Topic Review
Transmission Dynamics of COVID-19
COVID-19 is pneumonia caused by a novel coronavirus which is an emerging infectious disease, and outbreaks in more than 200 countries around the world. Consequently, the spread principles and prevention and control measures of COVID-19 have become a global problem to be solved. Here, we pose a series of dynamical models to reveal the transmission mechanisms of COVID-19. Based on these mathematical models, data fitting and spread trend of COVID-19 are explored to show the propagation law between human populations. We hope that our work may provide some useful insights for effective control of the COVID-19.
  • 5.0K
  • 28 Oct 2020
Topic Review
ANN in Intelligent Attendance System
Determining the rate of student attendance is an important task in determining the completion of the courses. Despite the success of the technology, it is unfortunate that in many academic institutions, the current systems used to detect student absences. Furthermore, one of the crucial problems in the attendance system does not count student background for continuing in the courses. In this paper, we propose an intelligent approach for calculating student attendance based on their Grade Point Average (GPA) and their activities, this approach uses Artificial Neural Network (ANN) for calculating the attendance rating accurately, meaning the system provide a new rating for each student based on their background. The aim of this research is developing an attendance system for motivation students taking attendance or taking high grade in the class. The result of this approach helps the instructor to allow students who have more activities with more absents to continue in the courses if not the students have low activity should taking high attendance. This system will more efficient for monitoring students for replacing absent to activity.
  • 1.2K
  • 28 Oct 2020
Topic Review
Bluetooth Low Energy Mesh Networks
Bluetooth Low Energy (BLE) is an increasingly prevalent Wireless Ad-Hoc Network (WAHN) technology for battery-powered Internet of Things (IoT) devices [1]. The BLE standard was introduced by the Bluetooth Special Interest Group (SIG) in Bluetooth version 4.0, and subsequently enhanced in versions 4.2 and 5. Initially, BLE 4.x adopted the legacy Bluetooth Personal Area Network (PAN) model for multi-hop communications and the interconnection of networks. BLE 5 intends to address these inadequacies via the implementation of pure mesh topology to provide enhanced network coverage, inter-network connectivity, and improved security [2].
  • 1.9K
  • 28 Oct 2020
Topic Review
Collaborative Cybersecurity Networked Organisations
The requirements to the governance of collaborative networked organisations (CNOs) can be structured in 33 categories: Geographical Representation or exclusion; Supply chain security; Involvement of external stakeholders; Standards and methodologies; Representation on senior governance bodies; Decision making principles; Auditing; Dispute/conflict management arrangements; Confidentiality & Security; IPR management; Ethics code; Use of slave labour or labour of minors; Green policies; Gender policies and representation; Transparency; Accountability ; Anti-corruption/ integrity policies; Innovation; Adaptiveness; Cohesion; Trust; Sustainability; Resilience; Communication and engagement; Knowledge management; Long-term perspective on collaboration; Interoperability; Leadership; Organisational culture; Competences; Risk management; Evidence-based decision-making; and Competitiveness. As a result of a comprehensive study for CNOs in the field of cybersecurity these governance issues have been structured in two groups (of governance objectives and CNO features) and four tiers in terms of priority. While the governance categories are universally applicable, their prioritisation is relevant for CNOs in the field of cybersecurity.
  • 967
  • 28 Oct 2020
Topic Review
Autonomous Underwater Vehicles
Development of Autonomous Underwater Vehicles (AUV's) has permitted the automatization of many tasks originally achieved with manned vehicles in underwater environments. Teams of AUV's designed to work within a common mission are opening the possibilities for new and more complex applications. In underwater environments, communication, localization, and navigation of AUV's are considered challenges due to the impossibility of relying on radio communications and global positioning systems. For a long time, acoustic systems have been the main approach for solving these challenges. However, they present their own shortcomings, which are more relevant for AUV's teams. As a result, researchers have explored different alternatives. To summarize and analyze these alternatives, a review of the literature is presented in this paper. Finally, a summary of collaborative AUV's teams and missions is also included, with the aim of analyzing their applicability, advantages, and limitations.
  • 1.8K
  • 28 Oct 2020
Topic Review
Blockchain and Fog Based Architecture
Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities’ applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time response applications. There are various frameworks in real-world to support the IoE in smart-cities but they face the issues like security, platform Independence, multi-application assistance, and resource management. This article is motivated from the Blockchain and Fog computing technologies and presents a secured architecture Blockchain and Fog-based Architecture Network (BFAN) for IoE applications in the smart cities. The proposed architecture secures sensitive data with encryption, authentication, and Blockchain. It assists the System-developers and Architects to deploy the applications in smart city paradigm. The goal of the proposed architecture is to reduce the latency and energy, and ensure improved security features through Blockchain technology. The simulation results demonstrate that the proposed architecture performs better than the existing frameworks for smart-cities.
  • 929
  • 28 Oct 2020
Topic Review
Edge Computing Simulators for IoT
The deployment of Internet of Things (IoT) applications is complex since many quality characteristics should be taken into account, for example, performance, reliability, and security. In this study, we investigate to what extent the current edge computing simulators support the analysis of qualities that are relevant to IoT architects who are designing an IoT system. We first identify the quality characteristics and metrics that can be evaluated through simulation. Then, we study the available simulators in order to assess which of the identified qualities they support. The results show that while several simulation tools for edge computing have been proposed, they focus on a few qualities, such as time behavior and resource utilization. Most of the identified qualities are not considered and we suggest future directions for further investigation to provide appropriate support for IoT architects.
  • 822
  • 28 Oct 2020
Topic Review
Trinitrotoluene Underwater Explosion
The development of computational techniques and computer hardware has an impact the analysis of short-term (fast-changing) processes, such as the impact of a non-contact underwater explosion pressure waves. A theory of underwater explosions, gas bubble formation and pressure waves are presented. The course of the pressure wave in time, and its propagation in the acoustic medium are presented. Entry presents empirical descriptions of non-contact pressure explosion waves. 
  • 1.5K
  • 28 Oct 2020
Topic Review
Hybrid Adaptive Transaction Injection Protocol
Latency is a critical issue that impacts the performance of decentralized systems. Recently we designed various protocols to regulate the injection rate of unverified transactions into the system to improve system performance. Each of the protocols is designed to address issues related to some particular network traffic syndrome. In this work, we first provide the review of our prior protocols.We then provide a hybrid scheme that combines our transaction injection protocols and provides an optimal linear combination of the protocols based on the syndromes in the network. The goal is to speed up the verification process of systems that rely on only one single basic protocol. The underlying basic protocols are Periodic Injection of Transaction via Evaluation Corridor (PITEC), Probabilistic Injection of Transactions (PIT), and Adaptive Semi-synchronous Transaction Injection (ASTI).
  • 1.1K
  • 28 Oct 2020
Topic Review
IoT Word's Hardware Requirements
The growth of the number of devices connected to the Internet is steadily increasing. In the future, more and more everyday objects will host embedded electronics to make them smarter and more useful then before, under the name of Internet of Things (IoT). Most of these items will be powered by small batteries and thus will have a limited energy budget. They will have to accurately balance performances and power usage to extend their lifespan. This can be implemented at various level, from the lowest one, the technology, to the highest, the algorithm. It is not possible to send all the data to a cloud server for processing, in particular if data can be preprocessed effectively to save computational resources on the cloud and to send only useful information. This paradigm is called edge-computing, as the end devices act at the "edge" of the cloud. This survey paper presents various recent ultra-low power hardware architectures for IoT, along with the explanation of some low power techniques to make the IoT tasks possibile at the large scales required. Some newest research topics are discussed, leading to the description of a fully functional digital system which encloses all the presented techniques.
  • 1.1K
  • 28 Oct 2020
  • Page
  • of
  • 371
ScholarVision Creations