Topic Review
AI&ML for Medical Sector
This work represents a comprehensive analysis of the potential AI, ML, and IoT technologies for defending against the COVID-19 pandemic. The existing and potential applications of AI, ML, and IoT, along with a detailed analysis of the enabling tools and techniques are outlined. A critical discussion on the risks and limitations of the aforementioned technologies are also included.
  • 1.1K
  • 21 Jan 2021
Topic Review
Smoothed-Particle Hydrodynamics
Smoothed-particle hydrodynamics is a computational mesh-free Lagrangian method developed by Gingold, Monaghan, and Lucy in 1977, initially intended for use in astrophysics.
  • 1.1K
  • 08 Apr 2021
Topic Review
Comparison of VMware Fusion and Parallels Desktop
Represented by their respective products, VMware and Parallels, Inc. are the two commercial competitors in the Mac consumer platform virtualization market. Both products are based on hypervisor technology and allow users to run an additional 32- or 64-bit x86 operating system in a virtual machine alongside Mac OS X on an Intel-powered Mac. The similarity in features and functionality between VMware Fusion and Parallels Desktop for Mac has given occasion for much comparison.
  • 1.1K
  • 28 Sep 2022
Topic Review
Knowledge Management in Agriculture
Achieving global food security requires better use of natural, genetic, and importantly, human resources—knowledge. Technology must be created, and existing and new technology and knowledge deployed, and adopted by farmers and others engaged in agriculture. This requires collaboration amongst many professional communities world-wide including farmers, agribusinesses, policymakers, and multi-disciplinary scientific groups. Each community having its own knowledge-associated terminology, techniques, and types of data, collectively forms a barrier to collaboration. Knowledge management (KM) approaches are being implemented to capture knowledge from all communities and make it interoperable and accessible as a “group memory” to create a multi-professional, multidisciplinary knowledge economy.
  • 1.1K
  • 25 Apr 2023
Topic Review
Design Thinking
Design thinking is a term used to represent a set of cognitive, strategic and practical processes by which design concepts (proposals for products, buildings, machines, communications, etc.) are developed. Many of the key concepts and aspects of design thinking have been identified through studies, across different design domains, of design cognition and design activity in both laboratory and natural contexts. Design thinking is also associated with prescriptions for the innovation of products and services within business and social contexts. Some of these prescriptions have been criticized for oversimplifying the design process and trivializing the role of technical knowledge and skills.
  • 1.1K
  • 04 Nov 2022
Topic Review
Distributed Edge Computing in IoT-Based Smart Cities
Smart cities using the Internet of Things (IoT) can operate various IoT systems with better services that provide intelligent and efficient solutions for various aspects of urban life. With the rapidly growing number of IoT systems, the many smart city services, and their various quality of service (QoS) constraints, servers face the challenge of allocating limited resources across all Internet-based applications to achieve an efficient per-formance. The presence of a cloud in the IoT system of a smart city results in high energy con-sumption and delays in the network. Edge computing is based on a cloud computing framework where computation, storage, and network resources are moved close to the data source. The IoT framework is identical to cloud computing. The critical issue in edge computing when executing tasks generated by IoT systems is the efficient use of energy while maintaining delay limitations.
  • 1.0K
  • 21 Jul 2022
Topic Review
Dragonchain
Dragonchain is a hybrid blockchain platform for enterprises and developers. It was originally developed at The Walt Disney Company in Seattle in 2014 and then open-sourced in 2016. Despite extensive speculation, there is no current relationship between Disney and Dragonchain. The open source code is maintained by the Dragonchain Foundation. The commercial blockchain platform is maintained by the commercial entity named The Dragon Company. Dragonchain is a public/private hybrid blockchain platform that allows integration with other blockchain protocols, legacy systems, oracles, and API's. Developers can use existing smart contracts from the library or write their own smart contracts to build (decentralized) blockchain applications in known languages. In 2020, Medek Health launched Covid SafePass with the City of Apopka, using Dragonchain blockchain solutions in line with the FDA guidance on Digital Health Policies and Public Health Solutions for COVID-19.
  • 1.0K
  • 21 Nov 2022
Topic Review
Resource Allocation Schemes for 5G Network
Resource allocation is an important aspect of any cellular network environment. It plays a significant part in maintaining friendly access for end-users, business partners, and customers of cellular-based applications. Resource allocation has great benefits for the cellular network environment.
  • 1.0K
  • 21 Oct 2021
Topic Review
Singing Voice Detection
Singing voice detection or vocal detection is a classification task that determines whether there is a singing voice in a given audio segment. This process is a crucial preprocessing step that can improve the performance of other tasks such as automatic lyrics alignment, singing melody transcription, singing voice separation, vocal melody extraction, and many more.
  • 1.0K
  • 25 Jan 2022
Topic Review
Social Engineering (Security)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests." An example of social engineering is the use of the "forgot password" function on most websites which require login. An improperly-secured password-recovery system can be used to grant a malicious attacker full access to a user's account, while the original user will lose access to the account.
  • 1.0K
  • 08 Nov 2022
  • Page
  • of
  • 371
Video Production Service