Topic Review
Hyperledger
Internet of things (IoT) systems based on blockchain have significant shortcomings in terms of scalability, flexibility, robustness, and privacy. To address these issues, Hyperledger is considered as an ideal technology and attracted a lot of attention. In addition to having the general characteristics of blockchain, Hyperledger achieves new empowerment in four aspects: security, interoperability, consensus, and performance.
  • 21
  • 19 Aug 2022
Topic Review
Urban Digitization Governance in Birth Registration Field
Digitization governance is one of the most significant current discussions in the urban governance field. Especially, with the spreading of Blockchain Technology (BCT), researchers have shown an increased interest in the application of the technology in solving birth registration challenges as a digital infrastructure in developing countries.
  • 27
  • 17 Aug 2022
Topic Review
Decentralized Blockchain-Based IoT Data Marketplaces
In present times, the largest amount of data is being controlled in a centralized manner. However, as the data are in essence the fuel of any application and service, there is a need to make the data more findable and accessible. Another problem with the data being centralized is the limited storage as well as the uncertainty of their authenticity. In the Internet of Things (IoT) sector specifically, data are the key to develop the most powerful and reliable applications. For these reasons, there is a rise on works that present decentralized marketplaces for IoT data with many of them exploiting blockchain technology to offer security advantages.
  • 42
  • 11 Aug 2022
Topic Review
SBGTool v2.0: An Empirical Study
SBGTool v2.0 differs from SBGTool due to design changes made in response to teacher suggestions, the addition of sorting options to the dashboard table, the addition of a dropdown component to group the students into classrooms, and improvement in some visualizations. By applying SBGTool v2.0, teachers may compare the outcomes of individual students inside a classroom, determine which subjects are the most and least difficult over the period of a week or an academic year, identify the numbers of correct and incorrect responses for the most difficult and easiest subjects, categorize students into various groups based on their learning outcomes, discover the week with the most interactions for examining students’ engagement, and find the relationship between students’ activity and study success. 
  • 55
  • 08 Aug 2022
Topic Review
Efficient Task Offloading in Multi-User Edge Computing
Task offloading is one of the most important issues in edge computing and has attracted continuous research attention in recent years. With task offloading, end devices can offload the entire task or only subtasks to the edge servers to meet the delay and energy requirements.
  • 96
  • 05 Aug 2022
Topic Review
Rate-Distortion-Based Steganography Via Generative Adversarial Network
Information hiding can imperceptibly transfer secret information into chosen cover media. It can ensure the origins of data and behave as a second channel for data transmission. Steganography is the art of covering or hiding extra data inside a chosen cover message, e.g., an image. The term itself dates back to the 15th century; in a typical scenario, the sender hides a secret message inside a cover image and transmits it to the receiver, who recovers the message. Even if eavesdroppers monitor or intercept the communication in-between, no one besides the sender and receiver should detect the presence of the hidden message.
  • 26
  • 04 Aug 2022
Topic Review
The Internet of Things in Poland
One definition of the Internet of Things refers to devices that can be directly connected to the internet or other devices using wireless networks or, less frequently, cables. This definition of the IoT includes contemporary telephones, cameras, movement sensors, weather stations, even dishwashers, vehicles, industrial machinery, and daily outfits. Almost any object can get connected to the internet even if it was not manufactured as intended for the IOT, because in the majority of cases its functionality can be extended. The IOT has been growing dynamically, offering smart technological solutions. IoT-based applications are client-server operable which requires a specific communication protocol that can be used to determine a client-server communication model, allowing all clients to perform specific tasks thanks to communications via the internet. Poland’s rural areas that are diversified in terms of economic development are poorly equipped with basic infrastructure, which is a barrier to the functioning of people with limited mobility. 
  • 51
  • 03 Aug 2022
Topic Review
Medical-Waste Blockchain Technology
Blockchain-based systems developed for waste management mainly focus on solid waste such as electronics, household waste, and agricultural waste. Implemented systems for the treatment and segregation of waste in the medical environment are few and need to be developed in detail.
  • 92
  • 28 Jul 2022
Topic Review
Sustainable Wireless Sensor Network Based Environmental Monitoring
Wireless sensor networks (WSN) are the base of the Internet of Things (IoT) that all together give rise to the smart city. These WSNs consist of several sensors, which are densely distributed to observe physical or environmental conditions, like humidity, temperature, light intensity, and gas concertation. The sensors reading data are transmitted to the network coordinator, the IP-gateway, which is at the heart of the wireless network.
  • 56
  • 27 Jul 2022
Topic Review
Attack Graph Based on Vulnerability Correlation
As network technology has advanced, and as larger and larger quantities of data are being collected, networks are becoming increasingly complex. Various vulnerabilities are being identified in such networks, and related attacks are continuously occurring. To solve these problems and improve the overall quality of network security, a network risk scoring technique using attack graphs and vulnerability information must be used. This technology calculates the degree of risk by collecting information and related vulnerabilities in the nodes and the edges existing in the network-based attack graph, and then determining the degree of risk in a specific network location or the degree of risk occurring when a specific route is passed within the network.
  • 39
  • 25 Jul 2022
  • Page
  • of
  • 18
Top