Topic Review
Triangle Center
In geometry, a triangle center (or triangle centre) is a point in the plane that is in some sense a center of a triangle akin to the centers of squares and circles, that is, a point that is in the middle of the figure by some measure. For example the centroid, circumcenter, incenter and orthocenter were familiar to the ancient Greeks, and can be obtained by simple constructions. Each of these classical centers has the property that it is invariant (more precisely equivariant) under similarity transformations. In other words, for any triangle and any similarity transformation (such as a rotation, reflection, dilation, or translation), the center of the transformed triangle is the same point as the transformed center of the original triangle. This invariance is the defining property of a triangle center. It rules out other well-known points such as the Brocard points which are not invariant under reflection and so fail to qualify as triangle centers. All centers of an equilateral triangle coincide at its centroid, but they generally differ from each other on scalene triangles. The definitions and properties of thousands of triangle centers have been collected in the Encyclopedia of Triangle Centers.
  • 1.2K
  • 31 Oct 2022
Topic Review
Trends in Malware Detection
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and anti-malware products exist for the detection of malware and cyberattacks utilizing IOCs, but all have several shortcomings. In the quest to fight zero-day attacks, the research paradigm shifted from primitive methods to classical machine learning-based methods, then to deep learning-based methods.
  • 624
  • 20 Oct 2022
Topic Review
Transporting Blood Using Unmanned Aerial Vehicles
Unmanned Aerial Vehicles (UAVs) play crucial roles in numerous applications, such as healthcare services. For example, UAVs can help in disaster relief and rescue missions, such as by delivering blood samples and medical supplies.
  • 454
  • 21 Nov 2022
Topic Review
Transport Layer Security Security
This article discusses the security of the Transport Layer Security (TLS) internet protocol.
  • 709
  • 27 Oct 2022
Topic Review
Transmission Dynamics of COVID-19
COVID-19 is pneumonia caused by a novel coronavirus which is an emerging infectious disease, and outbreaks in more than 200 countries around the world. Consequently, the spread principles and prevention and control measures of COVID-19 have become a global problem to be solved. Here, we pose a series of dynamical models to reveal the transmission mechanisms of COVID-19. Based on these mathematical models, data fitting and spread trend of COVID-19 are explored to show the propagation law between human populations. We hope that our work may provide some useful insights for effective control of the COVID-19.
  • 4.9K
  • 28 Oct 2020
Topic Review
Transient Execution CPU Vulnerability
Transient execution CPU vulnerabilities are vulnerabilities in a computer system in which a speculative execution optimization implemented in a microprocessor is exploited to leak secret data to an unauthorized party. The classic example is Spectre that gave its name to this kind of side-channel attack, but since January 2018 many different vulnerabilities have been identified.
  • 1.6K
  • 14 Nov 2022
Topic Review
Transformers in Natural Language Processing Applications
The field of Natural Language Processing (NLP) has undergone a significant transformation with the introduction of Transformers. From the first introduction of this technology in 2017, the use of transformers has become widespread and has had a profound impact on the field of NLP.
  • 556
  • 24 May 2023
Topic Review
Transformers for Computer Vision
Vision transformers (ViTs) are designed for tasks related to vision, including image recognition. Originally, transformers were used to process natural language (NLP). As a special type of transformer, vision transformers (ViTs) can be used for various computer vision (CV) applications.
  • 612
  • 09 May 2023
Topic Review
Transformer-Based Visual Object Tracking
With the rise of general models, transformers have been adopted in visual object tracking algorithms as feature fusion networks. In these trackers, self-attention is used for global feature enhancement. Cross-attention is applied to fuse the features of the template and the search regions to capture the global information of the object. However, studies have found that the feature information fused by cross-attention does not pay enough attention to the object region. In order to enhance cross-attention for the object region, an enhanced cross-attention (ECA) module is proposed for global feature enhancement.
  • 185
  • 08 Dec 2023
Topic Review
Transformer-Based Model for Predicting Customers’ NPD in e-Commerce
Transformers offer advantages in capturing long-term dependencies within time series data through self-attention mechanisms. This adaptability to various time series patterns, including trends, seasonality, and irregularities, makes them a promising choice for next purchase day (NPD) prediction. The transformer model demonstrates improvements in prediction accuracy compared to the baselines. 
  • 240
  • 02 Nov 2023
  • Page
  • of
  • 371
Video Production Service