Topic Review
Sandy Bridge Architecture
This document presents a brief study of the Intel processor microarchitecture named Sandy Bridge. It presents the processor families, as well as the type of application for each line. At the same time, it provides information about the architecture, as well as the processor pipeline and data about the operation of the Cache memory.
  • 122
  • 26 Feb 2024
Topic Review
Safety and Security Issues in the IoT Domain
The Internet of Things (IoT), which is developing quickly, has continued to provide humanity with many advantages, including many applications crucial for security and safety. The assurance that IoT devices will not pose a risk to people or the environment is necessary to realise the full potential of IoT applications, particularly in high-consequence areas. To develop safe, secure, and dependable IoT systems, it is necessary to comprehend a wide range of safety and security issues across the IoT's architectural frameworks and levels. As a result, among other attributes of dependable IoT systems, this research outlines safety and security features.
  • 489
  • 31 Jul 2023
Topic Review Peer Reviewed
Safeguarding Traditional Crafts in Europe
This entry discusses the challenge of safeguarding crafts in Europe. Safeguarding is defined herein as the systematic process of understanding, representing, preserving, and valorizing crafts following the recommendations of UNESCO and the UN-World Tourism Organization. The abovementioned challenges are discussed through a multidisciplinary prism starting from the scientific challenges in the information and communication technologies sector and expanding the discussion to ethical, legal, and policy-making measures and recommendations to safeguard crafts as a form of tangible and intangible cultural heritage but also as a source of growth and impact for the communities that practice them. To this end, the role of education and training for craft preservation is discussed, considering that the declining number of practitioners and apprentices is considered today the main threat to their preservation.
  • 373
  • 11 Oct 2023
Topic Review
Routing in the Data Center
To have adequate routing and forwarding, it is imperative to fully exploit the topological characteristics of fat trees. Some basic requirements should be satisfied: forwarding loops avoidance, rapid failure detection, efficient network utilization (e.g., spanning-tree solutions are not acceptable), routing scalability (in addition to physical scalability). In principle, being the data center a single administrative domain, the candidates to fulfill the routing role are popular link-state IGPs. However, as they have been designed for arbitrary topologies, the flood of link-state advertisements may suffer from scalability issues. Therefore, the possible solutions should entail reducing the message flooding, exploiting the topology knowledge, or using other routing algorithms. In this regard, the following routing protocols will be considered in this work: BGP with a specific configuration for the data center, link-state algorithms with flooding reduction, and ongoing Internet Engineering Task Force (IETF) efforts, namely Routing in Fat Trees (RIFT) and Link State Vector Routing (LSVR), which are leveraging link-state and distance-vector advantages to design specific routing algorithms for data centers.This entry only consider distributed control plane solutions, i.e., routing protocols. Consequently, logically centralized Software-Defined Networking (SDN) solutions are not analyzed.
  • 630
  • 27 Jan 2022
Topic Review
Robots and Complete Autonomy
As robotics technology advances, the question of whether robots will ever attain complete autonomy becomes increasingly relevant. While current robots possess impressive capabilities, there are still significant limitations to their autonomy. This research explores the current state of robotics technology and examines the challenges that must be overcome to achieve full autonomy.
  • 273
  • 22 May 2023
Topic Review
RFID Technology and Main Components
RFID Technology is an automatic identification technology, which works through radio signals, retrieving and storing data remotely. It is used in hundreds, or perhaps even thousands, of applications with the aim of collecting data about objects in order to identify ways to solve everyday problems.
  • 52
  • 28 Feb 2024
Topic Review
Quantum Computing Supremacy in the Internet of Things
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT.
  • 1.2K
  • 16 Nov 2022
Topic Review
Quantum Computer Hardware
Quantum computers are not only faster than conventional classical computers, but they also have a different framework for solving problems due to the laws of quantum mechanics such as superposition and entanglement.
  • 92
  • 22 Sep 2023
Topic Review
Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection
The technique PMIPv6/AAND (Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection) would introduce a novel Multiple Virtual Interface (MVI) technique in PMIPv6 to enable multi-homing. The technique supports effective inter-technology handover and solves the LL-ID swapping problem. Additional flag fields, auxiliary advertisement of neighbor detection (AAND)) fields, i.e., ‘D’ and ‘R’ are displayed in PMIPv6 message format. The new technique is known as PMIPv6/AAND, adapted from F-PMIPv6.
  • 516
  • 12 Nov 2021
Topic Review
Power Supply for Wearables with Task Offloading Capabilities
Task-offloading approaches can be efficiently combined with energy harvesting to address the issue of insufficient battery capacity and limited computation resources in IoMT devices and consequently increase the operating time of wearable devices. This is referred to as joint energy harvesting and task offloading. Using this technology, users can extract energy, convert it into useful energy, store it in the appropriate energy-storage device, and use that energy to perform the corresponding local computing and offloading tasks.
  • 464
  • 18 Feb 2022
  • Page
  • of
  • 8