Topic Review
Algorithms for Spam Detection
Spam emails have become a pervasive issue, as internet users receive increasing amounts of unwanted or fake emails. To combat this issue, automatic spam detection methods have been proposed, which aim to classify emails into spam and non-spam categories. Machine learning techniques have been utilized for this task with considerable success. 
  • 521
  • 16 Oct 2023
Topic Review
Virtual Reality Automotive Lab Development
A Virtual Reality application was developed to be used as an immersive virtual learning strategy for Oculus Rift S Virtual Reality glasses and through Leap Motion Controller™ infrared sensors, focused on students of the Automotive Systems Engineering academic program, as a practical teaching-learning tool in the context of Education 4.0 and the pandemic caused by COVID-19 that has kept schools closed since March 2020. The technological pillars of Industry 4.0 were used to profile students so that they can meet the demands of their professional performance at the industrial level. Virtual Reality (VR) plays a very important role for the production-engineering sector in areas such as design and autonomous cars, as well as in training and driving courses. The VR application provides the student with a more immersive and interactive experience, supported by 3D models of both the main parts that make up the four-stroke combustion engine and the mechanical workshop scenario; it allows the student to manipulate the main parts of the four-stroke combustion engine through the Oculus Rift S controls and the Leap Motion Controller™ infrared sensors, and relate them to the operation of the engine, through the animation of its operation and the additional information shown for each part that makes it up in the application. 
  • 520
  • 06 Sep 2021
Topic Review
Women’s Contribution in Computer Science
The presence of women in teams seem to increase collective intelligence, and if those women have decision making positions, success probabilities increase in startups. When women are not involved in designing products and addressing social and political problems, then needs and desires unique to women may be overlooked. 
  • 520
  • 30 Jun 2022
Topic Review
Microsoft Dynamics NAV
Microsoft Dynamics NAV is an enterprise resource planning (ERP) app from Microsoft. The product is part of the Microsoft Dynamics family, and intended to assist with finance, manufacturing, customer relationship management, supply chains, analytics and electronic commerce for small and medium-sized companies and local subsidiaries of large international groups. For modifications of the system, the proprietary programming language C/AL is used. Microsoft Dynamics NAV has been superseded by Microsoft Dynamics 365 Business Central.
  • 520
  • 20 Oct 2022
Topic Review
Novel Pooling Methods for Convolutional Neural Networks
Neural network computational methods have evolved over the past half-century. In 1943, McCulloch and Pitts designed the first model, recognized as the linear threshold gate. Hebbian developed the Hebbian learning rule approach for training the neural network. However, would the Hebbian rule remain productive when all the input patterns became orthogonal? The existence of orthogonality in input vectors is a crucial component for this rule to execute effectively. To meet this requirement, a much more productive learning rule, known as the Delta rule, was established. Whereas the delta rule poses issues with the learning principles outlined above, backpropagation has developed as a more complicated learning approach. Backpropagation could learn an infinite layered structure and estimate any commutative function. A feed-forward neural network is most often trained using backpropagation (FFNN).
  • 519
  • 08 Sep 2022
Topic Review
Resampling under Complex Sampling Designs
In principle, survey data are an ideal context to apply resampling methods to approximate the (unknown) sampling distribution of statistics, due to both a usually large sample size and data of controlled quality. However, survey data cannot be generally assumed independent and identically distributed (i.i.d.) so that any resampling methodologies to be used in sampling from finite populations must be adapted to account for the sample design effect. A principled appraisal is given and discussed here.
  • 518
  • 31 Mar 2022
Topic Review
Lebesgue Constant (Interpolation)
In mathematics, the Lebesgue constants (depending on a set of nodes and of its size) give an idea of how good the interpolant of a function (at the given nodes) is in comparison with the best polynomial approximation of the function (the degree of the polynomials are obviously fixed). The Lebesgue constant for polynomials of degree at most n and for the set of n + 1 nodes T is generally denoted by Λn(T ). These constants are named after Henri Lebesgue.
  • 518
  • 01 Dec 2022
Topic Review
Ion-Movement-Based Synaptic Device for Brain-Inspired Computing
As the amount of data has grown exponentially with the advent of artificial intelligence and the Internet of Things, computing systems with high energy efficiency, high scalability, and high processing speed are urgently required. Unlike traditional digital computing, which suffers from the von Neumann bottleneck, brain-inspired computing can provide efficient, parallel, and low-power computation based on analog changes in synaptic connections between neurons. Synapse nodes in brain-inspired computing have been typically implemented with dozens of silicon transistors, which is an energy-intensive and non-scalable approach. Ion-movement-based synaptic devices for brain-inspired computing have attracted increasing attention for mimicking the performance of the biological synapse in the human brain due to their low area and low energy costs.
  • 516
  • 27 May 2022
Topic Review
Reversible Data Hiding Schemes Using Image Steganography
Encryption is a significant technique to secure data. Steganography and cryptography are two widely used techniques used to secure data. The steganographic technique is used to conceal the confidential information within data, whereas cryptography obfuscates the secret data to make it unreadable. The basic aim of the steganographic technique is to protect the copyrights, authorization, and ownership of the digital media transmitted over a network. A good stego-image should have high embedding capacity, robustness, imperceptibility, security, and less computational complexity.
  • 516
  • 27 Sep 2022
Topic Review
Tuxedo
Tuxedo (Transactions for Unix, Extended for Distributed Operations) is a middleware platform used to manage distributed transaction processing in distributed computing environments. Tuxedo is a transaction processing system or transaction-oriented middleware, or enterprise application server for a variety of systems and programming languages. Developed by AT&T in the 1980s, it became a software product of Oracle Corporation in 2008 when they acquired BEA Systems. Tuxedo is now part of the Oracle Fusion Middleware.
  • 516
  • 27 Oct 2022
  • Page
  • of
  • 366
ScholarVision Creations