You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Augmented Reality for Cultural Heritage Communication and Education
Augmented Reality (AR) applications are increasingly used in many research and commercial fields. Some of the fields that these applications are used are recreational digital games, tourism, education, and marketing. Location-based augmented reality is a type of AR that typically runs on mobile devices (smartphones or tablets) and uses the device's GPS sensor to guide users to specific locations. When these locations are reached the users are presented with informative digital content. Location-based augmented reality (AR) applications for cultural heritage communication and education are created to inform the public about cultural heritage monuments in an engaging and entertaining way.
  • 1.7K
  • 02 Jun 2023
Topic Review
Mobile Learning Technologies for Education
The digital revolution is transforming education by using information and communication technologies (ICTs) to improve student's learning outcomes. In the last 50 years, changes can be seen in every area of society, such as culture, entertainment, and social interaction. However, the current educational model is very similar to how it was back then. Due to the characteristics of mobile devices, and the inexperience of teachers and educational institutions, students may experience distractions in their learning and may be involved in inefficient educational methodologies. Digital revolution is transforming these educational models, involving students, teachers, and educational institutions in this process[3]. The appropriate use of digital technologies and a pedagogical approach in the design of learning models could generate an improvement in the learning results of the students. Today’s world demands more efficient learning models that allow students to play a more active role in their education. Technology is having an impact on how instruction is delivered and how information is found and share. Until very recently, the educational models encouraged memorization as an essential learning skill. These days, technologies have changed the educational model and access to information. Knowledge is available online, mostly free, and easily accessible. Reading, sharing, listening and, doing are currently necessary skills for education. The study of innovation in education systems has increasingly attracted the attention of academics around the world. Educational innovation refers to new ways of delivering education in a way that impacts new generations of students. The educational model in higher education institutions (HEIs) was not designed for this generation of "digital natives". Therefore, HEIs face the challenge of improving their teaching strategies and making them attractive to students and their needs. Mobile devices have become a complete set of applications, support, and help for educational organizations. By conducting an analysis of the behavior and use of mobile devices on current students, efficient educational applications can be developed. Although there are several initiatives for the use of mobile learning in education, there are also issues linked to this technology that must be addressed.
  • 1.7K
  • 11 May 2021
Topic Review
Olfactory Displays in Education and Training
Olfactory displays are defined as human–computer interfaces that generate and diffuse or transmit one or more odors to a user for a purpose. Computer-generated odors, in conjunction with other sensory information, have been proposed and used in education and training settings over the past four decades, supporting memorization of information, helping immerse learners into 3D educational environments, and complementing or supplementing human senses.
  • 1.7K
  • 19 Nov 2021
Topic Review
Ejabberd
ejabberd is an Extensible Messaging and Presence Protocol (XMPP) application server and an MQ Telemetry Transport (MQTT) broker, written mainly in the Erlang programming language. It can run under several Unix-like operating systems such as macOS, Linux, FreeBSD, NetBSD, OpenBSD and OpenSolaris. Additionally, ejabberd can run under Microsoft Windows. The name ejabberd stands for Erlang Jabber Daemon (Jabber being a former name for XMPP) and is written in lowercase only, as is common for daemon software. ejabberd is free software, distributed under the terms of the GNU GPL-2.0-or-later. (As of 2009), it is one of the most popular open source applications written in Erlang. XMPP: The Definitive Guide (O'Reilly Media, 2009) praised ejabberd for its scalability and clustering feature, at the same time pointing out that being written in Erlang is a potential acceptance issue for users and contributors. The software's creator, Alexey Shchepin was awarded the Erlang User of the Year award at the 2006 Erlang user conference. ejabberd has a number of notable deployments, IETF Groupchat Service, BBC Radio LiveText, Nokia's Ovi, KDE Talk and one in development at Facebook. (As of 2009) ejabberd is the most popular server among smaller XMPP-powered sites that register on xmpp.org. With the next major release after version 2 (previously called ejabberd 3), the versioning scheme was changed to reflect release dates as "Year.Month-Revision" (starting with 13.04-beta1). It was also announced that further development will be split into an "ejabberd Community Server" and an "ejabberd Commercial Edition [which] targets carriers, websites, service providers, large corporations, universities, game companies, that need high level of commitment from ProcessOne, stability and performance and a unique set of features to run their business successfully."
  • 1.7K
  • 01 Nov 2022
Topic Review
The Technology of Blockchain
Blockchain is a system of records created using cryptography to link and secure blocks (of records) and is stored on a peer-to-peer network that adheres to a “consensus protocol” which enables it to work without centralized management. It is a revolutionary technology that has immense potential to create a long-lasting impact. It is speculated to be a key technology that shall be part of the Industry 4.0 revolution.
  • 1.7K
  • 27 Oct 2020
Topic Review
Deepfake Attacks and Electrical Network Frequency Fingerprints Approach
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend on reliable, secure, and real-time audio and/or video streams (AVSs), which consequently become a target for attackers. While modern Artificial Intelligence (AI) technology is integrated with many multimedia applications to help enhance its applications, the development of General Adversarial Networks (GANs) also leads to deepfake attacks that enable manipulation of audio or video streams to mimic any targeted person. Deepfake attacks are highly disturbing and can mislead the public, raising further challenges in policy, technology, social, and legal aspects. As a primary cause of misinformation, an imminent need for fast and reliable authentication techniques is of a high priority.
  • 1.6K
  • 23 May 2022
Topic Review
Data-Driven Attack Detection Trends in IoT
The Internet of Things is perhaps a concept that the world cannot be imagined without today, having become intertwined in everyday lives in the domestic, corporate and industrial spheres. However, irrespective of the convenience, ease and connectivity provided by the Internet of Things, the security issues and attacks faced by this technological framework are equally alarming and undeniable. In order to address these various security issues, researchers race against evolving technology, trends and attacker expertise. 
  • 1.6K
  • 23 Aug 2023
Topic Review
BlackDog
The BlackDog is a pocket-sized, self-contained computer with a built-in biometric fingerprint reader which was developed in 2005 by Realm Systems, which is plugged into and powered by the USB port of a host computer using its peripheral devices for input and output. It is a mobile personal server which allows a user to use Linux, ones applications and data on any computer with a USB port. The host machine's monitor, keyboard, mouse, and Internet connection are used by the BlackDog for the duration of the session. As the system is self-contained and isolated from the host, requiring no additional installation, it is possible to make use of untrusted computers, yet using a secure system. Various hardware iterations exist, and the original developer Realm Systems closed down in 2007, being picked up by the successor Inaura, Inc.
  • 1.6K
  • 15 Nov 2022
Topic Review
IcedTea
IcedTea is a build and integration project for OpenJDK launched by Red Hat in June 2007. IcedTea also includes some addon libraries: IcedTea-Web is a free software implementation of Java Web Start and the Java web browser applet plugin. IcedTea-Sound is a collection of plugins for the Java sound subsystem, including the PulseAudio provider which used to be included with IcedTea. The Free Software Foundation recommends that all Java programmers use IcedTea as their development environment. Historically, the initial goal of the IcedTea project was to make the OpenJDK software, which Sun Microsystems released as free software in 2007, usable without requiring any proprietary software, and hence make it possible to add OpenJDK to Fedora and other Linux distributions that insist on free software. This goal was met, and a version of IcedTea based on OpenJDK was packaged with Fedora 8 in November 2007. April 2008 saw the first release of a new variant, IcedTea6, which is based on Sun's build drops of OpenJDK6, a fork of the OpenJDK with the goal of being compatible with the existing JDK6. This was released in Ubuntu and Fedora in May 2008. The IcedTea package in these distributions has been renamed to OpenJDK using the OpenJDK trademark notice. In June 2008, the Fedora build passed Sun's rigorous TCK testing on x86 and x86-64. IcedTea 2, the first version based on OpenJDK 7, was released in October 2011. IcedTea 3, the first version based on OpenJDK 8, was released in April 2016. Support for IcedTea 1 was dropped in January 2017.
  • 1.6K
  • 25 Nov 2022
Topic Review
Hybrid Adaptive Transaction Injection Protocol
Latency is a critical issue that impacts the performance of decentralized systems. Recently we designed various protocols to regulate the injection rate of unverified transactions into the system to improve system performance. Each of the protocols is designed to address issues related to some particular network traffic syndrome. In this work, we first provide the review of our prior protocols.We then provide a hybrid scheme that combines our transaction injection protocols and provides an optimal linear combination of the protocols based on the syndromes in the network. The goal is to speed up the verification process of systems that rely on only one single basic protocol. The underlying basic protocols are Periodic Injection of Transaction via Evaluation Corridor (PITEC), Probabilistic Injection of Transactions (PIT), and Adaptive Semi-synchronous Transaction Injection (ASTI).
  • 1.6K
  • 28 Oct 2020
Topic Review
Internet of Things Firmware Vulnerabilities and Auditing Techniques
Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing range of cyber security threats targeting IoT-enabled platforms, specifically device firmware vulnerabilities, often overlooked during development and deployment.
  • 1.6K
  • 04 Feb 2024
Topic Review
Smartphone Security and Privacy
There is an exponential rise in the use of smartphones in government and private institutions due to business dependencies such as communication, virtual meetings, and access to global information. These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. These attacks are becoming significantly more complex, sophisticated, persistent, and undetected for extended periods. Traditionally, devices are targeted by exploiting a vulnerability in the operating system (OS) or device sensors. Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store.
  • 1.6K
  • 25 Jun 2023
Topic Review
Cyberphysical Systems
Cyber-physical systems (CPS) merge the physical and cyber world to support critical functions and services. Cyber-security and safety are interdependent in such systems and therefore their study should be performed jointly. Various approaches have been proposed for cyber-security and safety co-engineering. In this entry, the key results of a comprehensive survey of such co-engineering approaches, along with various aspects of the problem that have not been sufficiently addressed in these methods, are presented. 
  • 1.6K
  • 16 Jun 2021
Topic Review
Smart Cities and Financial Sustainability
Smart city initiatives have become recurrent strategies used by local governments to provide better services, improve their managerial effectiveness, and increase citizen participation in cities’ decision-making processes. Great potential exists to use data, information, and communication technologies (ICT) more extensively to improve city operations. However, depending on the size and financial situation of the cities, some smart city initiatives could be considered investments that are too expensive and not easy to maintain in the long term. If city governments want to achieve most of the benefits arising from the intense use of technology and data, building financially sustainable smart cities should be seen as a priority.
  • 1.6K
  • 28 Jun 2022
Topic Review
Structure of Power QKD Network
Considering the complexity of the power grid environment and the diversity of power communication transmission losses, this paper proposes a quantum key distribution (QKD) network structure suitable for power business scenarios. Through the simulation of the power communication transmission environment, the performance indicators of quantum channels and data interaction channels in the power QKD system are tested and evaluated from six aspects, such as distance loss, galloping loss, splice loss, data traffic, encryption algorithm, and system stability. In the actual environment, this paper combines the production business to build a QKD network suitable for power scenarios, and conducts performance analysis. The experimental results show that the power QKD technology can meet the operation index requirements of power business, as well as provide a reference for the large-scale application of the technology.
  • 1.6K
  • 12 Apr 2021
Topic Review
Millimeter-Wave Radar and Convolutional Neural Network
A framework for simultaneous tracking and recognizing drone targets using a low-cost and small-sized millimeter-wave radar is presented. The radar collects the reflected signals of multiple targets in the field of view, including drone and non-drone targets. The analysis of the received signals allows multiple targets to be distinguished because of their different reflection patterns.
  • 1.6K
  • 21 Aug 2023
Topic Review
Field Measurement Studies on Indoor Air Quality
The Indoor Air Quality (IAQ) is one of the key factors that influence the quality of the indoor environment, as well as the human health.
  • 1.6K
  • 16 Feb 2022
Topic Review
Journalistic Knowledge Platform
A Journalistic Knowledge Platform (JKP) is an information system that employ artificial intelligence and big data techniques such as machine learning and knowledge graphs to manage and support the knowledge work needed in all stages of news production. JKPs automate the process of annotating metadata and support daily workflows like news production, archiving, monitoring, management and distribution. JKPs harvest and analyse news and social media information over the net in real time, leverage encyclopaedic sources, and provide journalists with both meaningful background knowledge and newsworthy information. JKPs can provide a digitalisation path towards reduced production costs and improved information quality while adapting the current workflows of newsrooms to new forms of journalism and readers’ demands.
  • 1.6K
  • 20 Jun 2022
Topic Review
Semantic Web and Web GIS
The field of geographic information science and its associated technologies have undergone rapid technological advancement and geographic information systems (GIS) now have wide-ranging functional capabilities. The field is characterised by specific expertise, one with a longstanding history of forward thinking and a track record for ongoing innovation and with this, the field has adopted many disruptive technologies from the fields of computer and information sciences through this transition towards web GIS. Most interestingly in this regard is the (often limited) uptake of semantic web technologies by the field and its associated technologies, the lack of which has resulted in a technological disjoint between these fields. As the field seeks to make geospatial information more accessible to more users and in more contexts through ‘self-service’ applications and web GIS applications, the use of these technologies is imperative to support the interoperability between distributed data sources and services. 
  • 1.6K
  • 21 Feb 2021
Topic Review
Big Data Concepts
The entries consolidates the main concepts about Big Data modeling and management. The characterization and the definitions about structured, semi-structured and unstructured data.
  • 1.6K
  • 04 Jun 2021
  • Page
  • of
  • 25
Academic Video Service