Topic Review
Blockchain and Fog Based Architecture
Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities’ applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time response applications. There are various frameworks in real-world to support the IoE in smart-cities but they face the issues like security, platform Independence, multi-application assistance, and resource management. This article is motivated from the Blockchain and Fog computing technologies and presents a secured architecture Blockchain and Fog-based Architecture Network (BFAN) for IoE applications in the smart cities. The proposed architecture secures sensitive data with encryption, authentication, and Blockchain. It assists the System-developers and Architects to deploy the applications in smart city paradigm. The goal of the proposed architecture is to reduce the latency and energy, and ensure improved security features through Blockchain technology. The simulation results demonstrate that the proposed architecture performs better than the existing frameworks for smart-cities.
  • 941
  • 28 Oct 2020
Topic Review
Smart Cities and Financial Sustainability
Smart city initiatives have become recurrent strategies used by local governments to provide better services, improve their managerial effectiveness, and increase citizen participation in cities’ decision-making processes. Great potential exists to use data, information, and communication technologies (ICT) more extensively to improve city operations. However, depending on the size and financial situation of the cities, some smart city initiatives could be considered investments that are too expensive and not easy to maintain in the long term. If city governments want to achieve most of the benefits arising from the intense use of technology and data, building financially sustainable smart cities should be seen as a priority.
  • 941
  • 28 Jun 2022
Topic Review
Dell EMC ScaleIO
Dell EMC PowerFlex (previously known as ScaleIO and VxFlex OS), is a commercial software-defined storage product from Dell EMC that creates a server-based storage area network (SAN) from local server storage using x86 servers. It converts this direct-attached storage into shared block storage than runs over an IP-based network. PowerFlex can scale from three compute/storage nodes to over 1,000 nodes that can drive up to 240 million IOPS of performance. PowerFlex is bundled with Dell EMC commodity computing servers (officially called VxFlex Ready Nodes, PowerFlex appliance, and PowerFlex rack). PowerFlex can be deployed as storage only or as a converged infrastructure combining storage, computational and networking resources into a single block. Capacity and performance of all available resources are aggregated and made available to every participating PowerFlex server and application. Storage tiers can be created with media types and drive types that match the ideal performance or capacity characteristics to best suit the application needs.
  • 941
  • 01 Nov 2022
Topic Review
Electrochemical Random-Access Memory
Electrochemical Random-Access Memory (ECRAM) is a type of non-volatile memory (NVM) with multiple levels per cell (MLC) designed for deep learning analog acceleration. An ECRAM cell is a three-terminal device composed of a conductive channel, an insulating electrolyte, an ionic reservoir, and metal contacts. The resistance of the channel is modulated by ionic exchange at the interface between the channel and the electrolyte upon application of an electric field. The charge-transfer process allows both for state retention in the absence of applied power, and for programming of multiple distinct levels, both differentiating ECRAM operation from the one of a field-effect transistor (FET). The write operation is deterministic and can result in symmetrical potentiation and depression, making ECRAM arrays attractive for acting as artificial synaptic weights in physical implementations of artificial neural networks (ANN). The technology challenges include open circuit potential (OCP) and semiconductor foundry compatibility associated with energy materials. Universities, government laboratories, and corporate research teams have contributed to the development of ECRAM for analog computing. Notably, Sandia National Laboratories designed a lithium-based cell inspired by solid-state battery materials, Stanford University built an organic proton-based cell, and International Business Machines (IBM) demonstrated in-memory selector-free parallel programming for a logistic regression task in an array of metal-oxide ECRAM designed for insertion in the back end of line (BEOL).
  • 941
  • 17 Nov 2022
Topic Review
Tiny-YOLO-Based CNN Architecture for Applications in Human Detection
Human detection is a special application of object recognition and is considered one of the greatest challenges in computer vision. It is the starting point of a number of applications, including public safety and security surveillance around the world. Human detection technologies have advanced significantly due to the rapid development of deep learning techniques. Convolutional neural networks (CNNs) have become quite popular for tackling various problems, among which includes object detection.
  • 940
  • 14 Oct 2022
Topic Review
Disaster Recovery Plan
A disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures an organization is to follow in the event of a disaster. It is "a comprehensive statement of consistent actions to be taken before, during and after a disaster". The disaster could be natural, environmental or man-made. Man-made disasters could be intentional (for example, an act of a terrorist) or unintentional (that is, accidental, such as the breakage of a man-made dam). Given organizations' increasing dependency on information technology to run their operations, a disaster recovery plan, sometimes erroneously called a Continuity of Operations Plan (COOP), is increasingly associated with the recovery of information technology data, assets, and facilities.
  • 940
  • 29 Nov 2022
Topic Review
GQL Graph Query Language
In September 2019 a proposal for a project to create a new standard graph query language (ISO/IEC 39075 Information Technology — Database Languages — GQL). was approved by a vote of national standards bodies which are members of ISO/IEC Joint Technical Committee 1(ISO/IEC JTC 1). JTC 1 is responsible for international Information Technology standards. GQL is intended to be a declarative database query language, like SQL.
  • 940
  • 09 Oct 2022
Topic Review
Cybersickness
Overcoming cybersickness remains elusive for VR developers and practitioners. Symptoms such as discomfort, headache, eye strain, and dizziness during and after VR experiences can be associated with cybersickness. Cybersickness is often compared with motion sickness and simulator sickness. However, cybersickness is categorized as a subset of motion sickness as cybersickness is considered a form of visually induced motion sickness (VIMS) (Weech et al., 2019) and shown to be three times more serious than simulator sickness (Stanney et al., 1997).
  • 938
  • 27 Apr 2021
Topic Review
Opportunities and Challenges in Quantum Computing for Business
Quantum computing is emerging as a groundbreaking force, promising to redefine the boundaries of technology and business. 
  • 938
  • 14 Nov 2023
Topic Review
Models for Evaluation Intrusion Detection Systems in IoT
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. 
  • 938
  • 27 May 2022
  • Page
  • of
  • 366
ScholarVision Creations