Topic Review
Segmentation and Path Planning of Unmanned Ariel Vehicle
Unmanned aerial vehicles (UAVs), sometimes known as “drones”, are unmanned aircraft that can be flown without a pilot on board. Aircraft, ground control stations, and communications systems all fall under the umbrella term unmanned aircraft systems (UAS), which describes the infrastructure necessary for sophisticated drone operations. An autonomous drone is a UAV that can fly missions independently of a human pilot. It can take off, execute its task, and return to base without human assistance. Rather than relying on a human pilot, communications management software handles mission planning and flight control for autonomous drones.
  • 161
  • 15 Dec 2023
Topic Review
Machine Learning Methods in Weather and Climate Applications
With the rapid development of artificial intelligence, machine learning is gradually becoming popular for predictions in all walks of life. In meteorology, it is gradually competing with traditional climate predictions dominated by physical models. 
  • 680
  • 15 Dec 2023
Topic Review
Digital Image Authentication for Security and Validation Enhancement
Digital face approaches possess currently received awesome attention because of their huge wide variety of digital audio, and visual programs. Digitized snapshots are progressively more communicated using an un-relaxed medium together with cyberspace. Consequently, defence, clinical, medical, and exceptional supervised photographs are essentially blanketed towards trying to employ it; such controls ought to damage such choices constructed totally based on those pictures.
  • 101
  • 15 Dec 2023
Topic Review
Decentralized Federated Learning and Knowledge Graph Embedding
Anomaly detection plays a crucial role in data security and risk management across various domains, such as financial insurance security, medical image recognition, and Internet of Things (IoT) device management. Researchers rely on machine learning to address potential threats in order to enhance data security.
  • 174
  • 15 Dec 2023
Topic Review
Data Analysis Using Machine Learning for Cybersecurity
The internet has become an indispensable tool for organizations, permeating every facet of their operations. Virtually all companies leverage Internet services for diverse purposes, including the digital storage of data in databases and cloud platforms. Furthermore, the rising demand for software and applications has led to a widespread shift toward computer-based activities within the corporate landscape. However, this digital transformation has exposed the information technology (IT) infrastructures of these organizations to a heightened risk of cyber-attacks, endangering sensitive data. Consequently, organizations must identify and address vulnerabilities within their systems, with a primary focus on scrutinizing customer-facing websites and applications. 
  • 241
  • 15 Dec 2023
Topic Review
Digital Marketing for SMEs in Tourism
Social media has become an essential tool for travel planning, with tourists increasingly using it to research destinations, book accommodation, and make travel arrangements. Small and medium-sized enterprises’(SMEs) most common use of social media is to promote their products or services, but they can also use it to build customer relationships, provide customer service, and gather feedback.
  • 341
  • 15 Dec 2023
Topic Review
Comparative Study of Keccak SHA-3 Implementations
SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies. This text aims to provide valuable insights into selecting and optimizing Keccak SHA-3 implementations. It encompasses an in-depth analysis of hardware, software, and software–hardware (hybrid) solutions. Researchers assess the strengths, weaknesses, and performance metrics of each approach. Critical factors, including computational efficiency, scalability, and flexibility, are evaluated across different use cases. Researchers investigate how each implementation performs in terms of speed and resource utilization. This text aims to improve the knowledge of cryptographic systems, aiding in the informed design and deployment of efficient cryptographic solutions. By providing a comprehensive overview of SHA-3 implementations, it offers a clear understanding of the available options and equips professionals and researchers with the necessary insights to make informed decisions in their cryptographic endeavors.
  • 205
  • 15 Dec 2023
Topic Review
Parallel Computing
Parallel computing, a significant portion of the problems faced by serial computing are gradually becoming obsolete. In both academic and industrial settings, the technique of parallel computing is often employed by researchers and industry practitioners alike to hasten the simulation-based optimisation processes.
  • 311
  • 14 Dec 2023
Topic Review
Commonsense Causal Reasoning
Commonsense causal reasoning is the process of understanding the causal dependency between common events or actions. Traditionally, it was framed as a selection problem. However, it cannot obtain enough candidates and needs more flexible causes (or effects) in many scenarios, such as causal-based QA problems. Thus, the ability to generate causes (or effects) is an important problem.
  • 232
  • 13 Dec 2023
Topic Review
Digital Twins for Industrie 4.0 in Urban Planning
Digital twins are emerging as a prime analysis, prediction, and control concepts for enabling the Industrie 4.0 vision of cyber-physical production systems (CPPSs) as well as for modeling complex tasks such as urban planning. Today’s growing complexity and volatility cannot be handled by monolithic digital twins but require a fundamentally decentralized paradigm of cooperating and competing digital twins.
  • 134
  • 13 Dec 2023
  • Page
  • of
  • 365
Video Production Service