Topic Review
A Tangible VR-Based Interactive System for Intergenerational Learning
The recent years have witnessed striking global demographic shifts. Retired elderly people often stay home, seldom communicate with their grandchildren, and fail to acquire new knowledge or pass on their experiences.  Digital technologies based on virtual reality (VR) with tangible user interfaces (TUIs) were introduced into the design of a novel interactive system for intergenerational learning, aimed at promoting the elderly people’s interactions with younger generations.
  • 398
  • 31 May 2022
Topic Review
Network Function Virtualization
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen.
  • 783
  • 30 May 2022
Topic Review
Customer Churn
Customer churn is a problem virtually all companies face, and the ability to predict it reliably can be a cornerstone for successful retention campaigns. 
  • 432
  • 30 May 2022
Topic Review
Models for Evaluation Intrusion Detection Systems in IoT
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. 
  • 914
  • 27 May 2022
Topic Review
Smart Mobile Learning During the COVID-19 Pandemic
Universities throughout the world are attempting to develop electronic learning (e-learning) and mobile learning (M-learning) systems in order to merge these educational systems with the traditional ones currently used. E-learning and M-learning systems have become critical in order to accomplish learning objectives in a successful way during the COVID-19 pandemic. It is critical for universities to take full advantage of e-learning in order to remain competitive in the globalised 21st century. The recent revolution in information and communication technology (ICT) has resulted in a move away from face-to-face learning, toward e-learning. During the COVID-19 pandemic, this technology has helped universities on a global scale to ensure the continuity of learning processes. It has also altered how students communicate and interact with instructors. This technological advancement has transformed the learning process through the use of e-learning systems and M-learning applications to achieve sustainable education.
  • 834
  • 27 May 2022
Topic Review
Federated Learning Algorithms for IoT
Federated Learning (FL) is a state-of-the-art technique used to build machine learning (ML) models based on distributed data sets. It enables In-Edge AI, preserves data locality, protects user data, and allows ownership. These characteristics of FL make it a suitable choice for IoT networks due to its intrinsic distributed infrastructure. However, FL presents a few unique challenges; the most noteworthy is training over largely heterogeneous data samples on IoT devices. The heterogeneity of devices and models in the complex IoT networks greatly influences the FL training process and makes traditional FL unsuitable to be directly deployed, while many recent research works claim to mitigate the negative impact of heterogeneity in FL networks, unfortunately, the effectiveness of these proposed solutions has never been studied and quantified.
  • 476
  • 27 May 2022
Topic Review
Ion-Movement-Based Synaptic Device for Brain-Inspired Computing
As the amount of data has grown exponentially with the advent of artificial intelligence and the Internet of Things, computing systems with high energy efficiency, high scalability, and high processing speed are urgently required. Unlike traditional digital computing, which suffers from the von Neumann bottleneck, brain-inspired computing can provide efficient, parallel, and low-power computation based on analog changes in synaptic connections between neurons. Synapse nodes in brain-inspired computing have been typically implemented with dozens of silicon transistors, which is an energy-intensive and non-scalable approach. Ion-movement-based synaptic devices for brain-inspired computing have attracted increasing attention for mimicking the performance of the biological synapse in the human brain due to their low area and low energy costs.
  • 502
  • 27 May 2022
Topic Review
Central Bank Digital Currency
Due to the growth of the internet and communication technologies, electronic financial systems are becoming popular. Physical cash is losing its preeminence, and digital numbers on computers represent money. However, electronic financial systems, mostly operated by private entities, have defects to be compensated for, such as high charges for using the system, security issues, and the problem of exclusion. As a solution, many countries around the world are considering central bank digital currency. For central bank digital currency to be utilized as a national legal tender, it must be universal and accessible regardless of time and place, similar to physical cash. Therefore, offline payment functions that extend the accessibility of central bank digital currency are becoming attractive.
  • 697
  • 26 May 2022
Topic Review
Commercial Targeted Libraries in Drug Design
After the identification of a biological target (enzyme, receptor, protein and so on), the focus of the early phase of drug discovery rests on the identification of leads or compounds that exhibit pharmacological activity against this specific target. Compounds of interest are most often discovered in pre-existing libraries of compounds that can be either virtual or physical. Computer-aided methods which have become increasingly important over the years in drug development utilize virtual compound libraries. While physical compound libraries reach the number of millions of molecules, virtual compound libraries created by large pharmaceutical companies can range from 107 to 1018 molecules. Investigations of these libraries identifies specific molecules, synthetic pathways and focus on a specific chemical space. Targeted libraries are often smaller and are focused towards a specific chemical space. They are created by using relevant biological information with the aim to decrease the processing time associated with larger libraries while maintaining the most relevant chemical space where lead compounds can be found. Due to the fact that they required less computational or wet-lab labor to process they have become very popular with smaller laboratories which try to compete in the drug-development sector. Many modern vendors of compounds today offer such libraries, but the quality of the procedure used to define desired chemical space and select compounds is questionable.
  • 1.2K
  • 25 May 2022
Topic Review
Quantum Stream Cipher
Quantum cryptography includes quantum key distribution (QKD) and quantum stream cipher, but the researchers point out that the latter is expected as the core technology of next-generation communication systems. Various ideas have been proposed for QKD quantum cryptography, but most of them use a single-photon or similar signal. Then, although such technologies are applicable to special situations, these methods still have several difficulties to provide functions that surpass conventional technologies for social systems in the real environment. Thus, the quantum stream cipher has come to be expected as one promising countermeasure, which artificially creates quantum properties using special modulation techniques based on the macroscopic coherent state. In addition, it has the possibility to provide superior security performance than one-time pad cipher.
  • 953
  • 25 May 2022
  • Page
  • of
  • 371
Video Production Service