Topic Review
Anomaly Detection in Autonomous Robotic Missions
An anomaly in autonomous robotic missions (ARM) is a deviation from the expected behaviour, performance, or state of the robotic system and its environment, which may impact the mission’s objectives, safety, or efficiency; and this anomaly can be caused either by system faults or the change in the environmental dynamics of interaction. The nuanced understanding of anomaly categories facilitates a more strategic approach, ensuring that detection methods are more effective in addressing the specific nature of the anomaly.
  • 589
  • 11 Mar 2024
Topic Review
Developing Microservice-Based Applications
Microservice Architecture (MSA) is a rising trend in software architecture design. Applications based on MSA are distributed applications whose components are microservices. MSA has already been adopted with great success by numerous companies, and a significant number of published papers discuss its advantages. However, there are several important challenges in the adoption of microservices such as finding the right decomposition approach, heterogeneous technology stacks, lack of relevant skills, out-of-date documentation, etc.
  • 588
  • 15 Jul 2022
Topic Review
Ctty (Command)
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 588
  • 29 Sep 2022
Topic Review
Light Field Image Super-Resolution
Light fields play important roles in industry, including in 3D mapping, virtual reality and other fields. However, as a kind of high-latitude data, light field images are difficult to acquire and store. Compared with traditional 2D planar images, 4D light field images contain information from different angles in the scene, and thus the super-resolution of light field images needs to be performed not only in the spatial domain but also in the angular domain. In the early days of light field super-resolution research, many solutions for 2D image super-resolution, such as Gaussian models and sparse representations, were also used in light field super-resolution. With the development of deep learning, light field image super-resolution solutions based on deep-learning techniques are becoming increasingly common and are gradually replacing traditional methods.
  • 588
  • 27 Jul 2022
Topic Review
Safety and Security Issues in the IoT Domain
The Internet of Things (IoT), which is developing quickly, has continued to provide humanity with many advantages, including many applications crucial for security and safety. The assurance that IoT devices will not pose a risk to people or the environment is necessary to realise the full potential of IoT applications, particularly in high-consequence areas. To develop safe, secure, and dependable IoT systems, it is necessary to comprehend a wide range of safety and security issues across the IoT's architectural frameworks and levels. As a result, among other attributes of dependable IoT systems, this research outlines safety and security features.
  • 588
  • 31 Jul 2023
Topic Review
Digital Twin Applications for Microgrids Components
The concept of the digital twin (DT) has been adopted as an important aspect in digital transformation of power systems. Microgrids (MG) can be seen as scaled-down versions of a centralised power system. A microgrid is a local power network that acts as a dependable island within bigger regional and national electricity networks, providing power without interruption even when the main grid is down. Microgrids are essential components of smart cities that are both resilient and sustainable, providing smart cities the opportunity to develop sustainable energy delivery systems.
  • 587
  • 31 Jul 2023
Topic Review
Blockchain-Based Security for IoMT Edge Networks
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring into citizens’ quality of life by enabling IoMT-based healthcare monitoring systems, there is an urgent need for novel security mechanisms to address the pressing security challenges of IoMT edge networks in an effective and efficient manner before they gain the trust of all involved stakeholders and reach their full potential in the market of next generation IoMT-based healthcare monitoring systems. Blockchain technology has been foreseen by the industry and research community as a disruptive technology that can be integrated into novel security solutions for IoMT edge networks, as it can play a significant role in securing IoMT devices and resisting unauthorized access during data transmission.
  • 586
  • 06 Apr 2022
Topic Review
List of 16-bit Computer Hardware Palettes
This is a list of notable 16-bit RGB color palettes, which were primarily manufactured from 1985 to 1995. Due to mixed-bit architectures, the n-bit distinction is not always a strict categorization.
  • 586
  • 10 Nov 2022
Topic Review
Voting-Based Leader-Election Scheme in Lead-Follow UAV Swarm
The recent advances in unmanned aerial vehicles (UAVs) enormously improve their utility and expand their application scope. The UAV and swarm implementation further prevail in Smart City practices with the aid of edge computing and urban Internet of Things. The lead–follow formation in UAV swarm is an important organization means and has been adopted in diverse exercises, for its efficiency and ease of control. The reliability of centralization makes the entire swarm system in risk of collapse and instability, if a fatal fault incident happens in the leader. Researchers propose a voting-based leader election scheme inspired by the Raft method in distributed computation consensus to build a mechanism helping the distributed swarm recover from possible failures.
  • 586
  • 15 Aug 2022
Topic Review
Microsoft Double Space BIOS Parameter Block
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 586
  • 12 Oct 2022
  • Page
  • of
  • 366
ScholarVision Creations