Topic Review
Economic Impact Analysis
An economic impact analysis (EIA) examines the effect of an event on the economy in a specified area, ranging from a single neighborhood to the entire globe. It usually measures changes in business revenue, business profits, personal wages, and/or jobs. The economic event analyzed can include implementation of a new policy or project, or may simply be the presence of a business or organization. An economic impact analysis is commonly conducted when there is public concern about the potential impacts of a proposed project or policy. An economic impact analysis typically measures or estimates the change in economic activity between two scenarios, one assuming the economic event occurs, and one assuming it does not occur (which is referred to as the counterfactual case). This can be accomplished either before or after the event (ex ante or ex post). An economic impact analysis attempts to measure or estimate the change in economic activity in a specified region, caused by a specific business, organization, policy, program, project, activity, or other economic event. The study region can be a neighborhood, town, city, county, statistical area, state, country, continent, or the entire globe.
  • 730
  • 18 Oct 2022
Topic Review
ID-Based Encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can encrypt a message using e.g. the text-value of the receiver's name or email address as a key. The receiver obtains its decryption key from a central authority, which needs to be trusted as it generates secret keys for every user. ID-based encryption was proposed by Adi Shamir in 1984. He was however only able to give an instantiation of identity-based signatures. Identity-based encryption remained an open problem for many years. The pairing-based Boneh–Franklin scheme and Cocks's encryption scheme based on quadratic residues both solved the IBE problem in 2001.
  • 730
  • 25 Oct 2022
Topic Review
Biometric Systems De-Identification
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
  • 729
  • 19 Oct 2021
Topic Review
Supply Chain Management in Pandemics
Pandemics cause chaotic situations in supply chains (SC) around the globe, which can lead towards survivability challenges. The ongoing COVID-19 pandemic is an unprecedented humanitarian crisis that has severely affected global business dynamics. Similar vulnerabilities have been caused by other outbreaks in the past. In these terms, prevention strategies against propagating disruptions require vigilant goal conceptualization and roadmaps. In this respect, there is a need to explore supply chain operation management strategies to overcome the challenges that emerge due to COVID-19-like situations. 
  • 729
  • 16 Mar 2021
Topic Review
ICTs in Agri-Food Logistics
A major challenge of Sustainable Development Goal 12 “Responsible Consumption and Production” is to reduce food losses along production and supply chains. This is particularly critical for fresh food products, due to their perishable and fragile nature, which makes the coordination of the actors all the more crucial to avoid wastes and losses. The rise of new technologies, referred to as “Industry 4.0” powered by the internet of things, big data analytics and artificial intelligence, could bring new solutions to meet these needs. Information and communication technologies (ICTs) allow for frequent exchanges of huge amounts of information between actors in the agrofood chains to coordinate their activities.
  • 729
  • 02 Feb 2022
Topic Review
Global Financial Crisis Impact on SA Car Sales
In both developed and developing nations, with South Africa (SA) being one of the latter, the motor vehicle industry is one of the most important sectors. The SA automobile industry was not unaffected by the 2007/2008 global financial crisis (GFC).
  • 728
  • 16 May 2023
Topic Review
A Patch-Based CNN Built on the VGG-16 Architecture
Facial recognition is a prevalent method for biometric authentication that is utilized in a variety of software applications. This technique is susceptible to spoofing attacks, in which an imposter gains access to a system by presenting the image of a legitimate user to the sensor, hence increasing the risks to social security. Consequently, facial liveness detection has become an essential step in the authentication process prior to granting access to users. A patch-based convolutional neural network (CNN) with a deep component for facial liveness detection for security enhancement was developed, which was based on the VGG-16 architecture.
  • 728
  • 13 Sep 2022
Topic Review
Microsoft TypeScript
Microsoft TypeScript is an open-source programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript, and adds optional static typing to the language. TypeScript is designed for development of large applications and transcompiles to JavaScript. As TypeScript is a superset of JavaScript, existing JavaScript programs are also valid TypeScript programs. TypeScript may be used to develop JavaScript applications for both client-side and server-side (Node.js) execution. There are multiple options available for transcompilation. Either the default TypeScript Checker can be used, or the Babel compiler can be invoked to convert TypeScript to JavaScript. TypeScript supports definition files that can contain type information of existing JavaScript libraries, much like C++ header files can describe the structure of existing object files. This enables other programs to use the values defined in the files as if they were statically typed TypeScript entities. There are third-party header files for popular libraries such as jQuery, MongoDB, and D3.js. TypeScript headers for the Node.js basic modules are also available, allowing development of Node.js programs within TypeScript. The TypeScript compiler is itself written in TypeScript and compiled to JavaScript. It is licensed under the Apache 2.0 License. TypeScript is included as a first-class programming language in Microsoft Visual Studio 2013 Update 2 and later, beside C# and other Microsoft languages. An official extension allows Visual Studio 2012 to support TypeScript as well. Anders Hejlsberg, lead architect of C# and creator of Delphi and Turbo Pascal, has worked on the development of TypeScript.
  • 728
  • 19 Oct 2022
Topic Review
Digital Twins
Digital Twins, which are virtual representations of physical systems mirroring their behavior, enable real-time monitoring, analysis, and optimization. Understanding and identifying the temporal dependencies included in the multivariate time series data that characterize the behavior of the system are crucial for improving the effectiveness of Digital Twins. Long Short-Term Memory (LSTM) networks have been used to represent complex temporal dependencies and identify long-term links in the Industrial Internet of Things (IIoT).
  • 728
  • 03 Nov 2023
Topic Review
Pax (Command)
Pax is an archiving utility available for various operating systems and defined since 1995. Rather than sort out the incompatible options that have crept up between tar and cpio, along with their implementations across various versions of Unix, the IEEE designed new archive utility pax that could support various archive formats with useful options from both archivers. The pax command is available on Unix and Unix-like operating systems and on IBM i, Microsoft Windows NT, and Windows 2000. In 2001, IEEE defined a new pax format which is basically tar with additional extended attributes. The format is not supported by pax commands in most Linux distributions and in FreeBSD, but it is supported by tar commands from GNU and FreeBSD; the format is further supported by pax commands in AIX, Solaris and HP-UX. The name "pax" is an acronym for portable archive exchange. The command invocation and structure is somewhat a unification of both tar and cpio.
  • 727
  • 04 Nov 2022
  • Page
  • of
  • 366
ScholarVision Creations