Topic Review
Test-Time Augmentation for Network Anomaly Detection
Machine learning-based Network Intrusion Detection Systems (NIDS) are designed to protect networks by identifying anomalous behaviors or improper uses. In recent years, advanced attacks, such as those mimicking legitimate traffic, have been developed to avoid alerting such systems. Test-Time Augmentation for Network Anomaly Detection (TTANAD), which utilizes test-time augmentation to enhance anomaly detection from the data side.
  • 170
  • 28 Jul 2023
Topic Review
Towards Enabling Haptic Communications over 6G
The developments in communication networks enable many applications including high quality audio/video sharing. Mobile communication has become an essential component of present-day life. It plays an important role in the economy, health, education, and many other industries. Most of the population is connected through mobile communication networks globally. After successfully connecting billions of smartphones and laptops through mobile internet, the focus of mobile internet has now been diverted towards the ubiquitous connectivity of multiple devices and machines, hence creating the Internet of Things (IoT). This transition has led mankind towards remote communication between a human being and some kind of physical device. Such data-intensive communications can result in mediums where the human beings can interact with each other remotely by touch (haptic communication) or actuation.
  • 249
  • 28 Jul 2023
Topic Review
Finger Vein Verification
Traditional technologies of personal identity authentication (e.g., tokens, cards, PINs) have been gradually replaced by some more-advanced biometrics technologies, including faces, retinas, irises, fingerprints, veins, etc. Among these, the finger vein (FV) trait, due to its unique advantages of high security, the living requirement, being non-contact, and not easily being injured or counterfeited, has drawn extensive attention after it appeared. Different from some visual imaging traits such as faces and fingerprints, the main veins in the fingers tend to be longitudinally distributed in the subcutaneous regions.
  • 315
  • 28 Jul 2023
Topic Review
Recursive Decomposition–Reconstruction–Ensemble Method with Complexity Traits
The subject of oil price forecasting has obtained an incredible amount of interest from academics and policymakers in recent years due to the widespread impact that it has on various economic fields and markets. Thus, a novel method based on decomposition–reconstruction–ensemble for crude oil price forecasting is proposed. Based on the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) technique,  a recursive CEEMDAN decomposition–reconstruction–ensemble model considering the complexity traits of crude oil data was constructed. In this model, the steps of mode reconstruction, component prediction, and ensemble prediction are driven by complexity traits. For illustration and verification purposes, the West Texas Intermediate (WTI) and Brent crude oil spot prices are used as the sample data. The empirical result demonstrates that the proposed model has better prediction performance than the benchmark models.
  • 255
  • 28 Jul 2023
Topic Review
Trust Management Model for Secure Internet of Vehicles
The Internet of Vehicles (IoV) enables vehicles to share data that help vehicles perceive the surrounding environment. However, vehicles can spread false information to other IoV nodes; this incorrect information misleads vehicles and causes confusion in traffic, therefore, a vehicular trust model is needed to check the trustworthiness of the message. 
  • 366
  • 28 Jul 2023
Topic Review
Anchor Assignment in Object Detection
Due to the advantages of edge computing in terms of latency, bandwidth, and security, it provides more effective technical support for many applications that require real-time security. A security system is one of the applications for edge computing in Internet of Things (IoT), where the core end device is a camera for surveillance and smart security. Smart security based on object detection is one of the important applications of edge computing in IoT. Anchors in object detection refer to points on the feature map, which can be used to generate anchor boxes and serve as training samples. The training samples in object detection use anchors, which are feature points on the feature map that can be used for classification and regression.
  • 403
  • 28 Jul 2023
Topic Review
Maintenance for Offshore Wind Turbine Farms
The rapid increase in the use of renewable electricity, driven by the development of photovoltaic technologies and wind farms, compels the development of appropriate facilities to ensure their maintenance. Since wind farms are more efficient than traditional sources of electricity and their share in global electricity production is prominent, the development of techniques and maintenance methods dedicated to wind farms will also be prominent. The logistics and supply chain management of offshore wind turbine farms (OWFs) maintenance have a fundamental impact on their availability and, as a result, profitability.
  • 315
  • 28 Jul 2023
Topic Review
Human Action Recognition Methods
In the field of artificial intelligence, human action recognition is an important part of research in this area, making human interaction with the external environment possible. While human communication can be conveyed with words, facial expressions, written text, etc., the relationship between computers and sensors to understand human intentions and behaviour is now a popular area of research. As a result, more and more researchers are devoting their time and experience to the study of human action recognition.
  • 331
  • 28 Jul 2023
Topic Review
Arabic Sentiment Analysis of YouTube Comments
Arabic sentiment analysis is a challenging task due to a variety of challenges with the language. In Arabic, the same word might have a variety of meanings depending on the context. Arabic also has a rich morphology, with verb forms that are difficult to understand and elaborate syntactic patterns. The wide range of dialects spoken in Arabic is a significant barrier to sentiment analysis. In the region of the Middle East and North Africa, Arabic is spoken in a number of dialects, with substantial variations in vocabulary, syntax, and pronunciation. These factors make it challenging to develop accurate sentiment analysis models for Arabic texts. Despite the challenges, there have been successful research studies within the framework of sentiment analysis applied to the Arabic language.
  • 280
  • 28 Jul 2023
Topic Review
Digital Transformation for Achieving Sustainability
Sustainability through digital transformation is essential for contemporary businesses. Embracing sustainability, micro-, small-, and medium-sized enterprises (MSMEs) can gain a competitive advantage, attracting customers and investors who share these values. Moreover, incorporating sustainable practices empowers MSMEs to drive innovation, reduce costs, and enhance their reputation.
  • 362
  • 28 Jul 2023
  • Page
  • of
  • 365
Video Production Service