Topic Review
Efficiency of Industrial Based on Network DEA Method
There are two main methods to study the efficiency of industrial sectors. The first is parametric method represented by stochastic frontier method (SFA). The other is the more widely used non-parametric method represented by data envelopment analysis (DEA), which makes up for the shortcomings of the SFA method. It does not need to specify a certain functional relationship between input and output. The operation process of the Chinese provincial industrial system consists of four stages, namely the production (P) stage, wastewater treatment (WWT) stage, solid waste treatment (SWT) stage, and sulfur dioxide treatment (SDT) stage. Based on this structure, a four-stage data envelopment analysis (DEA) model is developed to evaluate the eco-efficiency, production efficiency, wastewater treatment efficiency, solid waste treatment efficiency, and sulfur dioxide treatment efficiency of provincial industrial systems in China, considering the undesirable output and variable returns to scale (VRS). 
  • 832
  • 24 May 2022
Topic Review
AI Enabling Technologies in Physical Layer Security
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS design and optimization that are based on artificial intelligence (AI) and machine learning (ML) have been corroborated to outperform traditional security technologies. This will allow future 5G networks to be more intelligent and robust in order to significantly improve the performance of system design over traditional security methods.
  • 660
  • 23 May 2022
Topic Review
Target Detection and Recognition in Turbid Waters
Turbid water can be divided into shallow turbid water and two kinds of deep turbid water. Shallow turbid water, such as turbid fish farms, has a significant impact on the transmission of light information due to the high density of aquatic organisms and suspended matters, such as fishes and sediments, in the water. This leads to significant image distortion, such as blurred target features, severe distortion, and color changes, which pose a significant challenge regarding visual technology and target recognition. Deep turbid water, such as some deep water areas, is challenged by the same problems as shallow turbid water and has low light conditions, resulting in the instrument receiving limited effective target light information. Due to these factors, traditional target detection and recognition methods cannot meet instruments’ technical requirements. Therefore, the investigation of object detection and recognition in turbid areas is necessary. Currently, research on underwater vision is mainly focusing on scenarios with good water conditions, such as experimental pools, lakes, inland rivers, etc. Due to the complexity of underwater environments, significant differences between various types of water exist. As large-scale engineering operations are often carried out at sea, most research methods do not contain adequate robustness to overcome the significant difficulties encountered in practical engineering applications.
  • 613
  • 23 May 2022
Topic Review
Deepfake Attacks and Electrical Network Frequency Fingerprints Approach
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend on reliable, secure, and real-time audio and/or video streams (AVSs), which consequently become a target for attackers. While modern Artificial Intelligence (AI) technology is integrated with many multimedia applications to help enhance its applications, the development of General Adversarial Networks (GANs) also leads to deepfake attacks that enable manipulation of audio or video streams to mimic any targeted person. Deepfake attacks are highly disturbing and can mislead the public, raising further challenges in policy, technology, social, and legal aspects. As a primary cause of misinformation, an imminent need for fast and reliable authentication techniques is of a high priority.
  • 919
  • 23 May 2022
Topic Review
RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats.
  • 532
  • 23 May 2022
Topic Review
Blockchain-Based Peer-to-Peer Energy Marketplace
Blockchain technology is used as a distributed ledger to store and secure data and perform transactions between entities in smart grids. The use of a permissioned blockchain network has multiple benefits as it reduces transaction costs and enables micro-transactions. Moreover, an improvement in security is obtained, eliminating the single point of failure in the control and management of the platform along with creating the possibility to trace back the actions of the participants and a mechanism of identification.
  • 601
  • 23 May 2022
Topic Review
Knee Injury Detection Using Deep Learning
Knee injuries account for the largest percentage of sport-related, severe injuries (i.e., injuries that cause more than 21 days of missed sport participation). The improved treatment of knee injuries critically relies on having an accurate and cost-effective detection. Deep-learning-based approaches have monopolized knee injury detection in MRI studies.
  • 783
  • 20 May 2022
Topic Review
Robot Programming Skill Assessment
Robot programming skill classes are becoming more popular. Higher order thinking, on the other hand, is an important issue in developing the skills of 21st-century learners. Truth be told, those two abilities are consistent subjects that are trending in academics.
  • 340
  • 19 May 2022
Topic Review
Traditional Computer-Vision Methods Implemented in Sports
Automatic analysis of video in sports is a possible solution to the demands of fans and professionals for various kinds of information. Analyzing videos in sports has provided a wide range of applications, which include player positions, extraction of the ball’s trajectory, content extraction, and indexing, summarization, detection of highlights, on-demand 3D reconstruction, animations, generation of virtual view, editorial content creation, virtual content insertion, visualization and enhancement of content, gameplay analysis and evaluations, identifying player’s actions, referee decisions and other fundamental elements required for the analysis of a game. Recent developments in video analysis of sports have a focus on the features of computer vision techniques, which are used to perform certain operations for which these are assigned, such as detailed complex analysis such as detection and classification of each player based on their team in every frame or by recognizing the jersey number to classify players based on their team will help to classify various events where the player is involved. In higher-level analysis, such as tracking the player or ball, many more such evaluations are to be considered for the evaluation of a player’s skills, detecting the team’s strategies, events and the formation of tactical positions such as midfield analysis in various sports such as soccer, basketball, and also various sports vision applications such as smart assistants, virtual umpires, assistance coaches. A higher-level semantic interpretation is an effective substitute, especially in situations when reduced human intervention and real-time analysis are desired for the exploitation of the delivered system outputs.
  • 518
  • 19 May 2022
Topic Review
Routing Protocol for Low Power and Lossy Network
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN.
  • 4.0K
  • 19 May 2022
  • Page
  • of
  • 371
Video Production Service