Encyclopedia
Scholarly Community
Encyclopedia
Entry
Journal
Book
Video
Image
News
About
Entry
Entry
Video
Image
Log in/Sign up
Submit
Entry
Video
Image
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Hottest
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Type:
All
Topic Review
Biography
Topic Review
Sandy Bridge Architecture
This document presents a brief study of the Intel processor microarchitecture named Sandy Bridge. It presents the processor families, as well as the type of application for each line. At the same time, it provides information about the architecture, as well as the processor pipeline and data about the operation of the Cache memory.
139
26 Feb 2024
Topic Review
Safety and Security Issues in the IoT Domain
The Internet of Things (IoT), which is developing quickly, has continued to provide humanity with many advantages, including many applications crucial for security and safety. The assurance that IoT devices will not pose a risk to people or the environment is necessary to realise the full potential of IoT applications, particularly in high-consequence areas. To develop safe, secure, and dependable IoT systems, it is necessary to comprehend a wide range of safety and security issues across the IoT's architectural frameworks and levels. As a result, among other attributes of dependable IoT systems, this research outlines safety and security features.
491
31 Jul 2023
Topic Review
Peer Reviewed
Safeguarding Traditional Crafts in Europe
This entry discusses the challenge of safeguarding crafts in Europe. Safeguarding is defined herein as the systematic process of understanding, representing, preserving, and valorizing crafts following the recommendations of UNESCO and the UN-World Tourism Organization. The abovementioned challenges are discussed through a multidisciplinary prism starting from the scientific challenges in the information and communication technologies sector and expanding the discussion to ethical, legal, and policy-making measures and recommendations to safeguard crafts as a form of tangible and intangible cultural heritage but also as a source of growth and impact for the communities that practice them. To this end, the role of education and training for craft preservation is discussed, considering that the declining number of practitioners and apprentices is considered today the main threat to their preservation.
381
11 Oct 2023
Topic Review
Routing in the Data Center
To have adequate routing and forwarding, it is imperative to fully exploit the topological characteristics of fat trees. Some basic requirements should be satisfied: forwarding loops avoidance, rapid failure detection, efficient network utilization (e.g., spanning-tree solutions are not acceptable), routing scalability (in addition to physical scalability). In principle, being the data center a single administrative domain, the candidates to fulfill the routing role are popular link-state IGPs. However, as they have been designed for arbitrary topologies, the flood of link-state advertisements may suffer from scalability issues. Therefore, the possible solutions should entail reducing the message flooding, exploiting the topology knowledge, or using other routing algorithms. In this regard, the following routing protocols will be considered in this work: BGP with a specific configuration for the data center, link-state algorithms with flooding reduction, and ongoing Internet Engineering Task Force (IETF) efforts, namely Routing in Fat Trees (RIFT) and Link State Vector Routing (LSVR), which are leveraging link-state and distance-vector advantages to design specific routing algorithms for data centers.This entry only consider distributed control plane solutions, i.e., routing protocols. Consequently, logically centralized Software-Defined Networking (SDN) solutions are not analyzed.
639
27 Jan 2022
Topic Review
Robots and Complete Autonomy
As robotics technology advances, the question of whether robots will ever attain complete autonomy becomes increasingly relevant. While current robots possess impressive capabilities, there are still significant limitations to their autonomy. This research explores the current state of robotics technology and examines the challenges that must be overcome to achieve full autonomy.
274
22 May 2023
Topic Review
RFID Technology and Main Components
RFID Technology is an automatic identification technology, which works through radio signals, retrieving and storing data remotely. It is used in hundreds, or perhaps even thousands, of applications with the aim of collecting data about objects in order to identify ways to solve everyday problems.
58
28 Feb 2024
Topic Review
Quantum Computing Supremacy in the Internet of Things
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT.
1.3K
16 Nov 2022
Topic Review
Quantum Computer Hardware
Quantum computers are not only faster than conventional classical computers, but they also have a different framework for solving problems due to the laws of quantum mechanics such as superposition and entanglement.
96
22 Sep 2023
Topic Review
Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection
The technique PMIPv6/AAND (Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection) would introduce a novel Multiple Virtual Interface (MVI) technique in PMIPv6 to enable multi-homing. The technique supports effective inter-technology handover and solves the LL-ID swapping problem. Additional flag fields, auxiliary advertisement of neighbor detection (AAND)) fields, i.e., ‘D’ and ‘R’ are displayed in PMIPv6 message format. The new technique is known as PMIPv6/AAND, adapted from F-PMIPv6.
517
12 Nov 2021
Topic Review
Power Supply for Wearables with Task Offloading Capabilities
Task-offloading approaches can be efficiently combined with energy harvesting to address the issue of insufficient battery capacity and limited computation resources in IoMT devices and consequently increase the operating time of wearable devices. This is referred to as joint energy harvesting and task offloading. Using this technology, users can extract energy, convert it into useful energy, store it in the appropriate energy-storage device, and use that energy to perform the corresponding local computing and offloading tasks.
467
18 Feb 2022
Page
of
8
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Michael McAleer
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Journal
Book
Video
Image
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×