Topic Review
Spatial Keyword Group Query
Location-based services have been commonly used in daily life. Spatial keyword query, as one of the important technologies in location-based services, has been widely used in many fields, such as intelligent navigation systems and spatial positioning systems. Different types of spatial keyword query problems have been studied in depth by scholars.
  • 342
  • 24 Nov 2023
Topic Review
Hubble Meets Webb
Researchers explore the generation of James Webb Space Telescope (JWSP) imagery via image-to-image translation from the available Hubble Space Telescope (HST) data.
  • 342
  • 26 Feb 2024
Topic Review
User-Based Testing with Users with Disabilities
Human-centered design (HCD) “is an approach to interactive systems development that aims to make systems usable and useful by focusing on the users, their needs and requirements, and by applying human factors/ergonomics, and usability knowledge and techniques“. Developing usable and accessible solutions demands conducting usability testing, also called user-based testing, in which users perform real tasks with a prototype or a real system, usually using one or more specific User Interfaces (UIs). A comprehensive understanding of the challenges users face when using solutions, especially when developing accessible solutions, requires including real users with disabilities in user-based testing. An inclusive HCD approach enables the detection and addressing of real problems and barriers experienced by users with disabilities, ultimately improving usability and accessibility based on their valuable feedback. Involving users with disabilities in user-based testing, on the other hand, requires adequate planning and execution of testing considering the different capabilities and limitations of users with disabilities.
  • 341
  • 06 Jul 2023
Topic Review
Biometrics Mobile Authentication
Touch screen devices have evolved rapidly in recent years as demand and manufacture have skyrocketed. While smartphone capability continues to grow, progress in security has stagnated. This increasing gap between smartphone ability and security poses a significant problem. Physiological biometrics involve the unique physical characteristics of an individual such as their face, fingerprints, or iris. Behavioral biometrics involve how a person interacts with their device such as their typing, swiping, or tapping patterns. Biometrics authentication applies the user’s unique biological or behavioral features to phone security, which is more difficult to replicate by attackers in comparison to knowledge-based authentication.
  • 341
  • 10 Jul 2023
Topic Review
Artificial Intelligence-Based Cyber Security in Industry 4.0
The increase in cyber-attacks impacts the performance of organizations in the industrial sector, exploiting the vulnerabilities of networked machines. The increasing digitization and technologies present in the context of Industry 4.0 have led to a rise in investments in innovation and automation. However, there are risks associated with this digital transformation, particularly regarding cyber security. Targeted cyber-attacks are constantly changing and improving their attack strategies, with a focus on applying artificial intelligence in the execution process. Artificial Intelligence-based cyber-attacks can be used in conjunction with conventional technologies, generating exponential damage in organizations in Industry 4.0. The increasing reliance on networked information technology has increased the cyber-attack surface. 
  • 341
  • 20 Nov 2023
Topic Review
Concept Extraction in Education
In the education field, foundational subject-related knowledge reflects concepts frequently expressed as single words or phrases. Educational concepts must be blended into learning and instructional practices; students’ inadequate conceptual understanding can cause them to forget information during the learning process. Similarly, instructors can enhance learning materials’ quality through a clear sense of subject-specific concepts. Extracting concepts from various subject areas based on extensive unstructured text is thus critical for instructors and students, especially to enrich teaching and learning activities.
  • 341
  • 24 Nov 2023
Topic Review
Network Computer
The Network Computer (or NC) was a diskless desktop computer device made by Oracle Corporation from about 1996 to 2000. The devices were designed and manufactured by an alliance, which included Sun Microsystems, IBM, and others. The devices were designed with minimum specifications, based on the Network Computer Reference Profile. The brand was also employed as a marketing term to try to popularize this design of computer within enterprise and among consumers. The NC brand was mainly intended to inspire a range of desktop computers from various suppliers that, by virtue of their diskless design and use of inexpensive components and software, were cheaper and easier to manage than standard fat client desktops. However, due to the commoditization of standard desktop components, and due to the increasing availability and popularity of various software options for using full desktops as diskless nodes, thin clients, and hybrid clients, the Network Computer brand never achieved the popularity hoped for by Oracle and was eventually mothballed. The term "network computer" is now used for any diskless desktop computer or a thin client.
  • 340
  • 11 Oct 2022
Topic Review
Cybersecurity Analysis of Wearable Devices
Wearable devices are starting to gain popularity, which means that a large portion of the population is starting to acquire these products. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, as they recollect sensitive data, they are starting to be targets for cybercriminals. The number of attacks on wearable devices forces manufacturers to improve the security of these devices to protect them. Many vulnerabilities have appeared in communication protocols, specifically Bluetooth. A passive attack on six different smartwatches was performed to discover their vulnerabilities during the pairing process. Furthermore, a proposal of requirements was developed needed for maximum security of wearable devices, as well as the minimum requirements needed to have a secure pairing process between two devices via Bluetooth.
  • 340
  • 29 Jun 2023
Topic Review
Virtual Reality Technologies Supporting Screening Oculomotor Problems
Oculomotor dysfunctions (OMDs) are problems relating to coordination and accuracy of eye movements for processing visual information. Eye-tracking (ET) technologies show great promise in the identification of OMDs. Virtual Reality (VR) and ET technologies emerged in the field of vision science, integrating built-in eye trackers into head-mounted displays (HMDs). Therefore, today, VR has the potential to be an effective tool in complementing the treatment of a variety of vision disorders requiring ET technologies for identification or treatment, e.g., treating amblyopia and convergence insufficiency.
  • 340
  • 25 Jul 2023
Topic Review
Methodology of Social Network Message Analysis
Detection of Cyber Attacks in Social Media Messages Based on Convolutional Neural Networks and natural language processing (NLP) Techniques is a messages preprocessing proposal independent of social media source and validations based on threat hunting techniques. 
  • 340
  • 20 Sep 2023
  • Page
  • of
  • 366
ScholarVision Creations