Topic Review
Optical Components Used to Implement Optical Functions
Deep learning has an unquenchable thirst for processing resources. Classical deep learning has silently developed a bottleneck due to the interference of electrical impulses, energy usage, and physical constraints, even though electronic parts established on silicon can still sustain it presently. Academic and corporate circles are attempting to find new approaches for resolving electrical flaws that are less computationally intensive. It has huge benefits in information transmission and OC due to its high speed of 300,000 km per second, which is 300 times faster than that of an electron, and its data-carrying capacity and variety, which is 2 × 104 times greater than that of electric channels, as well as high parallelism and strong anti-interference. Switching electricity with light has emerged as a viable and sustainable work style, following the current trend.
  • 907
  • 30 Jun 2022
Topic Review
Internet of Things with the Industrial Marketplace
There is no doubt that new technology has become one of the crucial parts of most people’s lives around the world. By and large, in this era, the Internet and the Internet of Things (IoT) have become the most indispensable parts of our lives. Recently, IoT technologies have been regarded as the most broadly used tools among other technologies. The tools and the facilities of IoT technologies within the marketplace are part of Industry 4.0. The marketplace is too regarded as a new area that can be used with IoT technologies. One of the main purposes of this paper is to highlight using IoT technologies in Industry 4.0, and the Industrial Internet of Things (IIoT) is another feature revised.
  • 897
  • 21 Feb 2022
Topic Review
Cyber-Physical System
Cyber-Physical System (CPS) is a symbol of the fourth industrial revolution (4IR) by integrating physical and computational processes which can associate with humans in various ways. In short, the relationship between Cyber networks and the physical component is known as CPS, which is assisting to incorporate the world and influencing our ordinary life significantly. In terms of practical utilization of CPS interacting abundant difficulties. CPS is involved in modern society very vastly with many uptrend perspectives. All the new technologies by using CPS are accelerating our journey of innovation. Researchers have explained the research areas of 14 important domains of Cyber-Physical Systems (CPS) including aircraft transportation systems, battlefield surveillance, chemical production, energy, agriculture (food supply), healthcare, education, industrial automation, manufacturing, mobile devices, robotics, transportation, and vehicular. 
  • 800
  • 11 May 2023
Topic Review
Models for Evaluation Intrusion Detection Systems in IoT
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. 
  • 778
  • 27 May 2022
Topic Review
Model Predictive Traffic Control by Bi-Level Optimization
A bi-level model for traffic signal optimization is developed. The model predictive framework is applied for traffic control in an urban traffic network. The potential of the bi-level formalization is used to increase the space of control influences with simultaneous evaluation of the green light and cycle durations. Thus, the increased control space allows more traffic parameters to be considered, such as vehicles queues and traffic flows. A particular modification of the bi-level control is applied for the synchronization of the traffic lights in the network. The model predictive approach is used for the real-time management of the traffic in the network. The control implementations are constrained by the shortest evaluated cycle.
  • 748
  • 11 May 2022
Topic Review
Cognitive Sciences in Cybersecurity
Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks. much attention has been paid to proactive cybersecurity solutions, acceptable cybersecurity practices, and cybersecurity hygiene strategies for mitigating cyberattacks. In this context, the use of cognitive science techniques has grown significantly. In general, cognitive science is being used to understand the behavior of adversaries to minimize the impact of cyberattacks.
  • 741
  • 04 Jul 2022
Topic Review
Artificial Intelligence Techniques in Surveillance Video Anomaly Detection
The Surveillance Video Anomaly Detection (SVAD) system is a sophisticated technology designed to detect unusual or suspicious behavior in video surveillance footage without human intervention. The system operates by analyzing the video frames and identifying deviations from normal patterns of movement or activity. This is achieved through advanced algorithms and machine learning techniques that can detect and analyze the position of pixels in the video frame at the time of an event.
  • 731
  • 10 May 2023
Topic Review
Blockchain Networks Privacy
One of the most widely researched areas in the field of blockchain networks is the domain of preserving blockchain privacy. The reason being the growing concern of several industries and business enterprises to protect their data and trade secrets from unauthorized access. 
  • 673
  • 03 Aug 2021
Topic Review
Distributed Denial-of-Service Attacks
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, has attracted everyone’s attention. The attackers took advantage of this and can be caused serious problems, such as malware attacks, ransomware, SQL injection attack and so on. One of the dominant attacks, known as distributed denial-of-service (DDoS), has been observed as the main reason for information hacking.
  • 653
  • 21 Sep 2022
Topic Review
Cybersecurity Standards
Cybersecurity standards (also styled cyber security standards) are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. The principal objective is to reduce the risks, including prevention or mitigation of cyber-attacks. These published materials consist of collections of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies.
  • 650
  • 14 Oct 2022
  • Page
  • of
  • 10