, and deterministic nature, with overwhelmingly high costs to defend against ever-changing attackers. To change this situation, researchers have proposed moving target defense (MTD), which introduces the concept of an attack surface to define cyber defense in a brand-new manner, aiming to provide a dynamic, continuous, and proactive defense mechanism. With the increasing use of machine learning in networking, researchers have discovered that MTD techniques based on machine learning can provide omni-bearing defense capabilities and reduce defense costs at multiple levels. 
  • 557
  • 05 May 2023
Topic Review
Revisiting the High-Performance Reconfigurable Computing
Modern datacenters are reinforcing the computational power and energy efficiency by assimilating field programmable gate arrays (FPGAs). The sustainability of this large-scale integration depends on enabling multi-tenant FPGAs. This requisite amplifies the importance of communication architecture and virtualization method with the required features in order to meet the high-end objective.
  • 551
  • 27 Jun 2022
  • Page
  • of
  • 7
ScholarVision Creations