Topic Review
Throughput
In general terms, throughput is the rate of production or the rate at which something is processed. When used in the context of communication networks, such as Ethernet or packet radio, throughput or network throughput is the rate of successful message delivery over a communication channel. The data these messages belong to may be delivered over a physical or logical link, or it can pass through a certain network node. Throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second (p/s or pps) or data packets per time slot. The system throughput or aggregate throughput is the sum of the data rates that are delivered to all terminals in a network. Throughput is essentially synonymous to digital bandwidth consumption; it can be analyzed mathematically by applying the queueing theory, where the load in packets per time unit is denoted as the arrival rate (λ), and the throughput, where the drop in packets per time unit, is denoted as the departure rate (μ). The throughput of a communication system may be affected by various factors, including the limitations of underlying analog physical medium, available processing power of the system components, and end-user behavior. When various protocol overheads are taken into account, useful rate of the transferred data can be significantly lower than the maximum achievable throughput; the useful part is usually referred to as goodput.
  • 5.5K
  • 20 Oct 2022
Topic Review Video
Risk Management in Information Systems
Businesses are bombarded with great deals of risks, vulnerabilities, and unforeseen business interruptions in their lifetime, which negatively affect their productivity and sustainability within the market. Such risks require a risk management system to identify risks and risk factors and propose approaches to eliminate or reduce them. Risk management involves highly structured practices that should be implemented within an organization, including organizational planning documents. Continuity planning and fraud detection policy development are among the many critically important practices conducted through risk management that aim to mitigate risk factors, their vulnerability, and their impact. Information systems play a pivotal role in any organization by providing many benefits, such as reducing human errors and associated risks owing to the employment of sophisticated algorithms. Both the development and establishment of an information system within an organization contributes to mitigating business-related risks and also creates new types of risks associated with its establishment. Businesses must prepare for, react to, and recover from unprecedented threats that might emerge in the years or decades that follow.
  • 5.2K
  • 15 Dec 2021
Topic Review
Time Synchronization
Time (or clock) synchronization is a large and vital field of research, as synchronization is a precondition for many applications. A few example applications are distributed data acquisition, distributed databases, and real-time communication.
  • 5.1K
  • 08 Dec 2020
Topic Review
Connectivity Architecture
Connectivity architecture connects main functional blocks or entities of a system with well-defined interfaces enabling interoperability, fluent data flows and information sharing in timely manner. Local connectivity architecture defines e.g. the architecture inside an autonomous ship. The wider-scale architecture includes geographically distributed entities such as vessels, databases, and remote operations centers.
  • 4.7K
  • 17 Aug 2020
Topic Review
Synthetic Aperture Radar
SAR constellations 
  • 4.5K
  • 24 Aug 2020
Topic Review
Remote Attestation
Remote Attestation (RA) is a security mechanism to remotely detect adversarial presence on untrusted devices in order to guarantee their trustworthiness. RA runs as a two-party security protocol in which a trusted party (i.e., verifier) assures the integrity of the untrusted remote device (i.e., prover). Software-based RA approaches aim at verifying device integrity without relying on specialized hardware components. Despite their limited security guarantees, software-based RA approaches bring opportunities in attesting legacy and resource-constrained Internet of Things (IoT) devices, in which the presence of a hardware root-of-trust is not always a realistic assumption.
  • 3.9K
  • 31 Jan 2022
Topic Review
Internet of Things
The Internet of Things (IoT) refers to a system of interrelated, internet-connected objects that are able to collect and transfer data over a wireless network without human intervention. The term IoT has been considered as an expanding technique applied in various applications and functions, from smart environments and houses to personal healthcare and others [1]. It is described as a smart concept for the internet relating everything to the Internet and data organization and information exchange [2]. The key features required for employing a large-scale IoT are low-cost sensors, highspeed and error-tolerant data communications, smart computations, and numerous applications.
  • 3.8K
  • 26 Oct 2020
Topic Review
Enchanta
Enchanta /ɛnˈtʃɑːntɑː/ (Enchan /ɛnˈtʃɑːn/ in the 2016 series) is a constructed language spoken by the denizens of Encantadia, known as Encantado(s)/Encantada(s) or Diwata (fairies). It was initially created by Suzette Doctolero for the Philippines fantasy television drama saga Encantadia, which aired on GMA Network in 2005, and was later used in the show's sequels, Etheria: Ang Ikalimang Kaharian ng Encantadia and Encantadia: Pag-ibig Hanggang Wakas. The source material of the language appears to have been derived from Philippine languages (particularly Tagalog) and Romance languages. It has its own script, Enchan, which appears to be based on Baybayin. Three songs in the language are written by Doctolero, namely "Asshenti (Love song)", "Hade!! (Etheria theme song)", and "Ivo (Lireo national anthem)", which are all sung by Bayang Barrios for the sequel Etheria in 2006.
  • 3.8K
  • 07 Nov 2022
Topic Review
PC5-Based Cellular-V2X Evolution and Deployment
C-V2X (Cellular Vehicle-to-Everything) is a state-of-the-art wireless technology used in autonomous driving and intelligent transportation systems (ITS). 
  • 3.8K
  • 19 Feb 2021
Topic Review
Fedora (Operating System)
Fedora is a Linux distribution developed by the community-supported Fedora Project which is sponsored primarily by Red Hat, a subsidiary of IBM, with additional support from other companies. Fedora contains software distributed under various free and open-source licenses and aims to be on the leading edge of free technologies. Fedora is the upstream source of the commercial Red Hat Enterprise Linux distribution and for CentOS. Fedora is a fork of Red Hat Linux since RHL was discontinued in 2003. Since the release of Fedora 30, five different editions are currently available: Workstation, focused on the personal computer, Server for servers, CoreOS, focused on cloud computing, Silverblue, focused on an immutable desktop specialized to container-based workflows and IoT, focused on IoT devices. (As of February 2016), Fedora has an estimated 1.2 million users, including Linus Torvalds ((As of May 2020)), creator of the Linux kernel.
  • 3.7K
  • 27 Oct 2022
  • Page
  • of
  • 49