Log in/Sign up
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Environmental & Earth Sciences
Medicine & Pharmacology
Public Health & Healthcare
Wireless Technologies for Social Distancing in COVID-19 Pandemic
So-called “social distance” refers to measures that work to prevent disease spread through minimizing human physical contact frequency and intensity, including the closure of public spaces (e.g., schools and offices), avoiding large crowds, and maintaining a safe distance between individuals. Because it reduces the likelihood that an infected person would transmit the illness to a healthy individual, social distance reduces the disease’s progression and impact. During the early stages of a pandemic, social distancing techniques can play a crucial role in decreasing the infection rate and delaying the disease’s peak. Consequently, the load on healthcare systems is reduced, and death rates are reduced. The concept of social distancing may not be as easy as physical distancing, given the rising complexity of viruses and the fast expansion of social interaction and globalization. It encompasses numerous non-pharmaceutical activities or efforts designed to reduce the spread of infectious diseases, including monitoring, detection, and alerting people. Different technologies can assist in maintaining a safe distance (e.g., 1.5 m) between persons in the adopted scenarios. There are a number of wireless and similar technologies that can be used to monitor people and public locations in real-time.
25 Mar 2022
Wearable Travel Aids for Blind/Partially Sighted People
The ability to travel (independently) is very important for participation in education, work, leisure activities, and all other aspects of modern life. Blind and partially sighted people experience a number of barriers to travel, including inaccessible information and environments, and consequently require support from technology or other people to overcome them.
11 Aug 2022
Sensor Network Environments
New technologies have driven the rise of what is being termed as the fourth industrial revolution. The introduction of this new revolution is amalgamating the cyber and physical worlds, bringing with it many benefits, such as the advent of industry 4.0, the internet of things, cloud technologies and smart homes and cities. These new and exciting areas are poised to have significant advantages for society; they can increase the efficiency of many systems and increase the quality of life of people. However, these emerging technologies can potentially have downsides, if used incorrectly or maliciously by bad entities. The rise of the widespread use of sensor networks to allow the mentioned systems to function has brought with it many security vulnerabilities that conventional “hard security” measures cannot mitigate. It is for this reason that a new “soft security” approach is being taken in conjunction with the conventional security means. Trust models offer an efficient way of mitigating the threats posed by malicious entities in networks that conventional security methods may not be able to combat.
19 Aug 2022
Scalable Distributed Hyperledger Fabric
Blockchain technology, with its decentralization characteristics, immutability, and traceability, is well-suited for facilitating secure storage, sharing, and management of data in decentralized Internet of Things (IoT) applications. Despite the increasing development of blockchain platforms, there is still no comprehensive approach for adopting blockchain technology in IoT systems. This is due to the blockchain’s limited capability to process substantial transaction requests from a massive number of IoT devices. Hyperledger Fabric (HLF) is a popular open-source permissioned blockchain platform hosted by the Linux Foundation.
26 Jul 2022
Routing in the Data Center
To have adequate routing and forwarding, it is imperative to fully exploit the topological characteristics of fat trees. Some basic requirements should be satisfied: forwarding loops avoidance, rapid failure detection, efficient network utilization (e.g., spanning-tree solutions are not acceptable), routing scalability (in addition to physical scalability). In principle, being the data center a single administrative domain, the candidates to fulfill the routing role are popular link-state IGPs. However, as they have been designed for arbitrary topologies, the flood of link-state advertisements may suffer from scalability issues. Therefore, the possible solutions should entail reducing the message flooding, exploiting the topology knowledge, or using other routing algorithms. In this regard, the following routing protocols will be considered in this work: BGP with a specific configuration for the data center, link-state algorithms with flooding reduction, and ongoing Internet Engineering Task Force (IETF) efforts, namely Routing in Fat Trees (RIFT) and Link State Vector Routing (LSVR), which are leveraging link-state and distance-vector advantages to design specific routing algorithms for data centers.This entry only consider distributed control plane solutions, i.e., routing protocols. Consequently, logically centralized Software-Defined Networking (SDN) solutions are not analyzed.
27 Jan 2022
Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection
The technique PMIPv6/AAND (Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection) would introduce a novel Multiple Virtual Interface (MVI) technique in PMIPv6 to enable multi-homing. The technique supports effective inter-technology handover and solves the LL-ID swapping problem. Additional flag fields, auxiliary advertisement of neighbor detection (AAND)) fields, i.e., ‘D’ and ‘R’ are displayed in PMIPv6 message format. The new technique is known as PMIPv6/AAND, adapted from F-PMIPv6.
12 Nov 2021
Power Supply for Wearables with Task Offloading Capabilities
Task-offloading approaches can be efficiently combined with energy harvesting to address the issue of insufficient battery capacity and limited computation resources in IoMT devices and consequently increase the operating time of wearable devices. This is referred to as joint energy harvesting and task offloading. Using this technology, users can extract energy, convert it into useful energy, store it in the appropriate energy-storage device, and use that energy to perform the corresponding local computing and offloading tasks.
18 Feb 2022
Olfactory Displays in Education and Training
Olfactory displays are defined as human–computer interfaces that generate and diffuse or transmit one or more odors to a user for a purpose. Computer-generated odors, in conjunction with other sensory information, have been proposed and used in education and training settings over the past four decades, supporting memorization of information, helping immerse learners into 3D educational environments, and complementing or supplementing human senses.
19 Nov 2021
Quadro is Nvidia's brand for graphics cards intended for use in workstations running professional computer-aided design (CAD), computer-generated imagery (CGI), digital content creation (DCC) applications, scientific calculations and machine learning. The GPU chips on Quadro-branded graphics cards are identical to those used on GeForce-branded graphics cards. Differences between the Quadro and GeForce cards include the use of ECC memory and enhanced floating point precision. These are desirable properties when the cards are used for calculations which, in contrast to graphics rendering, require reliability and precision. The Nvidia Quadro product line directly competes with AMD's Radeon Pro line of professional workstation cards.
29 Sep 2022
Network Function Virtualization and Service Function Chaining Frameworks
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastructure, thereby reducing both capital and operational costs. With network function virtualisation (NFV), network functions (NFs) such as firewalls, traffic load balancers, content filters, and intrusion detection systems (IDS) are either instantiated on virtual machines (VMs) or lightweight containers, often chained together to create a service function chain (SFC).
01 Mar 2022
Featured Entry Collections
Encyclopedia of Social Sciences
Expected Online Date: Dec 2022
Encyclopedia of ZEMCH Research and Development
Expected Online Date: Dec 2022
Encyclopedia of Engineering
Expected Online Date: Dec 2022
Encyclopedia of Piezoelectrics
Expected Online Date: Dec 2022
Terms and Conditions
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback you would like to report.
Did you find what you were looking for?
Do you agree to share your valuable feedback publicly on
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Upload a screenshot
(Max file size 2MB)
Thank you for your feedback!
You input will help us improve Encyclopedia.