Topic Review
Optimized Downlink Scheduling over Long-Term Evolution Network
Long-Term Evolution (LTE) technology is utilized efficiently for wireless broadband communication for mobile devices. It provides flexible bandwidth and frequency with high speed and peak data rates. Optimizing resource allocation is vital for improving the performance of the Long-Term Evolution (LTE) system and meeting the user’s quality of service (QoS) needs. The resource distribution in video streaming affects the LTE network performance, reducing network fairness and causing increased delay and lower data throughput. 
  • 169
  • 15 Sep 2023
Topic Review
Auction-based Learning for Knowledge Graph Question Answering
Knowledge graphs are graph-based data models which can represent real-time data that is constantly growing with the addition of new information. The question-answering systems over knowledge graphs (KGQA) retrieve answers to a natural language question from the knowledge graph. Most existing KGQA systems use static knowledge bases for offline training. After deployment, they fail to learn from unseen new entities added to the graph. There is a need for dynamic algorithms which can adapt to the evolving graphs and give interpretable results. The algorithms can adapt to changing environments in real-time, making them suitable for offline and online training. An auction algorithm computes paths connecting an origin node to one or more destination nodes in a directed graph and uses node prices to guide the search for the path. When new nodes and edges are dynamically added or removed in an evolving knowledge graph, the algorithm can adapt by reusing the prices of existing nodes and assigning arbitrary prices to the new nodes. For subsequent related searches, the “learned” prices provide the means to “transfer knowledge” and act as a “guide”: to steer it toward the lower-priced nodes.
  • 167
  • 15 Sep 2023
Topic Review
Malicious PDF Document Detection Methods
In network attacks based on malicious documents, the PDF document type accounts for a large proportion. Traditional PDF document detection technology usually builds a rule or feature library for specific vulnerabilities and therefore is only fit for single detection targets and lacks anti-detection ability.
  • 153
  • 15 Sep 2023
Topic Review
Industrial Drying Hopper Operations
The advancement of Industry 4.0 and smart manufacturing has made a large amount of industrial process data attainable with the use of sensors installed on machines. This stands true for Industrial Dryer Hoppers, which are used for most polymer manufacturing processes. Insights derived via AI from the collected data allow for improved processes and operations.
  • 208
  • 15 Sep 2023
Topic Review
Encryption and Compression Schemes Based on JPEG
Due to the excellent compression performance of JPEG, many schemes based on JPEG have been developed for the encryption and compression of digital images. According to the positioning of the encryption within the compression process, they can be classified into three categories: encryption before compression, joint compression and encryption, and compression before encryption. Encryption before compression means that the image is encrypted before JPEG compression. Typical methods include permutation encryption and some chaos-based encryption schemes that directly operate on the original image
  • 321
  • 15 Sep 2023
Topic Review
Cyber Resilience
Cyber resilience refers to an organization’s capability to maintain its targeted performance despite a cybersecurity breach.
  • 152
  • 15 Sep 2023
Topic Review
X-ray Images for Cargo Inspection of Nuclear Items
As part of establishing a management system to prevent the illegal transfer of nuclear items, automatic nuclear item detection technology is required during customs clearance. Multiple item insertions to respond to actual X-ray cargo inspection situations and the resulting occlusion expressions significantly affect the performance of the segmentation models.
  • 191
  • 15 Sep 2023
Topic Review
Authentication Methods for Mobile Device Users
With the advent of smart mobile devices, end users get used to transmitting and storing their individual privacy in them, which, however, has aroused prominent security concerns inevitably. Numerous researchers have primarily proposed to utilize motion sensors to explore implicit authentication techniques. 
  • 251
  • 14 Sep 2023
Topic Review
Standardization of Post-Quantum Cryptography
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computers and quantum algorithms, classical cryptographic techniques have been in danger of collapsing because quantum computers can solve complex problems in polynomial time. Stemming from that risk, researchers worldwide have stepped up research on post-quantum algorithms to resist attack by quantum computers.
  • 280
  • 14 Sep 2023
Topic Review
Obstacle Detection and Mapping in Vehicle-to-Vehicle Networks
Vehicle-to-Vehicle (V2V) networks, specifically Vehicular Ad Hoc Networks (VANETs), are central to enhancing road safety by improving vehicle visibility, particularly when traditional onboard sensors fall short. The crucial role that VANETs play in modern transportation systems is increasingly being recognized, with the ability to facilitate real-time communication between vehicles, improving situational awareness, and thereby enhancing road safety. However, the accuracy, integrity and security of these data are of paramount importance, as any inaccuracies or compromises could lead to incorrect hazard perception and possibly catastrophic consequences. Hence, substantial effort is required to maintain these data characteristics while enabling efficient and rapid data exchange.
  • 201
  • 13 Sep 2023
  • Page
  • of
  • 365
Video Production Service