Topic Review
The Firefighter Problem
The firefighter problem defines a discrete-time process where a fire starts at a designated subset of the vertices of a graph G. At each subsequent discrete time unit, the fire propagates from each burnt vertex to all of its neighbors unless they are defended by a firefighter that can move between any pair of vertices in a single time unit. Once a vertex is burnt or defended, it remains in that state, and the process terminates when the fire can no longer spread.
  • 599
  • 21 Jul 2023
Topic Review
Multiple Traveling Salesperson Problems
Multiple traveling salesperson problems (mTSP) are a collection of problems that generalize the classical traveling salesperson problem (TSP). In a nutshell, an mTSP variant seeks a minimum-cost collection of m paths that visit all vertices of a given weighted complete graph. Conceptually, mTSP lies between TSP and vehicle routing problems (VRP).
  • 1.2K
  • 20 Jul 2023
Topic Review
Critical Immersive-Triggered Literacy in Inclusive Digital Education
The critical immersive-triggered (CIT) literacy, which allows for the internalization of cognitive skills through attention-drawing multisensory functionalities on specific learning objects. In the Metaverse era, the incorporation of activities that lead to CIT literacy can facilitate digital attention in the learning process and lead to the synthesis and creation of new content.
  • 234
  • 20 Jul 2023
Topic Review
Guiding the Coordinated Charging of Electric Vehicles
Guiding the coordinated charging of electric vehicles can alleviate the load fluctuation of power systems within a local area caused by uncoordinated charging of electric vehicles and greatly reduce the cost of power system operation. This will become an inevitable development trend of future energy system transformation.
  • 251
  • 20 Jul 2023
Topic Review
Application of Deep Learning in Cancer Diagnoses
The application of deep learning technology to realize cancer diagnosis based on medical images is one of the research hotspots in the field of artificial intelligence and computer vision. Deep learning has succeeded greatly in medical image-based cancer diagnosis. 
  • 186
  • 19 Jul 2023
Topic Review
Machine-Learning-Based Chemoinformatics
In modern drug discovery, the combination of chemoinformatics and quantitative structure–activity relationship (QSAR) modeling has emerged as a formidable alliance, enabling researchers to harness the vast potential of machine learning (ML) techniques for predictive molecular design and analysis.
  • 324
  • 18 Jul 2023
Topic Review
Six Stages to Choose Sampling Techniques
In order to answer the research questions, it is doubtful that researcher should be able to collect data from all cases. Thus, there is a need to select a sample. The entire set of cases from which researcher sample is drawn in called the population. Since, researchers neither have time nor the resources to analysis the entire population so they apply sampling technique to reduce the number of cases. There are six stages to choose sampling techniques.
  • 100.5K
  • 17 Jul 2023
Topic Review
Blockchain Interoperability
Blockchain Interoperability is defined according to the National Institute of Standards and Technology (NIST) as: “a composition of distinguishable blockchain systems, each representing a unique distributed data ledger, where atomic transaction execution may span multiple heterogeneous blockchain systems, and where data recorded in one blockchain are reachable, verifiable, and referable by another possibly foreign transaction in a semantically compatible manner”.
  • 583
  • 17 Jul 2023
Topic Review
Deep-Learning-Based Approach to Keystroke-Injection Payload Generation
USB-based keystroke-injection attacks involve manipulating USB devices to inject malicious keystrokes into the target system. These attacks exploit the trust of USB devices and can bypass traditional security measures if they are taken into account and adapted to the systems designed to prevent such attacks. By impersonating a keyboard or using programmable USB devices, attackers can execute unauthorized commands or gain unauthorized access to sensitive information mimicking legitimate user keystrokes. Different attack vectors, such as BadUSB and rogue device attacks, have drawn attention to the potential risks and ramifications involved in these types of attacks. However, the emergence of advanced attack methods necessitates the development of more sophisticated countermeasures. These attacks pose a significant security risk and highlight the importance of implementing strong defenses to mitigate the potential impact of such exploits, especially those that can bypass keystroke dynamics systems using rogue USB devices with implants.
  • 345
  • 17 Jul 2023
Topic Review
Methods for Enhancing Security of Precision Agriculture
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Many schemes have been developed to enhance security in the smart farm environment. 
  • 517
  • 17 Jul 2023
  • Page
  • of
  • 365
Video Production Service