Topic Review
Virtual and Physical Robot Arms Using Augmented Reality
The use of robot arms in various industrial settings has changed the way tasks are completed. However, safety concerns for both humans and robots in these collaborative environments remain a critical challenge. Traditional approaches to visualising safety zones, including physical barriers and warning signs, may not always be effective in dynamic environments or where multiple robots and humans are working simultaneously. Mixed reality technologies offer dynamic and intuitive visualisations of safety zones in real time, with the potential to overcome these limitations.
  • 240
  • 31 Oct 2023
Topic Review
Models and Tools for Developing Serious Games
Serious games (SG), (video games with an educational purpose), provide teachers with tools to strengthen their students’ knowledge. Developing a SG requires knowledge, time, and effort. As a result, specialized tools to aid in the development process are needed.
  • 488
  • 31 Oct 2023
Topic Review
An AI-Based Framework for Translating American Sign Language
Communication is an essential part of life, without which life would be very difficult. Each living being in the world communicates in their own way. American Sign Language (ASL) is a sign language used by deaf and hearing impaired people in the United States and Canada, devised in part by Thomas Hopkins Gallaudet and Laurent Clerc based on sign language in France.
  • 221
  • 31 Oct 2023
Topic Review
Facility Location Problem
The facility location problem (FLP) is a complex optimization problem that has been widely researched and applied in industry.
  • 269
  • 31 Oct 2023
Topic Review
Brain Tumor Segmentation from MRI Images
Brain tumor segmentation from magnetic resonance imaging (MRI) scans is critical for the diagnosis, treatment planning, and monitoring of therapeutic outcomes.
  • 217
  • 31 Oct 2023
Topic Review
A Generative Adversarial Network Technique for Ransomware Behavior Prediction
The ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique attack patterns for each new target, particularly in the pre-encryption phase where evasiveness is prioritized. 
  • 358
  • 30 Oct 2023
Topic Review
Automatic Genre Identification for Massive Text Collections
Automatic genre identification is a text classification task, as a method of providing insights into the content of large text collections. It evaluates various machine learning models for their generalization capabilities, including pre-Transformer approaches, BERT-like encoder models and instruction-tuned GPT large language models. As a result, it introduces the first publicly-available benchmark for this task. What is more, a high-performing genre classifier that can be applied to numerous languages is introduced.
  • 195
  • 30 Oct 2023
Topic Review
Modified Generalized Feistel Network Block Cipher
With the advent of the Internet-of-Things (IoT) technologies, millions of low-resource devices are constantly used at the network’s edge. As a result, the large amount of private and sensitive data generated by these devices must be securely transported, stored, and processed, posing a challenge because these resource-constrained IoT devices cannot meet the criteria of conventional encryption ciphers. Feistel networks are further divided into two types: classical Feistel networks and generalized Feistel networks (GFN). While classical Feistel ciphers divide a message into two sub-blocks, GFN divides a message into k sub-blocks for some k > 2 called the partition number.
  • 511
  • 30 Oct 2023
Topic Review
Multiauthority Ciphertext Policy-Attribute-Based Encryption
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers brings a significant dilemma in implementing fog computing. The computational power of the resources constrains Internet of Things (IoT) devices in the fog-computing environment. Therefore, an attacker can easily attack. Traditional methods like attribute-based encryption (ABE) techniques are inappropriate for resource-constraint devices with protracted computing and limited computational capabilities. In this regard, researchers investigate a multiauthority ciphertext policy-attribute-based encryption (MA-CP-ABE) method that enables multiauthority attribute revocation and computation outsourcing.
  • 211
  • 30 Oct 2023
Topic Review
Lung Nodule Image Segmentation
Early detection and analysis of lung cancer involve a precise and efficient lung nodule segmentation in computed tomography (CT) images.
  • 527
  • 30 Oct 2023
  • Page
  • of
  • 365
Video Production Service