Topic Review
Causal Loop Diagramming of Socioeconomic Impacts of COVID-19
The complexity, multidimensionality, and persistence of the COVID-19 pandemic have prompted both researchers and policymakers to turn to transdisciplinary methods in dealing with the wickedness of the crisis. While there are increasing calls to use systems thinking to address the intricacy of COVID-19, examples of practical applications of systems thinking are still scarce. We revealed and reviewed eight studies which developed causal loop diagrams (CLDs) to assess the impact of the COVID-19 pandemic on a broader socioeconomic system. We find that major drivers across all studies are the magnitude of the infection spread and government interventions to curb the pandemic, while the most impacted variables are public perception of the pandemic and the risk of infection.
  • 854
  • 23 Nov 2021
Topic Review
Augmented Reality (AR)-based Learning Environments
Augmented reality (AR)-based learning environments are argued to foster cognitive and emotional involvement. Immersion has been identified as one of the driving forces that promote learning in technology-based learning environments.
  • 855
  • 11 Mar 2023
Topic Review
Underwater Communication Protocols
Underwater Wireless Sensor Networks (UWSNs) have recently established themselves as an extremely interesting area of research thanks to the mysterious qualities of the ocean. The UWSN consists of sensor nodes and vehicles working to collect data and complete tasks. The battery capacity of sensor nodes is quite limited, which means that the UWSN network needs to be as efficient as it can possibly be. It is difficult to connect with or update a communication that is taking place underwater due to the high latency in propagation, the dynamic nature of the network, and the likelihood of introducing errors. This makes it difficult to communicate with or update a communication.
  • 854
  • 29 May 2023
Topic Review
Underwater Vision Enhancement
Underwater video images, as the primary carriers of underwater information, play a vital role in human exploration and development of the ocean. Due to the absorption and scattering of incident light by water bodies, the video images collected underwater generally appear blue-green and have an apparent fog-like effect. In addition, blur, low contrast, color distortion, more noise, unclear details, and limited visual range are the typical problems that degrade the quality of underwater video images. Underwater vision enhancement uses computer technology to process degraded underwater images and convert original low-quality images into a high-quality image. The problems of color bias, low contrast, and atomization of original underwater video images are effectively solved by using vision enhancement technology. Enhanced video images improve the visual perception ability and are benefificial for subsequent visual tasks. Therefore, underwater video image enhancement technology has important scientifific signifificance and application value. 
  • 853
  • 03 Mar 2022
Topic Review
Dementia
Dementia is a syndrome that is characterised by the decline of different cognitive abilities. A high rate of deaths and high cost for detection, treatments, and patients care count amongst its consequences. Although there is no cure for dementia, a timely diagnosis helps in obtaining necessary support, appropriate medication, and maintenance, as far as possible, of engagement in intellectual, social, and physical activities. The early detection of Alzheimer Disease (AD) is considered to be of high importance for improving the quality of life of patients and their families. In particular, Virtual Reality (VR) is an expanding tool that can be used in order to assess cognitive abilities while navigating through a Virtual Environment (VE).
  • 852
  • 05 Feb 2021
Topic Review
The BrIdge voLcanic LIdar—BILLI
Volcanologists have demonstrated that carbon dioxide (CO2) fluxes are precursors of volcanic eruptions. Controlling volcanic gases and, in particular, the CO2 flux, is technically challenging, but we can retrieve useful information from magmatic/geological process studies for the mitigation of volcanic hazards including air traffic security. Existing techniques used to probe volcanic gas fluxes have severe limitations such as the requirement of near-vent in situ measurements, which is unsafe for operators and deleterious for equipment. In order to overcome these limitations, a novel range-resolved DIAL-Lidar (Differential Absorption Light Detection and Ranging) has been developed as part of the ERC (European Research Council) Project “BRIDGE”, for sensitive, remote, and safe real-time CO2 observations.
  • 850
  • 09 Oct 2020
Topic Review
Cloud-Native Workload Orchestration at the Edge
Cloud-native computing principles such as virtualization and orchestration are key to transferring to the promising paradigm of edge computing. Challenges of containerization, operative models and scarce availability of established tools make a thorough review indispensable. Container virtualization and its orchestration through Kubernetes have dominated the cloud computing domain, while major efforts have been recently recorded focused on the adaptation of these technologies to the edge. Such initiatives have addressed either the reduction of container engines and the development of specific tailored operating systems or the development of smaller K8s distributions and edge-focused adaptations (such as KubeEdge). Finally, new workload virtualization approaches, such asWebAssembly modules together with the joint orchestration of these heterogeneous workloads, seem to be the topics to pay attention to in the short to medium term.
  • 851
  • 27 Feb 2023
Topic Review
Network Sovereignty
Network Sovereignty is the effort of a governing entity, such as a state, to create boundaries on a network and then exert a form of control, often in the form of law enforcement over such boundaries. Much like states invoke sole power over their physical territorial boundaries, state sovereignty, such governing bodies also invoke sole power within the network boundaries they set and claim network sovereignty. In the context of the Internet, the intention is to govern the web and control it within the borders of the state. Often, that is witnessed as states seeking to control all information flowing into and within their borders. The concept stems from questions of how states can maintain law over an entity such like the Internet, whose infrastructure exists in real space, but its entity itself exists in the intangible cyberspace. Some Internet Scholars, such as Joel R. Reidenberg, argue, "Networks have key attributes of sovereignty: participant/citizens via service provider membership agreements, 'constitutional' rights through contractual terms of service, and police powers through taxation (fees) and system operator sanctions." Indeed, many countries have pushed to ensure the protection of their citizens' privacy and of internal business longevity by data protection and information privacy legislation (see the EU's Data Protection Directive, the UK's Data Protection Act 1998). Network Sovereignty has implications for state security, Internet governance, and the users of the Internet's national and international networks.
  • 849
  • 17 Oct 2022
Topic Review
Distance Geometry Problem
The distance geometry problem is that of characterization and study of sets of points based only on given values of the distances between member pairs. Therefore distance geometry has immediate relevance where distance values are determined or considered, such as biology, sensor network, surveying, cartography, and physics.
  • 850
  • 03 Nov 2022
Topic Review
IBM POWER Microprocessors
IBM has a series of high performance microprocessors called POWER followed by a number designating generation, i.e. POWER1, POWER2, POWER3 and so forth up to the latest POWER9. These processors have been used by IBM in their RS/6000, AS/400, pSeries, iSeries, System p, System i and Power Systems line of servers and supercomputers. They have also been used in data storage devices by IBM and by other server manufacturers like Bull and Hitachi. The name "POWER" was originally presented as an acronym for "Performance Optimization With Enhanced RISC". The POWERn family of processors were developed in the late 1980s and are still in active development nearly 30 years later. In the beginning, they utilized the POWER instruction set architecture (ISA), but that evolved into PowerPC in later generations and then to Power Architecture, so modern POWER processors do not use the POWER ISA, they use the Power ISA.
  • 847
  • 23 Nov 2022
  • Page
  • of
  • 371
Video Production Service