Topic Review
WebAssembly
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. WebAssembly has gained widespread adoption and is natively supported by all modern browsers. Despite its benefits, WebAssembly has introduced significant security challenges, primarily due to vulnerabilities inherited from memory-unsafe source languages. Moreover, the use of WebAssembly extends beyond traditional web applications to smart contracts on blockchain platforms, where vulnerabilities have led to significant financial losses. WebAssembly has also been used for malicious purposes, like cryptojacking, where website visitors’ hardware resources are used for crypto mining without their consent. 
  • 51
  • 15 Mar 2024
Topic Review
Camera-LiDAR-Based 3D Object Detection Methods
Three-dimensional (3D) object detection is a topic that has gained interest within the scientific community dedicated to vehicle automation. Based on LiDAR and stereo cameras, and considering only deep learning-based approaches, 3D object detection methods are classified according to the type of input data: camera-based, LiDAR-based, and fusion-based 3D object detection.
  • 82
  • 15 Mar 2024
Topic Review
Personal Data Security
As time goes by, information and communication technology continue to advance. Since the pandemic, the need for information and communication technology has risen to aid us in working and studying from home. One of the forms of information and communication technology is social media. Social media is where users can connect with other users in different regions, upload content as images or videos, express themselves freely, and get responses or reactions from other users (likes and comments). However, behind all those, social media can also be a place full of threats towards the personal data of its users. 
  • 78
  • 15 Mar 2024
Topic Review
Edge Data Analytics
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can impact the data being processed. Thus, safeguarding sensitive data from being exposed to illegitimate users is crucial to avoiding uncertainties and maintaining the overall quality of the service offered. Most existing edge security models have considered attacks during data analysis as an afterthought.
  • 158
  • 14 Mar 2024
Topic Review
Advancements in Glaucoma Diagnosis
The progress of artificial intelligence algorithms in digital image processing and automatic diagnosis studies of the eye disease glaucoma has been growing and presenting essential advances to guarantee better clinical care for the population.
  • 58
  • 14 Mar 2024
Topic Review
P-IOTA
The recent widespread novel network technologies for programming data planes are remarkably enhancing the customization of data packet processing. In this direction, the Programming Protocol-independent Packet Processors (P4) is envisioned as a disruptive technology, capable of configuring network devices in a highly customizable way. P4 enables network devices to adapt their behaviors to mitigate malicious attacks (e.g., denial of service). Distributed ledger technologies (DLTs), such as blockchain, allow secure reporting alerts on malicious actions detected across different areas. IOTA is a next-generation distributed ledger engineered to tackle the scalability limits while still providing the same security capabilities such as immutability, traceability, and transparency. P-IOTA integrates a P4-based data plane software-defined network (SDN) and an IOTA layer employed to notify about networking attacks. 
  • 54
  • 14 Mar 2024
Topic Review
Advancements and Challenges in IoT and Network Simulators
The Internet of Things (IoT) has emerged as an important concept, bridging the physical and digital worlds through interconnected devices. Although the idea of interconnected devices predates the term “Internet of Things”, which was coined in 1999 by Kevin Ashton, the vision of a seamlessly integrated world of devices has been accelerated by advancements in wireless technologies, cost-effective computing, and the ubiquity of mobile devices. In this regard, Cloud infrastructures are crucial for orchestrating and collecting data from these ubiquitous devices.
  • 128
  • 12 Mar 2024
Topic Review
Machine Learning for Evidence-Based Telehealth and Smart Care
Clinical studies have utilized machine learning in telehealth and smart care for disease management, self-management, and managing health issues like pulmonary diseases, heart failure, diabetes screening, and intraoperative risks. Machine learning combined with the application of evidence-based practices in healthcare can enhance telehealth and smart care strategies by improving quality of personalized care, early detection of health-related problems, patient quality of life, patient-physician communication, resource efficiency and cost-effectiveness. 
  • 90
  • 12 Mar 2024
Topic Review
Relationship of Artificial Intelligence, Advertising, and Generative Models
Although artificial intelligence technologies have provided valuable insights into the advertising industry, more comprehensive studies that properly examine the applications of AI in advertising using scientometric network analysis are needed.
  • 55
  • 11 Mar 2024
Topic Review
AI Agent Model for Extrinsic Emotion Regulation
Emotion regulation is the human ability to modulate one’s or other emotions to maintain emotional well-being. Despite its importance, only a few computational models have been proposed for facilitating emotion regulation. To address this gap, a computational model for intelligent agents has been proposed for facilitating emotion regulation in individuals. This model is grounded in a multidimensional emotion representation and on J. Gross’s theoretical framework of emotion regulation. In this apporach, an intelligent agent selects the most appropriate regulation strategies to reach or maintain an individual’s emotional equilibrium considering the individual’s personality traits and specific characteristics.
  • 104
  • 11 Mar 2024
  • Page
  • of
  • 365