You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Oblivious Ram
An Oblivious RAM (ORAM) simulator is a compiler that transforms algorithms in such a way that the resulting algorithms preserve the input-output behavior of the original algorithm but the distribution of memory access pattern of the transformed algorithm is independent of the memory access pattern of the original algorithm. The definition of ORAMs is motivated by the fact that an adversary can obtain nontrivial information about the execution of a program and the nature of the data that it is dealing with, just by observing the pattern in which various locations of memory are accessed during its execution. An adversary can get this information even if the data values are all encrypted. The definition suits equally well to the settings of protected programs running on unprotected shared memory as well as a client running a program on its system by accessing previously stored data on a remote server. The concept was formulated by Oded Goldreich in 1987.
  • 839
  • 02 Dec 2022
Topic Review
Interactive Visual Analysis
Interactive Visual Analysis (IVA) is a set of techniques for combining the computational power of computers with the perceptive and cognitive capabilities of humans, in order to extract knowledge from large and complex datasets. The techniques rely heavily on user interaction and the human visual system, and exist in the intersection between visual analytics and big data. It is a branch of data visualization. IVA is a suitable technique for analyzing high-dimensional data that has a large number of data points, where simple graphing and non-interactive techniques give an insufficient understanding of the information. These techniques involve looking at datasets through different, correlated views and iteratively selecting and examining features the user finds interesting. The objective of IVA is to gain knowledge which is not readily apparent from a dataset, typically in tabular form. This can involve generating, testing or verifying hypotheses, or simply exploring the dataset to look for correlations between different variables.
  • 838
  • 10 Oct 2022
Topic Review
Winograd Schema Challenge
The Winograd schema challenge (WSC) is a test of machine intelligence proposed by Hector Levesque, a computer scientist at the University of Toronto. Designed to be an improvement on the Turing test, it is a multiple-choice test that employs questions of a very specific structure: they are instances of what are called Winograd schemas, named after Terry Winograd, professor of computer science at Stanford University. On the surface, Winograd schema questions simply require the resolution of anaphora: the machine must identify the antecedent of an ambiguous pronoun in a statement. This makes it a task of natural language processing, but Levesque argues that for Winograd schemas, the task requires the use of knowledge and commonsense reasoning. Nuance Communications announced in July 2014 that it would sponsor an annual WSC competition, with a prize of $25,000 for the best system that could match human performance. However, the prize is no longer offered.
  • 827
  • 18 Oct 2022
Topic Review
Efficient Authentication Protocol and Its Application
Chaos theory and its extension into cryptography have generated significant applications in industrial mixing, pulse width modulation, and electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism enables the charging of electronic devices devoid of cords and wires.
  • 789
  • 22 Dec 2021
Topic Review
Trust Computation in Internet of Vehicles
The current trust computation scheme in Internet of Vehicles, according to the adopted decision logic, can be divided into different approaches based on multi-weight fusion, Bayesian inference (BI), the Dempster–Shafer (D-S) theory, fuzzy logic, and three-valued subjective logic (3VSL), etc.
  • 776
  • 05 Jun 2023
Topic Review
SLinCA@Home
SLinCA@Home (Scaling Laws in Cluster Aggregation) was a research project that uses Internet-connected computers to do research in fields such as physics and materials science.
  • 767
  • 08 Nov 2022
Topic Review
Load Balancing Algorithms for Parallel Computing
Computational fluid dynamics (CFD) is a discipline that solves and analyzes fluid dynamics problems through computer and numerical simulation methods. In the process of CFD numerical simulations, the complexity of the problem is gradually increasing, the accuracy of the numerical simulation is becoming more and more demanding, and the network size is continuously expanding. Load-balancing algorithms for CFD parallel computing are being gradually and extensively researched in the world.
  • 752
  • 09 Nov 2022
Topic Review
Conservation and Restoration OpenLab
Open laboratories (OpenLabs) in Cultural Heritage institutions are an effective way to provide visibility into the behind-the-scenes processes and promote documentation data collected and produced by domain specialists. Cultural Heritage (CH) institutions have been adopting new practices to improve their services and meet the preferences and needs of potential audiences. One such practice is the transformation of conservation and restoration (CnR) laboratories into OpenLabs, which allow visitors to see the various processes that take place “behind the scenes” .
  • 750
  • 19 May 2023
Topic Review
Machine Learning and Deep Learning Techniques
The rapid growth of e-commerce has significantly increased the demand for advanced techniques to address specific tasks in the e-commerce field.
  • 742
  • 21 Dec 2023
Topic Review
ITU-T Y.1564
ITU-T Y.1564 is an Ethernet service activation test methodology, which is the new ITU-T standard for turning up, installing and troubleshooting Ethernet-based services. It is the only standard test methodology that allows for complete validation of Ethernet service-level agreements (SLAs) in a single test.
  • 737
  • 10 Oct 2022
Topic Review
Vertex Chunk-Based Object Culling
Famous content using the Metaverse concept allows users to freely place objects in a world space without constraints. To render various high-resolution objects placed by users in real-time, various algorithms exist, such as view frustum culling, visibility culling and occlusion culling. These algorithms selectively remove objects outside the camera’s view and eliminate an object that is too small to render.
  • 736
  • 26 Jun 2023
Topic Review
DESQview
DESQview (DV) is a text mode multitasking operating environment developed by Quarterdeck Office Systems which enjoyed modest popularity in the late 1980s and early 1990s. Running on top of DOS, it allows users to run multiple programs concurrently in multiple windows.
  • 731
  • 11 Nov 2022
Topic Review
Smart City Infrastructure Threat Modelling Methodologies
Smart city infrastructure and the related theme of critical national infrastructure have attracted growing interest in recent years in academic literature, notably how cyber-security can be effectively applied within the environment, which involves using cyber-physical systems. These operate cross-domain and have massively improved functionality and complexity, especially in threat modelling cyber-security analysis—the disparity between current cyber-security proficiency and the requirements for an effective cyber-security systems implementation.
  • 726
  • 14 Sep 2022
Topic Review
k-NN Query for High-Dimensional Index Using Machine Learning
The three k-nearest neighbor (k-NN) optimization techniques for a distributed, in-memory-based, high-dimensional indexing method to speed up content-based image retrieval. The techniques perform distributed, in-memory, high-dimensional indexing-based k-NN query optimization: a density-based optimization technique that performs k-NN optimization using data distribution; a cost-based optimization technique using query processing cost statistics; and a learning-based optimization technique using a deep learning model, based on query logs.
  • 724
  • 08 Jun 2023
Topic Review
High-Fidelity Synthetic Face Generation for Rosacea Skin Condition
Similarly to the majority of deep learning applications, diagnosing skin diseases using computer vision and deep learning often requires a large volume of data. However, obtaining sufficient data for particular types of facial skin conditions can be difficult, due to privacy concerns. As a result, conditions like rosacea are often understudied in computer-aided diagnosis. The limited availability of data for facial skin conditions has led to the investigation of alternative methods of computer-aided diagnosis. Generative adversarial networks (GANs), mainly variants of StyleGANs, have demonstrated promising results in generating synthetic facial images.
  • 717
  • 14 Feb 2024
Topic Review
Enhancing VNF Instantiation with Blockchain
In the realm of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) are crucial software entities that require execution on virtualized hardware infrastructure. Deploying a Service Function Chain (SFC) requires multiple steps for instantiating VNFs to analyze, request, deploy, and monitor resources. It is well recognized that the sharing of infrastructure resources among different VNFs will enhance resource utilization. However, conventional mechanisms for VNF sharing often neglect the interests of both VNF instances and infrastructure providers.
  • 714
  • 12 Dec 2023
Topic Review
Cognitive Load Theory and eLearning of Crafts
Craft education and training are important for preserving cultural heritage and fostering artisanal skills. Craft education and training are challenging since they introduce learners to a multifaceted world, where they must acquire skills, knowledge, and appreciation for cultural heritage. Balancing these learning objectives is a cognitive challenge.
  • 707
  • 12 Jan 2024
Topic Review
Maintenance for Offshore Wind Turbine Farms
The rapid increase in the use of renewable electricity, driven by the development of photovoltaic technologies and wind farms, compels the development of appropriate facilities to ensure their maintenance. Since wind farms are more efficient than traditional sources of electricity and their share in global electricity production is prominent, the development of techniques and maintenance methods dedicated to wind farms will also be prominent. The logistics and supply chain management of offshore wind turbine farms (OWFs) maintenance have a fundamental impact on their availability and, as a result, profitability.
  • 689
  • 28 Jul 2023
Topic Review
Spatial Keyword Group Query
Location-based services have been commonly used in daily life. Spatial keyword query, as one of the important technologies in location-based services, has been widely used in many fields, such as intelligent navigation systems and spatial positioning systems. Different types of spatial keyword query problems have been studied in depth by scholars.
  • 688
  • 24 Nov 2023
Topic Review
Online OS
The Online Operating System was a fully multi-lingual and free to use web desktop written in JavaScript using Ajax. It was a Windows-based desktop environment with open-source applications and system utilities developed upon the reBOX web application framework by iCUBE Network Solutions, an Austrian company located in Vienna.
  • 671
  • 24 Oct 2022
  • Page
  • of
  • 7
Academic Video Service