Topic Review
Small Object Detection and Traffic Signs Detection
The detection of traffic signs is easily affected by changes in the weather, partial occlusion, and light intensity, which increases the number of potential safety hazards in practical applications of autonomous driving.
  • 343
  • 14 Jun 2023
Topic Review
Vision Systems for Fruit and Vegetable Classification
Citrus fruits are the second most important crop worldwide. One of the most important tasks is sorting, which involves manually separating the fruit based on its degree of maturity, and in many cases, involves a task carried out manually by human operators. A machine vision-based citrus sorting system can replace labor work for the inspection of fruit sorting.
  • 343
  • 21 Sep 2023
Topic Review
Federated Few-Shot Learning-Based Machinery Fault Diagnosis
Researchers present a novel federated few-shot learning-based machinery fault-diagnosis scheme, named FedCDAE-MN, which utilizes a combination of convolutional denoising auto-encoder and feature-space metric learning across multiple domains.
  • 343
  • 07 Oct 2023
Topic Review
Security and Privacy of Technologies in HISs
Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet patient needs, as well as to ensure the security and privacy of medical data, including confidentiality, integrity, and availability, which are necessary to achieve high-quality healthcare services.
  • 343
  • 19 Feb 2024
Topic Review
Łukaszyk-Karmowski Metric
The Łukaszyk–Karmowski metric (LK-metric) defines a distance between two random variables or vectors. LK-metric is not a metric as it does not satisfy the identity of indiscernibles axiom of the metric; for the same random variables, its value is greater than zero, providing they are not both degenerated.
  • 343
  • 20 May 2024
Topic Review
Searchable Attribute-Based Encryption Schemes
Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms.
  • 342
  • 01 Jun 2023
Topic Review
Cross-Domain Sentiment Analysis in IoT
Social media is a real-time social sensor to sense and collect diverse information, which can be combined with sentiment analysis to help IoT sensors provide user-demanded favorable data in smart systems. In the case of insufficient data labels, cross-domain sentiment analysis aims to transfer knowledge from the source domain with rich labels to the target domain that lacks labels. Most domain adaptation sentiment analysis methods achieve transfer learning by reducing the domain differences between the source and target domains, but little attention is paid to the negative transfer problem caused by invalid source domains. 
  • 342
  • 01 Sep 2023
Topic Review
Zero-Day Attack and Cybersecurity on Twitter
In the information era, knowledge can pose risks in the online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only identified after they have occurred. These types of risks are referred to as zero-day attacks since no pre-existing anti-malware measures are available to mitigate them. Consequently, significant damages occur when vulnerabilities in systems are exploited. The effectiveness of security systems, such as IPS and IDS, relies heavily on the prompt and efficient response to emerging threats.
  • 342
  • 05 Sep 2023
Topic Review
IoT/IIoT and Edge/Fog Computing
The Internet of Things (IoT) can be defined as a paradigm that utilizes intelligent devices that can communicate through the internet. The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. Edge computing is an enabling paradigm that exclusively processes data on the network’s edge. Fog computing is another emerging technology that enables edge devices (i.e., end devices and edge platforms) to perform additional computations, handle data, and allocate network resources.
  • 342
  • 15 Sep 2023
Topic Review
Vehicular Ad hoc Networks (VANETs)
Vehicular ad hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among vehicles, enhance vehicle safety, and improve the driving experience.
  • 342
  • 03 Nov 2023
  • Page
  • of
  • 366
ScholarVision Creations