Topic Review
Cyberphysical Systems
Cyber-physical systems (CPS) merge the physical and cyber world to support critical functions and services. Cyber-security and safety are interdependent in such systems and therefore their study should be performed jointly. Various approaches have been proposed for cyber-security and safety co-engineering. In this entry, the key results of a comprehensive survey of such co-engineering approaches, along with various aspects of the problem that have not been sufficiently addressed in these methods, are presented. 
  • 1.1K
  • 16 Jun 2021
Topic Review
Recursion Predicts Covid-19 Trajectories
Modulated recurrence model predicts Covid-19 trajectory in multiple countries.  Wave action at 14-week intervals correlates with case numbers, while predicting future growth rate surges. Graphs of total Covid-19 case numbers in many countries now show long-period wave action.  Simulations using a sine modulated time-delay recurrence equation not only correlate with case data but also proves a π-commensurate wave period of 26 weeks.  When the slope of geometric growth exceeds arithmetic growth, a periodic wave launches in the population with all the dynamics of a damped oscillation.  Recursive simulation generates trajectories that predict future wave peak times and amplitudes.  Data from USA, Canada, UK, Germany, India and Australia are studied in this research.  In all cases, Covid-19 trajectories around the world show the common feature of periodic oscillations as case numbers increase.  Discovery of repeatable Covid-19 growth dynamics suggests a common invariant mechanism of virus propagation, irrespective of country.
  • 1.1K
  • 16 Dec 2020
Topic Review
Cryptographically-Secure Pseudorandom Number Generator
A cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator (PRNG) with properties that make it suitable for use in cryptography. It is also loosely known as a cryptographic random number generator (CRNG) (see Random number generation § "True" vs. pseudo-random numbers). Most cryptographic applications require random numbers, for example: key generation nonces salts in certain signature schemes, including ECDSA, RSASSA-PSS The "quality" of the randomness required for these applications varies. For example, creating a nonce in some protocols needs only uniqueness. On the other hand, the generation of a master key requires a higher quality, such as more entropy. And in the case of one-time pads, the information-theoretic guarantee of perfect secrecy only holds if the key material comes from a true random source with high entropy, and thus any kind of pseudorandom number generator is insufficient. Ideally, the generation of random numbers in CSPRNGs uses entropy obtained from a high-quality source, generally the operating system's randomness API. However, unexpected correlations have been found in several such ostensibly independent processes. From an information-theoretic point of view, the amount of randomness, the entropy that can be generated, is equal to the entropy provided by the system. But sometimes, in practical situations, more random numbers are needed than there is entropy available. Also, the processes to extract randomness from a running system are slow in actual practice. In such instances, a CSPRNG can sometimes be used. A CSPRNG can "stretch" the available entropy over more bits.
  • 1.1K
  • 20 Oct 2022
Topic Review
Human-Computer Interaction System of Talking-Head Generation
Virtual human is widely employed in various industries, including personal assistance, intelligent customer service, and online education, thanks to the rapid development of artificial intelligence. An anthropomorphic digital human can quickly contact people and enhance user experience in human–computer interaction. 
  • 1.1K
  • 12 Jan 2023
Topic Review
Integrated Digital Transformation System Framework
Digital transformation is the profound transformation of business and organizational activities, processes, competencies, and models to fully leverage the changes and opportunities of a mix of digital technologies and their accelerating impact across societies in a strategic and prioritized way, with present and future shifts in mind. For instance, an attempt was made to evaluate the present and future research trends in the digitalization of business model innovation.
  • 1.1K
  • 05 Jul 2022
Topic Review
Hybrid Adaptive Transaction Injection Protocol
Latency is a critical issue that impacts the performance of decentralized systems. Recently we designed various protocols to regulate the injection rate of unverified transactions into the system to improve system performance. Each of the protocols is designed to address issues related to some particular network traffic syndrome. In this work, we first provide the review of our prior protocols.We then provide a hybrid scheme that combines our transaction injection protocols and provides an optimal linear combination of the protocols based on the syndromes in the network. The goal is to speed up the verification process of systems that rely on only one single basic protocol. The underlying basic protocols are Periodic Injection of Transaction via Evaluation Corridor (PITEC), Probabilistic Injection of Transactions (PIT), and Adaptive Semi-synchronous Transaction Injection (ASTI).
  • 1.1K
  • 28 Oct 2020
Topic Review
DataMelt
DataMelt (sometime termed DMelt) is a software program for scientific computation, data analysis and data visualization. The program is used for statistical data analysis, curve fitting, data-mining, machine learning, numeric computations and interactive scientific plotting in 2D and 3D. DataMelt is designed for scientists, engineers and students. DataMelt is multiplatform since it is written in Java, thus it runs on any operating system where the Java virtual machine can be installed. DataMelt also uses high-level programming languages, such as Jython, Apache Groovy, JRuby, but Java coding can also be used to call DataMelt numerical and graphical libraries. DataMelt is an attempt to create a data-analysis environment using open-source packages with a coherent user interface and tools competitive to commercial programs. The idea behind the project is to incorporate open-source mathematical and numerical software packages with GUI-type user interfaces into a coherent program in which the main user interface is based on short-named Java/Python classes. This was required to build an analysis environment using Java scripting concept. A typical example will be shown below. Scripts and Java code (in case of the Java programming) can be run either in a GUI editor of DataMelt or as batch programs. The graphical libraries of DataMelt can be used to create applets. All charts (or "Canvases") used for data representation can be embedded into Web browsers. DataMelt can be used for analysis of large numerical data volumes, data mining, statistical data analysis and mathematics are essential. The program can be used in natural sciences, engineering, modeling and analysis of financial markets. While the program falls into the category of open source software, it is not completely free for commercial usage (see below), no source code is available on the home page, and all documentation and even bug reporting requires "membership".
  • 1.1K
  • 14 Nov 2022
Topic Review
ISO Image
An ISO image is a disk image of an optical disc. In other words, it is an archive file that contains everything that would be written to an optical disc, sector by sector, including the optical disc file system. ISO image files bear the .iso filename extension. The name ISO is taken from the International Organization for Standardization (ISO) ISO 9660 file system used with CD-ROM media, but what is known as an ISO image might also contain a UDF (ISO/IEC 13346) file system (commonly used by DVDs and Blu-ray Discs). ISO images can be created from optical discs by disk imaging software, or from a collection of files by optical disc authoring software, or from a different disk image file by means of conversion. Software distributed on bootable discs is often available for download in ISO image format. And like any other ISO image, it may be written to an optical disc such as CD or DVD.
  • 1.1K
  • 07 Nov 2022
Topic Review
Secure Cloud Infrastructure Review
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure.
  • 1.1K
  • 13 Oct 2021
Topic Review
Personalization and Games
Personalizing gameful systems to each user is important because personalized interactive systems are more effective than one-size-fits-all approaches. It requires a dynamic adaptation to the user’s behaviors in response to any situation. This approach offers users system-tailored content and services, developing content and functionality for each need based on the user’s characteristics.
  • 1.1K
  • 16 May 2022
  • Page
  • of
  • 365
Video Production Service