Topic Review
Self-Supervised Learning (SSL) in Deep Learning Contexts
Self-supervised learning (SSL) is a potential deep learning (DL) technique that uses massive volumes of unlabeled data to train neural networks. SSL techniques have evolved in response to the poor classification performance of conventional and even modern machine learning (ML) and DL models of enormous unlabeled data produced periodically in different disciplines. However, the literature does not fully address SSL’s practicalities and workabilities necessary for industrial engineering and medicine. Accordingly, this thorough review is administered to identify these prominent possibilities for prediction, focusing on industrial and medical fields. This extensive survey, with its pivotal outcomes, could support industrial engineers and medical personnel in efficiently predicting machinery faults and patients’ ailments without referring to traditional numerical models that require massive computational budgets, time, storage, and effort for data annotation. 
  • 80
  • 18 Mar 2024
Topic Review
Class Imbalance Problem in Credit Risk Prediction
Credit, as defined by financial institutions such as banks and lending companies, represents a vital loan certificate issued to individuals or businesses. This certification mechanism plays a pivotal role in ensuring the smooth functioning of the financial sector, contingent upon comprehensive evaluations of creditworthiness.
  • 74
  • 18 Mar 2024
Topic Review
Different Routing Problems in Transportation
Routing problems refer to a class of optimization problems concerned with finding the most efficient routes or sequences of visits for vehicles tasked with delivering goods or services. These problems typically involve determining optimal paths through a network of nodes (e.g., customers, locations) while satisfying various constraints such as vehicle capacity, time windows, and distance or time limitations.
  • 57
  • 18 Mar 2024
Topic Review
Business Email Compromise Defender
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. According to the available literature, various authentication methods have been explored for validating physical documents using QR codes.
  • 394
  • 18 Mar 2024
Topic Review
Emission Reduction Decisions in Blockchain-Enabled Low-Carbon Supply Chains
With the rapid development of the global economy, carbon emissions are increasing year by year. The continuous promotion of low-carbon policies has led to a gradual increase in consumers’ carbon perception sensitivity and environmental awareness. With the increasing maturity of blockchain technology, its distributed database technology realizes the transparency and traceability of the carbon emission reduction process, which effectively enhances consumers’ trust in low-carbon products.
  • 45
  • 18 Mar 2024
Topic Review
Natural Image Reconstruction from fMRI
Reconstructing natural stimulus images using functional magnetic resonance imaging (fMRI) is one of the most challenging problems in brain decoding and is also the crucial component of a brain–computer interface.
  • 56
  • 18 Mar 2024
Topic Review
Integrated GNN and DRL in E2E Networking Solutions
Graph neural networks (GNN) and deep reinforcement learning (DRL) are at the forefront of algorithms for advancing network automation with capabilities of extracting features and multi-aspect awareness in building controller policies. While GNN offers non-Euclidean topology awareness, feature learning on graphs, generalization, representation learning, permutation equivariance, and propagation analysis, it lacks capabilities in continuous optimization and long-term exploration/exploitation strategies. Therefore, DRL is an optimal complement to GNN, enhancing the applications towards achieving specific policies within the scope of end-to-end (E2E) network automation.
  • 67
  • 18 Mar 2024
Topic Review
Train Multiplayer First-Person Shooter Game Agents
Artificial Intelligence bots are extensively used in multiplayer First-Person Shooter (FPS) games. By using Machine Learning techniques, we can improve their performance and bring them to human skill levels.
  • 58
  • 18 Mar 2024
Topic Review
WebAssembly
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. WebAssembly has gained widespread adoption and is natively supported by all modern browsers. Despite its benefits, WebAssembly has introduced significant security challenges, primarily due to vulnerabilities inherited from memory-unsafe source languages. Moreover, the use of WebAssembly extends beyond traditional web applications to smart contracts on blockchain platforms, where vulnerabilities have led to significant financial losses. WebAssembly has also been used for malicious purposes, like cryptojacking, where website visitors’ hardware resources are used for crypto mining without their consent. 
  • 49
  • 15 Mar 2024
Topic Review
Camera-LiDAR-Based 3D Object Detection Methods
Three-dimensional (3D) object detection is a topic that has gained interest within the scientific community dedicated to vehicle automation. Based on LiDAR and stereo cameras, and considering only deep learning-based approaches, 3D object detection methods are classified according to the type of input data: camera-based, LiDAR-based, and fusion-based 3D object detection.
  • 71
  • 15 Mar 2024
  • Page
  • of
  • 364