Topic Review
Efficient Authentication Protocol and Its Application
Chaos theory and its extension into cryptography have generated significant applications in industrial mixing, pulse width modulation, and electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism enables the charging of electronic devices devoid of cords and wires.
  • 532
  • 22 Dec 2021
Topic Review
Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks
The domain of information-centric networking (ICN) is expanding as more devices are becoming a part of connected technologies. New methods for serving content from a producer to a consumer are being explored, and Named Data Networking (NDN) is one of them. The NDN protocol routes the content from a producer to a consumer in a network using content names, instead of IP addresses. This facility, combined with content caching, efficiently serves content for very large networks consisting of a hybrid and ad hoc topology with both wired and wireless media.
  • 532
  • 06 Jun 2022
Topic Review
Blockchain-Enabled Supply Chain platform for Indian Dairy Industry
Conventional food supply chains are centralized in nature and possess challenges pertaining to a single point of failure, product irregularities, quality compromises, and loss of data. Numerous cases of food fraud, contamination, and adulteration are daily reported from multiple parts of India, suggesting the absolute need for an upgraded decentralized supply chain model. A country such as India, where its biggest strength is its demographic dividend, cannot afford to malnutrition a large population of its children by allowing them to consume contaminated and adulterated dairy products. In view of the gravity of the situation, a blockchain-enabled supply chain platform for the dairy industry was proposed. With respect to the supply chain platform, the dairy products of choice include milk, cheese, and butter. Blockchain is one of the fastest growing technologies having widespread acceptance across multiple industry verticals.  
  • 532
  • 22 Sep 2022
Topic Review
Cryptographic Engineering
Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate. Below are the main topics that are specifically related to cryptographic engineering: Cryptographic implementations Attacks against implementations and countermeasures against these attacks Tools and methodologies Applications Interactions between cryptographic theory and implementation issues
  • 532
  • 08 Nov 2022
Topic Review
Æternity
æternity is a public, open-source, blockchain-based distributed computing and digital-asset platform that builds upon decentralized cryptographic P2P technology. Real-world data can interface with smart contracts through "oracles". Scalability and trustless Turing-complete state channels set æternity apart from Blockchain 2.0 projects. æternity provides a virtual machine which can execute scripts implementing a so-called "smart contracts" using an decentralized global network of public nodes maintaining the blockchain. State channels enable smart contracts to remain private and scalable as long as there is no disagreement between the counterparties. Inherently integrated in æternity is a value token called an "æon" or "AE token", which can be transferred between participants and is used to compensate participant nodes for computations performed. AE tokens are used to pay for space and computation time on the virtual machine and prevent spam on the network while allocating storage and computation time proportionally to the incentive offered by the request.
  • 532
  • 18 Nov 2022
Topic Review
Millimeter-Wave Radar and Convolutional Neural Network
A framework for simultaneous tracking and recognizing drone targets using a low-cost and small-sized millimeter-wave radar is presented. The radar collects the reflected signals of multiple targets in the field of view, including drone and non-drone targets. The analysis of the received signals allows multiple targets to be distinguished because of their different reflection patterns.
  • 532
  • 21 Aug 2023
Topic Review
Categorical Exploratory Data Analysis
Categorical exploratory data analysis (CEDA) is demonstrated to provide new resolutions for two topics: multiclass classification (MCC) with one single categorical response variable and response manifold analytics (RMA) with multiple response variables. 
  • 531
  • 08 Jul 2021
Topic Review
COVID Mortality Prediction
The considerations in this review may help to develop further studies to predict mortality in COVID patients, including both adulthood and childhood, although children and young people remain at low risk of COVID mortality. Moreover, suggestions collected in this study could also be useful to predict prognoses other than mortality (e.g., intubation and length of hospital stay).
  • 531
  • 27 Oct 2021
Topic Review
Traditional Computer-Vision Methods Implemented in Sports
Automatic analysis of video in sports is a possible solution to the demands of fans and professionals for various kinds of information. Analyzing videos in sports has provided a wide range of applications, which include player positions, extraction of the ball’s trajectory, content extraction, and indexing, summarization, detection of highlights, on-demand 3D reconstruction, animations, generation of virtual view, editorial content creation, virtual content insertion, visualization and enhancement of content, gameplay analysis and evaluations, identifying player’s actions, referee decisions and other fundamental elements required for the analysis of a game. Recent developments in video analysis of sports have a focus on the features of computer vision techniques, which are used to perform certain operations for which these are assigned, such as detailed complex analysis such as detection and classification of each player based on their team in every frame or by recognizing the jersey number to classify players based on their team will help to classify various events where the player is involved. In higher-level analysis, such as tracking the player or ball, many more such evaluations are to be considered for the evaluation of a player’s skills, detecting the team’s strategies, events and the formation of tactical positions such as midfield analysis in various sports such as soccer, basketball, and also various sports vision applications such as smart assistants, virtual umpires, assistance coaches. A higher-level semantic interpretation is an effective substitute, especially in situations when reduced human intervention and real-time analysis are desired for the exploitation of the delivered system outputs.
  • 531
  • 19 May 2022
Topic Review
Asperitas Microdatacenter
A microdatacenter is a small, self contained data center consisting of computing, storage, networking, power and cooling. Micro data centers typically employ water cooling to achieve compactness, low component count, low cost and high energy efficiency. Its small size allows decentralised deployment in places where traditional data centers cannot go, for instance edge computing for Internet of things.
  • 531
  • 01 Nov 2022
  • Page
  • of
  • 366
ScholarVision Creations