Topic Review
Blockchain enabled Virtualized Cloud Security Solutions
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models.
  • 1.1K
  • 22 Oct 2021
Topic Review
Architecture and Challenges of Industrial Internet of Things
The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable.
  • 3.7K
  • 21 Oct 2021
Topic Review
Resource Allocation Schemes for 5G Network
Resource allocation is an important aspect of any cellular network environment. It plays a significant part in maintaining friendly access for end-users, business partners, and customers of cellular-based applications. Resource allocation has great benefits for the cellular network environment.
  • 1.1K
  • 21 Oct 2021
Topic Review
Biometric Systems De-Identification
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
  • 711
  • 19 Oct 2021
Topic Review
Routing Protocols for Mobile IoT
IoT (Internet of Things) is the connection of devices to the Internet where devices are able to communicate with each other and their users, such as cameras, medical sensors, light-bulbs, and smoke alarms. IoT allows devices to assist daily routines, such as cars can be synced with calendars for appointment or meeting tracking to plan the best routes. According to the research done by IDC, there are already 13 billion connected devices in use worldwide in 2017 and the number could reach over 40 billion by 2025.
  • 758
  • 15 Oct 2021
Topic Review
Secure Cloud Infrastructure Review
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure.
  • 1.1K
  • 13 Oct 2021
Topic Review
Urban Land Use Planning
Urbanization is persistent globally and has increasingly significant spatial and environmental consequences. It is especially challenging in developing countries due to the increasing pressure on the limited resources, and damage to the bio-physical environment.
  • 2.7K
  • 13 Oct 2021
Topic Review
Spiking Neural Networks
Spiking neural networks (SNNs) are artificial neural network models that more closely mimic natural neural networks. In addition to neuronal and synaptic state, SNNs also incorporate the concept of time into their operating model. The idea is that neurons in the SNN do not fire at each propagation cycle (as it happens with typical multi-layer perceptron networks), but rather fire only when a membrane potential – an intrinsic quality of the neuron related to its membrane electrical charge – reaches a specific value. When a neuron fires, it generates a signal which travels to other neurons which, in turn, increase or decrease their potentials in accordance with this signal (ref).
  • 3.8K
  • 13 Oct 2021
Topic Review
Solubility and Aggregation of Proteins
Protein solubility is based on the compatibility of the specific protein surface with the polar aquatic environment. The exposure of polar residues to the protein surface promotes the protein’s solubility in the polar environment. The application of 3D GAuss function allows identification of accordant/discordant regions in proteis. The discordant ones usually represent the localisation of biological activity. 
  • 887
  • 11 Oct 2021
Topic Review
AI Public Datasets for Railway Applications
The aim of this entry is to review existing publicly available and open artificial intelligence (AI) oriented datasets in different domains and subdomains of the railway sector. The contribution of this paper is an overview of AI-oriented railway data published under Creative Commons (CC) or any other copyright type that entails public availability and freedom of use. These data are of great value for open research and publications related to the application of AI in the railway sector.
  • 1.9K
  • 09 Oct 2021
  • Page
  • of
  • 371
Video Production Service