Topic Review
Calendar of 13 Months
Has anyone of us missed an event because he was confused between days and dates? Do we really remember the date of any day if we do not have a calendar? Is the current Gregorian Calendar efficient enough for use, and does it really facilitate our life or make it more complicated?  Have you ever thought about a much simpler way to calculate days and dates in a year? All these questions are answered in this article, in which the author proposes an original calendar that might facilitate our lives if we can apply it.
  • 63826
  • 12 Jan 2023
Topic Review
Six Stages to Choose Sampling Techniques
In order to answer the research questions, it is doubtful that researcher should be able to collect data from all cases. Thus, there is a need to select a sample. The entire set of cases from which researcher sample is drawn in called the population. Since, researchers neither have time nor the resources to analysis the entire population so they apply sampling technique to reduce the number of cases. There are six stages to choose sampling techniques.
  • 19808
  • 18 Feb 2022
Topic Review
ICloud Leaks of Celebrity Photos
On August 31, 2014, a collection of almost 500 private pictures of various celebrities, mostly women, and with many containing nudity, were posted on the imageboard 4chan, and later disseminated by other users on websites and social networks such as Imgur and Reddit. The images were initially believed to have been obtained via a breach of Apple's cloud services suite iCloud, or a security issue in the iCloud API which allowed them to make unlimited attempts at guessing victims' passwords. Apple claimed in a press release that access was gained via spear phishing attacks. The incident, which media outlets and Internet users referred to under names such as "The Fappening" (a play on "fap", a slang term for masturbation, and The Happening) and "Celebgate", was met with a varied reaction from the media and fellow celebrities. Critics felt the distribution of the images was a major invasion of privacy for their subjects, while some of the allegedly depicted subjects denied their authenticity. The leak also prompted increased concern from analysts surrounding the privacy and security of cloud computing services such as iCloud—with a particular emphasis on their use to store sensitive, private information.
  • 13749
  • 18 Nov 2022
Topic Review
Gompertz Function with R
The Gompertz function is a sigmoid curve being a special case of a logistic curve. Although it was originally designed to describe mortality, it is now used in biology. For example, it is useful to describe many  phenomena such as the growth of a cancerous tumor confined to an organ without metastasis, the growth of the number of individuals in a population, e.g. prey in a Volterra-Lotka model, the germination of seeds, etc. It also models as the logistic function the growth of a colony of bacteria or in an epidemic the spread of the number of infected people. However, despite its many applications, in many cases the fitting of experimental data to the Gompertz function is not always straightforward. In this article we present a protocol that will be useful when performing the data regression to this curve using the statistical package R.
  • 12037
  • 07 Apr 2021
Topic Review
Blockchain Oracle Problem
The Blockchain Oracle Problem refers to the inability of confirming the veracity of the data collected by oracles. Also, depending on the type, the chances of malfunction, and deliberate tampering. 
  • 11524
  • 11 Nov 2020
Topic Review
TCP-based Congestion Control Algorithms
In today’s data networks, the main protocol used to ensure reliable communications is the transmission control protocol (TCP). The TCP performance is largely determined by the used congestion control (CC) algorithm, which main purpose is to avoid the congestion of the network that can be caused by a large burst of data traffic. TCP CC algorithms have evolved over the past three decades and a large number of CC algorithm variations have been developed to accommodate various communication network environments. Considering the importance of CC in communication networks, the fundamentals of the TCP as the main transport layer protocol and CC process have been explained in detail. Also, an encyclopedic overview of the most popular single-flow and multi-flow TCP CC algorithms with corresponding alternatives has been present. Future directions in the possible improvement of CC algorithms for implementation in complex heterogeneous networks composed of wired and wireless elements are lastly discussed in this encyclopedic work. 
  • 9511
  • 21 Jul 2021
Topic Review
System Architecture for Autonomous Vehicles
Technology facilitates humans, improves productivity and leads to a better quality of life. Technological developments and automation in vehicular networks will lead to better road safety and lower congestion in present urban areas where the traditional transport system is becoming increasingly disorganised and inefficient. Therefore, the development of the intelligent transport systems (ITS) concept has been proposed, with the aim and focus on improving traffic safety and providing different services to its users. There has been considerable research in ITS resulting in significant contributions . 
  • 6797
  • 07 Apr 2021
Topic Review
Mobile Technology in Tourism
The influence of mobile technology on tourism is very significant. With the support of mobile-related devices (smartphones, glasses, or other wearable devices), technology, data and services, multiple travel concepts, and travel modes including mobile tourism, smart tourism, e-tourism, and sustainable tourism have emerged or developed further. Mobile technology is touted as the next technology wave that can fundamentally change tourism and hotels. Moreover, mobile technology is playing an increasing role in the travel experience, and increasing travel research is concentrated in this field. Research findings show that, first, the research of mobile technology in tourism can be divided into three phases and to a certain extent is synchronized with the development of mobile technology. Second, in the area of social sciences, the research of mobile technology in tourism needs further exploration, which must refer to related research in the areas of Transportation and IT to expand the perspective of research. Top journal analysis, journal co-citation analysis, author co-citation analysis, and collaboration network analysis reveal the most representative journals, authors, institutions, and countries/regions in this research field. This finding provides a valuable reference for scholars in this field. Additionally, this research also grasped the hot and cutting-edge topics in this field through the analysis of keywords in this field. Finally, the clustering of co-citation references presents the knowledge base of mobile technology research in the tourism field: mobile technology, travel mode, mobile instrument, travel behavior research, mobile applications, and geo-based technology.
  • 6048
  • 28 Sep 2020
Topic Review
CCR Model (DEA)
The first Data Envelopment Analysis (DEA) model developed by Charnes, Cooper and Rhodes (1978) under the assumption of a Constant Returns to Scale production technology, i.e.,  when an increase in the production resources results in a proportional increase in the output.
  • 5743
  • 30 May 2021
Topic Review
Data Envelopment Analysis (DEA)
Data Envelopment Analysis (DEA) is a non-parametric methodology for measuring the efficiency of Decision Making Units (DMUs) using multiple inputs to outputs configurations. This is the most commonly used tool for frontier estimations in assessments of productivity and efficiency applied to all fields of economic activities.
  • 5072
  • 28 Jan 2022
  • Page
  • of
  • 238