Topic Review
Yao's Millionaires' Problem
Yao's Millionaires' problem is a secure multi-party computation problem which was introduced in 1982 by computer scientist and computational theorist Andrew Yao. The problem discusses two millionaires, Alice and Bob, who are interested in knowing which of them is richer without revealing their actual wealth. This problem is analogous to a more general problem where there are two numbers [math]\displaystyle{ a }[/math] and [math]\displaystyle{ b }[/math] and the goal is to determine whether the inequality [math]\displaystyle{ a \geq b }[/math] is true or false without revealing the actual values of [math]\displaystyle{ a }[/math] and [math]\displaystyle{ b }[/math]. The Millionaires' Problem is an important problem in cryptography, the solution of which is used in e-commerce and data mining. Commercial applications sometimes have to compare numbers which are confidential and whose security is important. Many solutions have been introduced for the problem, among which the first solution, presented by Yao himself, was exponential in time and space.
  • 3.1K
  • 15 Nov 2022
Topic Review
β-Adrenergic Stimulation
β-adrenergic receptor stimulation (β-ARS) is a physiological mechanism that regulates cardiovascular function under stress conditions or physical exercise, producing a positive inotropic (enhanced contraction), lusitropic (faster relaxation), and chronotropic (increased heart rate) effect. 
  • 3.1K
  • 04 Aug 2021
Topic Review
Recognition Technologies of Hand Gesture
Hand gesture recognition plays a significant part in delivering diverse messages using hand gestures in the digital domain. Real-time hand gesture identification is now possible because of advancements in both imaging technology and image processing algorithmic frameworks.
  • 3.1K
  • 17 Jun 2022
Topic Review
Technologies for Big Data
Big data is growing so fast that current storage technologies and analytical tools are gradually feeling their inefficiencies not only to store and manage the valuable data but also to take full advantages of the opportunities and business insights that enormous data can offer. Since 2014, the concept of a data lake is increasingly becoming a popular solution among information leaders and big data-driven companies to deal with the challenges that brought about by big data. However, due to lacking of enough established best practices or related theories, some practitioners are still being kept outside the gate to a less risky implementation of a data lake. Besides, practitioners can hardly find any references which are free of bias, such as academic researches or reports, and are hardly able to support them with the reality of building a data lake at preset from an independent perspective.  
  • 3.1K
  • 06 Jun 2021
Topic Review
GNU C Library
The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library. Despite its name, it now also directly supports C++ (and, indirectly, other programming languages). It was started in the 1980s by the Free Software Foundation (FSF) for the GNU operating system. Released under the GNU Lesser General Public License, glibc is free software. The GNU C Library project provides the core libraries for the GNU system, as well as many systems that use Linux as the kernel. These libraries provide critical APIs including ISO C11, POSIX.1-2008, BSD, OS-specific APIs and more. These APIs include such foundational facilities as open, read, write, malloc, printf, getaddrinfo, dlopen, pthread create, crypt, login, exit and more.
  • 3.1K
  • 21 Nov 2022
Topic Review
2020 Nintendo Data Leak
The 2020 Nintendo data leak, more commonly referred to as the Nintendo Gigaleak is a series of leaks of data from Japanese video game company Nintendo on the anonymous imageboard website 4chan. The releasing of data started in March 2018, but became most prominent in 2020. Nine main sets of data leaked on 4chan, ranging from game and console source code to internal documentation and development tools. The name "Gigaleak" mainly refers to the second leak on July 24, 2020, which was 3 gigabytes in size. The leaks are believed to have come either from companies contracted by Nintendo in the design of these consoles, or from individuals previously convicted of intrusion into Nintendo systems. An earlier, much smaller leak had also occurred in 2018 which had the Nintendo Space World 1997 demos for Pokémon Gold and Silver leaked. The leaks are infamous for the sheer size and the amount of internal material leaked; video game journalists have described the magnitude of the leaks as unprecedented, and suggested that they might have significant effects for emulation and to preservationists, in addition to the legal questions posed by the leak. As of May 2021, Nintendo has not made any official response.
  • 3.0K
  • 14 Oct 2022
Topic Review
Distributed Machine Learning in Edge Computing
Distributed edge intelligence is a disruptive research area that enables the execution of machine learning and deep learning (ML/DL) algorithms close to where data are generated. Since edge devices are more limited and heterogeneous than typical cloud devices, many hindrances have to be overcome to fully extract the potential benefits of such an approach (such as data-in-motion analytics).
  • 3.0K
  • 20 Apr 2022
Topic Review
Intelligent Road Defects Detection Technology
Road defects are important factors affecting traffic safety. In order to improve the identification efficiency of road diseases and the pertinence of maintenance and management, intelligent detection technologies of road diseases have been developed. The problems of high cost and low efficiency of artificial inspection of road diseases are solved efficiently, and the quality of road construction is improved availably. This is not only the guarantee of highway quality but also the guarantee of people’s lives and safety.
  • 3.0K
  • 15 Jun 2022
Topic Review
Social Robots in Special Education
In recent years, social robots have become part of a variety of human activities, especially in applications involving children, e.g., entertainment, education, companionship. The interest of this work lies in the interaction of social robots with children in the field of special education. 
  • 3.0K
  • 23 Jun 2021
Topic Review
Blockchain Private Key Generation and Recovery
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application. The blockchain wallet manages user’s digital assets and authenticates a blockchain user by checking the possession of a user’s private key. Mnemonic codes are the most commonly used technique to generate and recover a private key in the blockchain wallet. Various studies have been conducted to improve the private key generation and recovery process.
  • 3.0K
  • 04 Jul 2022
  • Page
  • of
  • 371
Video Production Service