Topic Review
Interface Design Patterns for In-Vehicle Infotainment Systems
An in-vehicle infotainment system, or IVIS, corresponds to the set of components used to provide information and entertainment to the driver and other passengers in the vehicle, through interfaces supported with audio and video, control elements such as touch screens, central panels with buttons, voice commands, among others. These kind of IVISs bring with them a world full of interaction opportunities for both the driver and other passengers to complete driving-related tasks and other secondary activities mostly related to entertainment that complement the in-vehicle experience. However, the increase in the number of components provided by this type of system, and even the design under which these elements are distributed, can cause the user–vehicle interaction to increase the complexity of the experience, and therefore, it could make it difficult to carry out secondary tasks and, in a worse scenario, affect safety while driving.
  • 811
  • 22 Jul 2022
Topic Review
Unmanned Aerial Vehicles and Federated Learning
Unmanned aerial vehicles (UAVs) have gained increasing attention in boosting the performance of conventional networks due to their small size, high efficiency, low cost, and autonomously nature. The amalgamation of UAVs with both distributed/collaborative Deep Learning (DL) algorithms, such as Federated Learning (FL), and Blockchain technology have ushered in a new paradigm of Secure Multi-Access Edge Computing (S-MEC). Indeed, FL enables UAV devices to leverage their sensed data to build local DL models. The latter are then sent to a central node, e.g., S-MEC node, for aggregation, in order to generate a global DL model. Therefore, FL enables UAV devices to collaborate during several FL rounds in generating a learning model, while avoiding to share their local data, and thus ensuring UAVs’ privacy.
  • 825
  • 22 Jul 2022
Topic Review
Balanced Learning for Road Crack Segmentation
Road crack segmentation based on high-resolution images is an important task in road service maintenance. The undamaged road surface area is much larger than the damaged area on a highway. This imbalanced situation yields poor road crack segmentation performance for convolutional neural networks.
  • 537
  • 22 Jul 2022
Topic Review
Application of Natural Language Processing in Stock Forecasting
The invention of Natural Language Processing (NLP) has provided a solution to develop computational models that enable the machine to understand human languages and automatically solve practical problems. Therefore, the application of NLP is becoming an important tool to reveal the investor behavioral information to explain the market variability and improve the stock prediction performance.
  • 1.1K
  • 21 Jul 2022
Topic Review
Methods for Crowd Counting
The crowd counting task has become a pillar for crowd control as it provides information concerning the number of people in a scene. It is helpful in many scenarios such as video surveillance, public safety, and future event planning. To solve such tasks, researchers have proposed different solutions. In the beginning, researchers went with more traditional solutions, then the focus is on deep learning methods and, more specifically, on Convolutional Neural Networks (CNNs), because of their efficiency. 
  • 1.5K
  • 21 Jul 2022
Topic Review
Distributed Edge Computing in IoT-Based Smart Cities
Smart cities using the Internet of Things (IoT) can operate various IoT systems with better services that provide intelligent and efficient solutions for various aspects of urban life. With the rapidly growing number of IoT systems, the many smart city services, and their various quality of service (QoS) constraints, servers face the challenge of allocating limited resources across all Internet-based applications to achieve an efficient per-formance. The presence of a cloud in the IoT system of a smart city results in high energy con-sumption and delays in the network. Edge computing is based on a cloud computing framework where computation, storage, and network resources are moved close to the data source. The IoT framework is identical to cloud computing. The critical issue in edge computing when executing tasks generated by IoT systems is the efficient use of energy while maintaining delay limitations.
  • 1.1K
  • 21 Jul 2022
Topic Review
Blockchain–Cloud Integration
Blockchain is a new and emergent technology that is expected to change the way current markets work. It is a distributed digital ledger and is decentralized. With the current working capacity of blockchain, it has the potential to be the operating system of smart cities. Blockchain is technology that is open source and distributed and is used to record transactions between parties. It provides a way to develop a system that is both verifiable and secured. Blockchain is open source, so different versions of blockchain are available on the market. Each version is developed depending upon the different needs of the various industries. Blockchain is neither owned nor singly controlled by any one authority. Blockchain technology is evolving at a swift pace. It started with Bitcoin, and now there are many types of blockchain. Organizations are developing different versions of blockchain depending upon their need and benefits.
  • 525
  • 21 Jul 2022
Topic Review
Cybersecurity Frameworks and Information Security Standards
Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of protecting sensitive data from damage or theft. To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes. Cybersecurity standards demonstrate whether an information system can meet security requirements through a range of best practices and procedures. A range of standards has been established by various organizations to be employed in information systems of different sizes and types. 
  • 2.0K
  • 21 Jul 2022
Topic Review
Wireless Sensor Network
Wireless Sensor Network (WSN) is one of the most effective methods for many real-time applications, due to its compactness, cost-effectiveness, and ease of deployment. The function of the WSN is to monitor the field of interest, collect the data, and transmit it to the base station (Access point) for post-processing analysis.
  • 2.5K
  • 21 Jul 2022
Topic Review
Deepfake Detection
Deepfakes can compromise the privacy and societal security of both individuals and governments. In addition, deepfakes are a threat to national security, and democracies are progressively being harmed. To overcome/mitigate the impact of deepfakes, different methods and approaches have been introduced that can identify deepfakes and appropriate corrective actions can be taken. 
  • 829
  • 20 Jul 2022
  • Page
  • of
  • 371
Video Production Service