Topic Review
Commerce Transaction Requests Encryption
The proliferation of wireless communication networks, credit cards, smartphones, and the continuous growth of e-commerce have led to increased product sales and delivery. E-commerce involves a complex system comprising various elements, including the Internet, online shopping websites, servers, payment methods, product delivery, and customers. However, the transactional information in e-commerce faces potential breaches and threats, emphasizing the need to protect data privacy. To ensure information security, researchers propose a high-performance and secure protocol.
  • 416
  • 14 Aug 2023
Topic Review
Detection of Rootkits Using Memory Analysis
Rootkits are malicious programs designed to conceal their activities on compromised systems, making them challenging to detect using conventional methods. As the threat landscape continually evolves, rootkits pose a serious threat by stealthily concealing malicious activities, making their early detection crucial to prevent data breaches and system compromise. A promising strategy for monitoring system activities involves analyzing volatile memory. The process can be made more reliable by the use of Machine learning and deep learning algorithms too.
  • 416
  • 12 Oct 2023
Topic Review
Security Threats for Medical Wearables
In the past few years, “smart” objects and products have given rise to significant progress in industry production and its security. Advances in digitization that have occurred in the industry, combined with internet technologies and future-oriented technologies in the field of so-called “smart” objects (machines and products), have led to a new and fundamental paradigm shift in industrial production and in their security.
  • 415
  • 14 Mar 2022
Topic Review
Detection of Suspicious Behaviors from Movement Trajectory Data
Early detection of people’s suspicious behaviors can aid in the prevention of crimes and make the community safer. Existing methods are mostly focused on identifying abnormal behaviors from video surveillance that are based on computer vision, which are more suitable for detecting ongoing behaviors.  Due to advances in positioning technology and the increasing number of cameras, smart mobile terminals, and WLAN networks, large amounts of fine-grained personal trajectory data are collected. Such a large number of trajectories provide people with an unprecedented opportunity to automatically discover helpful knowledge, such as identifying suspicious movements and unusual activities. Therefore, crimes can be prevented if people’s suspicious behaviors can be automatically detected by mining the semantic information that is hidden in the trajectory data.
  • 415
  • 23 Sep 2022
Topic Review
Albert Odyssey (Super Famicom Game)
Albert Odyssey (アルバートオデッセイ, Arubaato Odessei) is a tactical role-playing video game developed and published by Sunsoft and released for the Super Nintendo Entertainment System in Japan in March 1993. The game features strategy-based combat in addition to traditional role-playing game elements in two-dimensional environments. It is the first game in the Albert Odyssey series, and was followed by two sequels, Albert Odyssey 2: Jashin no Taidou in 1994, and Albert Odyssey in 1996. On June 12, 1996, Albert Odyssey was made available as a full game download on the Satellaview add-on as BS Albert Odyssey (BSアルバートオデッセイ, BS Arubaato Odessei), and the original Albert Odyssey was re-released for Satellaview in March 1998. Players assume the role of Albert, the young heroic swordsman who lives in a fantasy world filled with monsters and mythical creatures. While much of the world remains in relative peace following a great war many years before, a military faction led by the dark magician Globus has emerged to conquer the newly pacified nations and expand their empire. With the help of Albert's friends as well as hired mercenaries, the player must travel the world and eventually confront Golbus and his forces to prevent another large-scale conflict.
  • 415
  • 10 Oct 2022
Topic Review
Information Card
Information cards are personal digital identities that people can use online, and the key component of an identity metasystem. Visually, each i-card has a card-shaped picture and a card name associated with it that enable people to organize their digital identities and to easily select one they want to use for any given interaction. The information card metaphor is implemented by identity selectors like Windows CardSpace, DigitalMe or Higgins Identity Selector. An identity metasystem is an interoperable architecture for digital identity that enables people to have and employ a collection of digital identities based on multiple underlying technologies, implementations, and providers. Using this approach, customers can continue to use their existing identity infrastructure investments, choose the identity technology that works best for them, and more easily migrate from old technologies to new technologies without sacrificing interoperability with others. The identity metasystem is based upon the principles in "The Laws of Identity".
  • 415
  • 10 Nov 2022
Topic Review
Machine-Learning-Based Chemoinformatics
In modern drug discovery, the combination of chemoinformatics and quantitative structure–activity relationship (QSAR) modeling has emerged as a formidable alliance, enabling researchers to harness the vast potential of machine learning (ML) techniques for predictive molecular design and analysis.
  • 415
  • 18 Jul 2023
Topic Review
Mir
Mir is a computer display server and, recently, a Wayland compositor for the Linux operating system that is under development by Canonical Ltd. It was planned to replace the currently used X Window System for Ubuntu; however, the plan changed and Mutter was adopted as part of GNOME Shell. Mir was announced by Canonical on 4 March 2013 as part of the development of Unity 8, intended as the next generation for the Unity user interface. Four years later Unity 8 was dropped although Mir's development continued for Internet of Things (IoT) applications.
  • 414
  • 28 Oct 2022
Topic Review
QVD
QVD is an open-source virtual desktop infrastructure (VDI) product built on Linux. Its main purpose is to provide remote desktops to users.
  • 414
  • 03 Nov 2022
Topic Review
ACT-R
ACT-R (pronounced /ˌækt ˈɑr/; short for "Adaptive Control of Thought—Rational") is a cognitive architecture mainly developed by John Robert Anderson and Christian Lebiere at Carnegie Mellon University. Like any cognitive architecture, ACT-R aims to define the basic and irreducible cognitive and perceptual operations that enable the human mind. In theory, each task that humans can perform should consist of a series of these discrete operations. Most of the ACT-R's basic assumptions are also inspired by the progress of cognitive neuroscience, and ACT-R can be seen and described as a way of specifying how the brain itself is organized in a way that enables individual processing modules to produce cognition.
  • 414
  • 05 Dec 2022
  • Page
  • of
  • 366
ScholarVision Creations