Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Entry
Entry
Video
Image
Log in/Sign up
Submit
Entry
Video
Image
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Hottest
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Type:
All
Topic Review
Biography
Topic Review
INtra-INter Spectral Attention Network for Pedestrian Detection
Pedestrian detection is a critical task for safety-critical systems, but detecting pedestrians is challenging in low-light and adverse weather conditions. Thermal images can be used to improve robustness by providing complementary information to RGB images.
152
04 Mar 2024
Topic Review
Methods Based on Software-Defined Networks
With the rapid advancement of the Internet of Things (IoT), there is a global surge in network traffic. Software-Defined Networks (SDNs) provide a holistic network perspective, facilitating software-based traffic analysis, and are more suitable to handle dynamic loads than a traditional network. The standard SDN architecture control plane has been designed for a single controller or multiple distributed controllers; however, a logically centralized single controller faces severe bottleneck issues.
129
04 Mar 2024
Topic Review
OptiDJS+
The continuously evolving world of cloud computing presents new challenges in resource allocation as dispersed systems struggle with overloaded conditions. In this regard, OptiDJS+ is a cutting-edge enhanced dynamic Johnson sequencing algorithm made to successfully handle resource scheduling challenges in cloud computing settings. With a solid foundation in the dynamic Johnson sequencing algorithm, OptiDJS+ builds upon it to suit the demands of modern cloud infrastructures. OptiDJS+ makes use of sophisticated optimization algorithms, heuristic approaches, and adaptive mechanisms to improve resource allocation, workload distribution, and task scheduling. To obtain the best performance, this strategy uses historical data, dynamic resource reconfiguration, and adaptation to changing workloads.
257
01 Mar 2024
Topic Review
New Technologies-Based Physical Unclonable Functions
A physical unclonable function (PUF) is a technology designed to safeguard sensitive information and ensure data security. PUFs generate unique responses for each challenge by leveraging random deviations in the physical microstructures of integrated circuits (ICs), making it incredibly difficult to replicate them. However, traditional silicon PUFs are now susceptible to various attacks, such as modeling attacks using conventional machine learning techniques and reverse engineering strategies. As a result, PUFs based on new materials or methods are being developed to enhance their security.
180
01 Mar 2024
Topic Review
Personalization of User Interface and Clustering of Users
Adaptive user interfaces (AUIs) are defined as user interfaces that can change according to user activities. They are designed to adapt to the needs of individual users or groups of users based on their preferences, behavior, and context. These interfaces provide an optimal user experience by adapting interface elements, including layout, content, and functionality, to align with users’ needs and goals.
286
01 Mar 2024
Topic Review
Anomaly Detection in Electrocardiogram Sensor Data
Monitoring heart electrical activity is an effective way of detecting existing and developing conditions. This is usually performed as a non-invasive test using a network of up to 12 sensors (electrodes) on the chest and limbs to create an electrocardiogram (ECG). By visually observing these readings, experienced professionals can make accurate diagnoses and, if needed, request further testing. However, the training and experience needed to make accurate diagnoses are significant.
208
01 Mar 2024
Topic Review
Resource Elasticity
Elasticity as the ability of a system to be able to add or remove computational resources during the use and processing of data, in order to adapt to workload variations in real time . These resources can be CPU cores, RAM memory, GPU, Virtual Machine instances (known as VM's), among others. Elasticity is a dynamic property of Cloud Computing. There are two types of elasticity in the literature: horizontal and vertical. Vertical elasticity consists of the system's ability to increase or decrease the characteristics of computational resources, such as CPU time, cores, memory and network. Horizontal elasticity consists of the system's ability to add or remove instances of computational resources associated with the application that uses them. This entry will describe the main classifications for elastic systems.
208
01 Mar 2024
Topic Review
The Theory of Mobile Usability
The success of a new mobile application depends on a variety of factors ranging from business understanding, customer value, and perceived quality of use. In this sense, the topic of usability testing of mobile applications is relevant from the point of view of user satisfaction and acceptance.
207
01 Mar 2024
Topic Review
The Microverse
The proliferation of Internet of Things (IoT) technology combined with evolving artificial intelligence (AI) and machine learning (ML) promote unprecedented advancements in ubiquitous and seamless services for human activities. In the context of smart cities, the fusion of the metaverse with the IoT—an expansive network of interlinked devices and sensors—heralds a transformative era in urban interaction, blending the digital with the physical.
143
01 Mar 2024
Topic Review
DNS Tunnelling Detection
The Domain Name System (DNS) protocol is fundamental to the operation of the Internet with the primary purpose of translating domain names to IP addresses. This important service facilitates access to the Internet by using website names or any arbitrary domain names. The DNS protocol communicates internal requests to external remote servers and creates a landscape for attackers to perform malicious activities such as stealing credentials and sensitive data. One of the most effective DNS attack types is DNS tunnelling, where the attacker creates a tunnel between the client’s network and the attacker’s machine, utilising command and control channels to obscure data and bypass the firewall and intrusion detection systems.
163
01 Mar 2024
Page
of
371
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Michael McAleer
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
Video Production Service
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×