Topic Review
Robot Programming Skill Assessment
Robot programming skill classes are becoming more popular. Higher order thinking, on the other hand, is an important issue in developing the skills of 21st-century learners. Truth be told, those two abilities are consistent subjects that are trending in academics.
  • 353
  • 19 May 2022
Topic Review
Approaches to Cardiovascular and Respiratory Systems Modelling
'Medicine in silico' has been strongly encouraged due to ethical and legal limitations related to animal experiments and investigations conducted on patients. Computer models, particularly the very complex ones (virtual patients—VP), can be used in medical education and biomedical research as well as in clinical applications. Simpler patient-specific models may aid medical procedures. However, computer models are unfit for medical devices testing. Hybrid (i.e., numerical–physical) models do not have this disadvantage.
  • 353
  • 20 Jun 2022
Topic Review
Multi-Environment Real-Time
Multi-Environment Real-Time (MERT), later renamed UNIX Real-Time (UNIX-RT), is a hybrid time-sharing and real-time operating system developed in the 1970s at Bell Labs for use in embedded minicomputers (especially PDP-11s). A version named Duplex Multi Environment Real Time (DMERT) was the operating system for the AT&T 3B20D telephone switching minicomputer, designed for high availability; DMERT was later renamed Unix RTR (Real-Time Reliable). A generalization of Bell Labs' time-sharing operating system Unix, MERT featured a redesigned, modular kernel that was able to run Unix programs and privileged real-time computing processes. These processes' data structures were isolated from other processes with message passing being the preferred form of interprocess communication (IPC), although shared memory was also implemented. MERT also had a custom file system with special support for large, contiguous, statically sized files, as used in real-time database applications. The design of MERT was influenced by Dijkstra's THE, Hansen's Monitor, and IBM's CP-67. The MERT operating system was a four-layer design, in decreasing order of protection: The standard supervisor was MERT/UNIX, a Unix emulator with an extended system call interface and shell that enabled the use of MERT's custom IPC mechanisms, although an RSX-11 emulator also existed.
  • 353
  • 27 Oct 2022
Topic Review
Interactive Visualization
Interactive visualization or interactive visualisation is a branch of graphic visualization in computer science that involves studying how humans interact with computers to create graphic illustrations of information and how this process can be made more efficient. For a visualization to be considered interactive it must satisfy two criteria: One particular type of interactive visualization is virtual reality (VR), where the visual representation of information is presented using an immersive display device such as a stereo projector (see stereoscopy). VR is also characterized by the use of a spatial metaphor, where some aspect of the information is represented in three dimensions so that humans can explore the information as if it were present (where instead it was remote), sized appropriately (where instead it was on a much smaller or larger scale than humans can sense directly), or had shape (where instead it might be completely abstract). Another type of interactive visualization is collaborative visualization, in which multiple people interact with the same computer visualization to communicate their ideas to each other or to explore information cooperatively. Frequently, collaborative visualization is used when people are physically separated. Using several networked computers, the same visualization can be presented to each person simultaneously. The people then make annotations to the visualization as well as communicate via audio (i.e., telephone), video (i.e., a video-conference), or text (i.e., IRC) messages.
  • 353
  • 25 Nov 2022
Topic Review
Battery Fault Mechanism
The battery system, as the core energy storage device of new energy vehicles, faces increasing safety issues and threats. An accurate and robust fault diagnosis technique is crucial to guarantee the safe, reliable, and robust operation of lithium-ion batteries. However, in battery systems, various faults are difficult to diagnose and isolate due to their similar features and internal coupling relationships.
  • 353
  • 04 Aug 2023
Topic Review
Unique Properties of the Immune System
The human body is unquestionably one of the most complex systems known to humanity. There are three main regulation systems in the human body (the nervous system, the endocrine system and the immune system). These three systems are integrated into one ultimate information communication network within the human body. However, each regulation system has its specific roles and unique properties. Consequently, each of these regulation systems has served as inspiration for computational models to efficiently solve real-world problems. An overview of these models and their applications is presented.
  • 352
  • 01 Feb 2023
Topic Review
Human Action Recognition Methods for Single-Modality Action Recognition
Human action recognition is widely used in computer vision research, such as intelligent video surveillance, intelligent human–computer interaction, robot control, video retrieval, pose estimation, and many other fields. Since the environments faced by human action recognition are diverse and complex, capturing effective features for action recognition is still a challenging problem.
  • 352
  • 19 May 2023
Topic Review
2D DWT and PCA with Canonical Huffman Encoding
For image compression, discrete wavelet transform (DWT) and CHC with principal component analysis (PCA) were combined. The lossy method was introduced by using PCA, followed by DWT and CHC to enhance compression efficiency. By using DWT and CHC instead of PCA alone, the reconstructed images have a better peak signal-to-noise ratio (PSNR).
  • 352
  • 16 Oct 2023
Topic Review
Secure Internet of Things Based on Blockchain
Centralized networks can host ubiquitous interconnected objects using Internet of Things (IoT) platforms. It is also possible to implement decentralized peer-to-peer solutions using blockchain technology, including smart homes and connected cars. However, both models have limitations regarding their ability to provide privacy and security due to limited resources, centralization management, and scalability, cost, and response time. The diversity of IoT network nodes is expected to result in different throughputs and rates. Centralized networks control and improve the performance of a large number of IoT devices. However, centralizing systems suffer from a number of disadvantages. A third party often has to manipulate the data collected by central cloud storage, which could lead to information leaks that could compromise the user’s privacy.
  • 352
  • 27 Oct 2023
Topic Review
Intrusion Detection in IoT Networks
The Internet of Things (IoT) is expanding rapidly and is becoming increasingly crucial to how we live our daily lives. Internet protocol addresses can be used by IoT nodes for connecting to the Internet. Intrusion detection systems (IDSs) guarantee both the security posture and defense against intrusions of IoT devices.
  • 352
  • 03 Nov 2023
  • Page
  • of
  • 366
ScholarVision Creations