Topic Review
Efficient Task Offloading in Multi-User Edge Computing
Task offloading is one of the most important issues in edge computing and has attracted continuous research attention in recent years. With task offloading, end devices can offload the entire task or only subtasks to the edge servers to meet the delay and energy requirements.
  • 849
  • 05 Aug 2022
Topic Review
Internet of Things and Blockchain Integration
The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation.
  • 541
  • 05 Aug 2022
Topic Review
Human Detection in Heavy Smoke Scenarios
The most dangerous factor in a fire scene is smoke and heat, especially smoke. How to locate people and guide them out of a heavy smoke environment will be the key to surviving an evacuation process. A variety of instruments have been studied that can be used in fire and smoky situations, including visible camera, kinetic depth sensor, LIDAR, night vision, IR camera, radar, and sonar.
  • 1.4K
  • 04 Aug 2022
Topic Review
Human-Robot Interaction
As in human–human interaction, several modalities can be used at once in human-robot interaction in social contexts. Vision, eye gaze, verbal dialogue, touch, and gestures are examples of modalities that can be used herein. In a social context, the intelligence that a robot display depends on the modalities it uses and each modality can have specific importance and effect on the human side of the interaction which translates into the degree of trust that the robot has. Moreover, the acceptance of robots in social interaction depends on their ability to express emotions and they require a proper design of emotional expressions to improve their likability and believability as multimodal interaction can enhance the engagement
  • 687
  • 04 Aug 2022
Topic Review
Human Activity Recognition Methods
Human activity recognition (HAR) can effectively improve the safety of the elderly at home. Many researchers have studied HAR from different aspects, such as sensors and algorithms. HAR methods can be divided into three categories based on the types of sensors: wearable devices, cameras, and millimeter-wave radars.
  • 1.2K
  • 04 Aug 2022
Topic Review
Rate-Distortion-Based Steganography Via Generative Adversarial Network
Information hiding can imperceptibly transfer secret information into chosen cover media. It can ensure the origins of data and behave as a second channel for data transmission. Steganography is the art of covering or hiding extra data inside a chosen cover message, e.g., an image. The term itself dates back to the 15th century; in a typical scenario, the sender hides a secret message inside a cover image and transmits it to the receiver, who recovers the message. Even if eavesdroppers monitor or intercept the communication in-between, no one besides the sender and receiver should detect the presence of the hidden message.
  • 317
  • 04 Aug 2022
Topic Review
The Internet of Things in Poland
One definition of the Internet of Things refers to devices that can be directly connected to the internet or other devices using wireless networks or, less frequently, cables. This definition of the IoT includes contemporary telephones, cameras, movement sensors, weather stations, even dishwashers, vehicles, industrial machinery, and daily outfits. Almost any object can get connected to the internet even if it was not manufactured as intended for the IOT, because in the majority of cases its functionality can be extended. The IOT has been growing dynamically, offering smart technological solutions. IoT-based applications are client-server operable which requires a specific communication protocol that can be used to determine a client-server communication model, allowing all clients to perform specific tasks thanks to communications via the internet. Poland’s rural areas that are diversified in terms of economic development are poorly equipped with basic infrastructure, which is a barrier to the functioning of people with limited mobility. 
  • 635
  • 03 Aug 2022
Topic Review
Drone Cyber Attack Detection through Machine Learning
A smart city comprises a number of integrated components that enable its functioning and rendering of automated services to its citizens. Data generated by smart city components is facilitated for transmission across the ICT network to the next hop devices of the communication network topology. Data collection on a large scale is referred to as data volume. Analytics of collected data is contingent on the level of urgency and the computational capabilities of the controllers, edge devices and the geographic proximity of these to the central cloud platform. For instance, IoT data obtained from curb-side sensors will have to be communicated to the next hop edge device, whereupon further data processing can take place in the cloud. Data volume at a large scale is constantly communicated from resource-constrained devices, including drones, to a central cloud, for processing and subsequent decision making. Artificial Intelligence (AI) plays a significant role in accurate decision making from collected data in a smart city platform.
  • 1.2K
  • 02 Aug 2022
Topic Review
Enhanced Perception for Autonomous Driving Using Semantic-Geometric Fusion
Environment perception remains one of the key tasks in autonomous driving for which solutions have yet to reach maturity. Multi-modal approaches benefit from the complementary physical properties specific to each sensor technology used, boosting overall performance. The presented 360∘ enhanced perception component is based on low-level fusion between geometry provided by the LiDAR-based 3D point clouds and semantic scene information obtained from multiple RGB cameras, of multiple types. This multi-modal, multi-sensor scheme enables better range coverage, improved detection and classification quality with increased robustness. Semantic, instance and panoptic segmentations of 2D data are computed using efficient deep-learning-based algorithms, while 3D point clouds are segmented using a fast, traditional voxel-based solution. 
  • 468
  • 01 Aug 2022
Topic Review
Machine Learning Techniques in Cybersecurity
Machine learning is of rising importance in cybersecurity. The primary objective of applying machine learning in cybersecurity is to make the process of malware detection more actionable, scalable and effective than traditional approaches, which require human intervention. The cybersecurity domain involves machine learning challenges that require efficient methodical and theoretical handling. Several machine learning and statistical methods, such as deep learning, support vector machines and Bayesian classification, among others, have proven effective in mitigating cyber-attacks. The detection of hidden trends and insights from network data and building of a corresponding data-driven machine learning model to prevent these attacks is vital to design intelligent security systems.
  • 5.8K
  • 01 Aug 2022
  • Page
  • of
  • 371
Video Production Service