Topic Review
Unmanned Aerial Vehicles and Federated Learning
Unmanned aerial vehicles (UAVs) have gained increasing attention in boosting the performance of conventional networks due to their small size, high efficiency, low cost, and autonomously nature. The amalgamation of UAVs with both distributed/collaborative Deep Learning (DL) algorithms, such as Federated Learning (FL), and Blockchain technology have ushered in a new paradigm of Secure Multi-Access Edge Computing (S-MEC). Indeed, FL enables UAV devices to leverage their sensed data to build local DL models. The latter are then sent to a central node, e.g., S-MEC node, for aggregation, in order to generate a global DL model. Therefore, FL enables UAV devices to collaborate during several FL rounds in generating a learning model, while avoiding to share their local data, and thus ensuring UAVs’ privacy.
  • 847
  • 22 Jul 2022
Topic Review
Deepfake Detection
Deepfakes can compromise the privacy and societal security of both individuals and governments. In addition, deepfakes are a threat to national security, and democracies are progressively being harmed. To overcome/mitigate the impact of deepfakes, different methods and approaches have been introduced that can identify deepfakes and appropriate corrective actions can be taken. 
  • 847
  • 20 Jul 2022
Topic Review
Rosetta Stone
Rosetta Stone Language Learning is proprietary, computer-assisted language learning (CALL) software published by Rosetta Stone Inc, part of the IXL Learning family of products. The software uses images, text, and sound to teach words and grammar by spaced repetition, without translation. Rosetta Stone calls its approach Dynamic Immersion. The software's name and logo allude to the ancient stone slab of the same name on which the Decree of Memphis is inscribed in three writing systems. IXL Learning acquired Rosetta Stone in March 2021.
  • 847
  • 24 Oct 2022
Topic Review
Blockchain in the Healthcare Sector
The emergence of blockchain technology makes it possible to address disparate distributed system security concerns in formerly ridiculous practices. A key factor of this ability is the decentralization of the symmetrically distributed ledgers of blockchain. Such decentralization has replaced several security functionalities of centralized authority with the use of cryptographic systems. That is, public or asymmetric cryptography is the key part of what makes blockchain technology possible. The blockchain experience introduces the chance for the healthcare field to implement these knowhows in their electronic records. This adoption supports retaining and sharing the symmetrical patient records with the appropriate alliance of hospitals and healthcare providers in a secure decentralized system, using asymmetric cryptography like hashing, digitally signed transactions, and public key infrastructure. These include specialized applications for drug tracking, applications for observing patients, or Electronic Health Records (EHR). Therefore, it is essential to notice that the principled awareness of the healthcare professionals is the leading point of the right perception ethics. 
  • 847
  • 09 Sep 2022
Topic Review
Harbour
Harbour is a modern computer programming language, primarily used to create database/business programs. It is a modernized, open sourced and cross-platform version of the older Clipper system, which in turn developed from the dBase database market of the 1980s and 90s. Harbour code using the same databases can be compiled under a wide variety of platforms, including Microsoft Windows, Linux, Unix variants, several BSD descendants, Mac OS X, MINIX 3, Windows CE, Pocket PC, Symbian, iOS, Android, QNX, VxWorks, OS/2/eComStation, BeOS/Haiku, AIX and MS-DOS.
  • 846
  • 04 Nov 2022
Topic Review
Structure-Borne Noise in Offshore Piling
The growing demand for renewable energy supply stimulates a drastic increase in the deployment rate of offshore wind energy. Offshore wind power generators are usually supported by large foundation piles that are driven into the seabed with hydraulic impact hammers or vibratory devices. The pile installation process, which is key to the construction of every new wind farm, is hindered by a serious by-product: the underwater noise pollution. 
  • 845
  • 14 Sep 2021
Topic Review
Network Threat Detection with ML/DL in SDN-Based Platforms
A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NIDS) prevent intrusions into a network and preserve the network’s integrity, availability, and confidentiality. Much work has been done on NIDS but there are still improvements needed in reducing false alarms and increasing threat detection accuracy. Advanced approaches such as deep learning (DL) and machine learning (ML) have been implemented in SDN-based NIDS to overcome the security issues within a network.
  • 844
  • 14 Nov 2022
Topic Review
Cloud Development and 3D Printing
The United Nations (UN) 2030 agenda on sustainable development goals (SDGs) encourages us to implement sustainable infrastructure and services for confronting challenges such as large energy consumption, solid waste generation, depletion of water resources and emission of greenhouse gases in the construction industry. Therefore, to overcome challenges and establishing sustainable construction, there is a requirement to integrate information technology with innovative manufacturing processes and materials science. Moreover, the wide implementation of three-dimensional printing (3DP) technology in constructing monuments, artistic objects, and residential buildings has gained attention. The integration of the Internet of Things (IoT), cloud manufacturing (CM), and 3DP allows us to digitalize the construction for providing reliable and digitalized features to the users. In this review article, we discuss the opportunities and challenges of implementing the IoT, CM, and 3D printing (3DP) technologies in building constructions for achieving sustainability. 
  • 844
  • 12 Jul 2021
Topic Review
Efficiency of Industrial Based on Network DEA Method
There are two main methods to study the efficiency of industrial sectors. The first is parametric method represented by stochastic frontier method (SFA). The other is the more widely used non-parametric method represented by data envelopment analysis (DEA), which makes up for the shortcomings of the SFA method. It does not need to specify a certain functional relationship between input and output. The operation process of the Chinese provincial industrial system consists of four stages, namely the production (P) stage, wastewater treatment (WWT) stage, solid waste treatment (SWT) stage, and sulfur dioxide treatment (SDT) stage. Based on this structure, a four-stage data envelopment analysis (DEA) model is developed to evaluate the eco-efficiency, production efficiency, wastewater treatment efficiency, solid waste treatment efficiency, and sulfur dioxide treatment efficiency of provincial industrial systems in China, considering the undesirable output and variable returns to scale (VRS). 
  • 843
  • 24 May 2022
Topic Review
Ejabberd
ejabberd is an Extensible Messaging and Presence Protocol (XMPP) application server and an MQ Telemetry Transport (MQTT) broker, written mainly in the Erlang programming language. It can run under several Unix-like operating systems such as macOS, Linux, FreeBSD, NetBSD, OpenBSD and OpenSolaris. Additionally, ejabberd can run under Microsoft Windows. The name ejabberd stands for Erlang Jabber Daemon (Jabber being a former name for XMPP) and is written in lowercase only, as is common for daemon software. ejabberd is free software, distributed under the terms of the GNU GPL-2.0-or-later. (As of 2009), it is one of the most popular open source applications written in Erlang. XMPP: The Definitive Guide (O'Reilly Media, 2009) praised ejabberd for its scalability and clustering feature, at the same time pointing out that being written in Erlang is a potential acceptance issue for users and contributors. The software's creator, Alexey Shchepin was awarded the Erlang User of the Year award at the 2006 Erlang user conference. ejabberd has a number of notable deployments, IETF Groupchat Service, BBC Radio LiveText, Nokia's Ovi, KDE Talk and one in development at Facebook. (As of 2009) ejabberd is the most popular server among smaller XMPP-powered sites that register on xmpp.org. With the next major release after version 2 (previously called ejabberd 3), the versioning scheme was changed to reflect release dates as "Year.Month-Revision" (starting with 13.04-beta1). It was also announced that further development will be split into an "ejabberd Community Server" and an "ejabberd Commercial Edition [which] targets carriers, websites, service providers, large corporations, universities, game companies, that need high level of commitment from ProcessOne, stability and performance and a unique set of features to run their business successfully."
  • 843
  • 01 Nov 2022
  • Page
  • of
  • 366
ScholarVision Creations