Topic Review
Optical Medieval Music Recognition
Optical Music Recognition (OMR) is one of the key technologies to accelerate and simplify the transcription task in an automatic way. Typically, an OMR system takes an image or manuscript of a musical composition and transforms its content encoded in some digital format such as MEI or MusicXML. 
  • 597
  • 11 Jul 2022
Topic Review
CollabABILITY Cards
Implementing Collaborative Learning (CL) activities to support the education of children is something that must be carefully designed to achieve the desired goals since just having a group of children working on the same activity does not guarantee proper collaboration. It is something that goes from defining the profile of the students to structuring the collaboration according to the learning objectives, the number of children per group, roles defined, and shared resources among others.
  • 597
  • 29 Nov 2022
Topic Review
Internet-of-Things-Based Smart Monitoring System
With technological advancements, smart health monitoring systems are gaining growing importance and popularity. Today, business trends are changing from physical infrastructure to online services. With the restrictions imposed during COVID-19, medical services have been changed. The concepts of smart homes, smart appliances, and smart medical systems have gained popularity. The Internet of Things (IoT) has revolutionized communication and data collection by incorporating smart sensors for data collection from diverse sources.
  • 596
  • 29 May 2023
Topic Review
Hearing Aid Application
Hearing aid application (HAA) is software which, when installed on a mobile computational platform, helps with hearing. Mobile devices may include smartphones, tablets or smart watch.
  • 595
  • 08 Oct 2022
Topic Review
Augmented Reality for Cultural Heritage Communication and Education
Augmented Reality (AR) applications are increasingly used in many research and commercial fields. Some of the fields that these applications are used are recreational digital games, tourism, education, and marketing. Location-based augmented reality is a type of AR that typically runs on mobile devices (smartphones or tablets) and uses the device's GPS sensor to guide users to specific locations. When these locations are reached the users are presented with informative digital content. Location-based augmented reality (AR) applications for cultural heritage communication and education are created to inform the public about cultural heritage monuments in an engaging and entertaining way.
  • 595
  • 02 Jun 2023
Topic Review
MobDet3
MobDet3, a novel object detection network based on the YOLOv5 framework. By utilizing Attentive Feature Aggregation, MobDet3 provides an improved lightweight solution for object detection in autonomous driving applications. The network is designed to be efficient and effective, even on resource-limited embedded systems such as the NXP BlueBox 2.0.
  • 595
  • 30 Aug 2023
Topic Review
Aphelion
The Aphelion Imaging Software Suite is a software suite that includes three base products - Aphelion Lab, Aphelion Dev, and Aphelion SDK for addressing image processing and image analysis applications. The suite also includes a set of extension programs to implement specific vertical applications that benefit from imaging techniques. The Aphelion software products can be used to prototype and deploy applications, or can be integrated, in whole or in part, into a user's system as processing and visualization libraries whose components are available as both DLLs or .Net components.
  • 595
  • 27 Oct 2022
Topic Review
Sun-Ni Law
Sun-Ni's Law (or Sun and Ni's Law, also known as memory-bounded speedup), is a memory-bounded speedup model which states that as computing power increases the corresponding increase in problem size is constrained by the system’s memory capacity. In general, as a system grows in computational power, the problems run on the system increase in size. Analogous to Amdahl's law, which says that the problem size remains constant as system sizes grow, and Gustafson's law, which proposes that the problem size should scale but be bound by a fixed amount of time, Sun-Ni's Law states the problem size should scale but be bound by the memory capacity of the system. Sun-Ni's Law was initially proposed by Xian-He Sun and Lionel Ni at the Proceedings of IEEE Supercomputing Conference 1990. With the increasing disparity between CPU speed and memory data access latency, application execution time often depends on the memory speed of the system. As predicted by Sun and Ni, data access has become the premier performance bottleneck for high-end computing. From this fact one can see the intuition behind Sun-Ni's Law, as system resources increase, applications are often bottlenecked by memory speed and bandwidth, thus an application can achieve a larger speedup by utilizing all the memory capacity in the system. Sun-Ni's Law can be applied to different layers of a memory hierarchy system, from L1 cache to main memory. Through its memory-bounded function,W=G(M), it reveals the trade-off between computing and memory in algorithm and system architecture design. All three speedup models, Sun-Ni, Gustafson, and Amdahl, provide a metric to analyze speedup for Parallel computing. Amdahl’s law focuses on the time reduction for a given fixed-size problem. Amdahl’s law states that the sequential portion of the problem (algorithm) limits the total speedup that can be achieved as system resources increase. Gustafson’s law suggests that it is beneficial to build a large-scale parallel system as the speedup can grow linearly with the system size if the problem size is scaled up to maintain a fixed execution time. Yet as memory access latency often becomes the dominant factor in an application’s execution time, applications may not scale up to meet the time bound constraint. Sun-Ni's Law, instead of constraining the problem size by time, constrains the problem by the memory capacity of the system, or in other words bounds based on memory. Sun-Ni's Law is a generalization of Amdahl's Law and Gustafson's Law. When the memory-bounded function G(M)=1, it resolves to Amdahl's law, when the memory-bounded function G(M)=m,the number of processors, it resolves to Gustafson's Law.
  • 595
  • 31 Oct 2022
Topic Review
Illegal IPTV Technologies
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from different sources. These infringing IPTV technologies may include websites, software, software add-ons, and physical set-top boxes. Due to the free or low cost of illegal IPTV technologies, illicit IPTV content providers will often resort to intrusive advertising, scams, and the distribution of malware to increase their revenue.
  • 595
  • 20 Oct 2023
Topic Review
DNS Zone
A DNS zone is a specific portion of the DNS namespace in the Domain Name System (DNS), which is managed by a specific organization or administrator. A DNS zone is an administrative space that allows for more granular control of the DNS components, such as authoritative nameserver. The DNS is broken up into many different zones, which are distinctly managed areas in the DNS namespace. DNS zones are not necessarily physically separated from one another, however, a DNS zone can contain multiple subdomains and multiple zones can exist on the same server. The domain namespace of the Internet is organized into a hierarchical layout of subdomains below the DNS root domain. The individual domains of this tree may serve as delegation points for administrative authority and management. However, usually, it is furthermore desirable to implement fine-grained boundaries of delegation, so that multiple sub-levels of a domain may be managed independently. Therefore, the domain name space is partitioned into areas (zones) for this purpose. A zone starts at a domain and extends downward in the tree to the leaf nodes or to the top-level of subdomains where other zones start. A DNS zone is implemented in the configuration system of a domain name server. Historically, it is defined in the zone file, an operating system text file that starts with the special DNS record type Start of Authority (SOA) and contains all records for the resources described within the zone. This format was originally used by the Berkeley Internet Name Domain Server (BIND) software package and is defined in RFC 1034 and RFC 1035.
  • 594
  • 01 Dec 2022
  • Page
  • of
  • 366
ScholarVision Creations