Topic Review
Ransomware Detection, Avoidance, and Mitigation Scheme
Ransomware attacks have emerged as a major cyber-security threat wherein user data is encrypted upon system infection. Latest Ransomware strands using advanced obfuscation techniques along with offline C2 Server capabilities are hitting Individual users and big corporations alike. This problem has caused business disruption and, of course, financial loss. 
  • 964
  • 13 Jan 2022
Topic Review
Hand Pose Recognition Using Parallel Multi Stream CNN
Recently, several computer applications provided operating mode through pointing fingers, waving hands, and with body movement instead of a mouse, keyboard, audio, or touch input such as sign language recognition, robot control, games, appliances control, and smart surveillance. With the increase of hand-pose-based applications, new challenges in this domain have also emerged. Support vector machines and neural networks have been extensively used in this domain using conventional RGB data, which are not very effective for adequate performance.
  • 491
  • 12 Jan 2022
Topic Review
Security and Privacy in Cloud Computing
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist.
  • 7.2K
  • 11 Jan 2022
Topic Review
Transformation of Business Process Manager Profession
The increasing role of emerging technologies, such as big data, the Internet of Things, artificial intelligence (AI), cognitive technologies, cloud computing, and mobile technologies, is essential to the business process manager profession’s sustainable development.  Nevertheless, these technologies could involve new challenges in labor markets.
  • 518
  • 11 Jan 2022
Topic Review
Augmented Reality Mobile App to Learn Writing
Augmented reality (AR) has been widely used in education, particularly for child education. This entry presents the design and implementation of a novel mobile app, Learn2Write, using machine learning techniques and augmented reality to teach alphabet writing.
  • 812
  • 10 Jan 2022
Topic Review
Automatic Identification of Addresses
Address matching continues to play a central role at various levels, through geocoding and data integration from different sources, with a view to promote activities such as urban planning, location-based services, and the construction of databases like those used in census operations. Closely associated to address matching is the task of address parsing or address segmentation, which consists of decomposing an address into its different components, such as a street name or a postal code. However, these tasks continue to face several challenges, such as non-standard or incomplete address records or addresses written in more complex languages.
  • 569
  • 10 Jan 2022
Topic Review
Public Perceptions around mHealth Applications
This study aimed to use Twitter to understand public perceptions around the use of six Saudi mHealth apps used during the COVID-19 pandemic: “Sehha”, “Mawid”, “Sehhaty”, “Tetamman”, “Tawakkalna”, and “Tabaud”. The specific objectives of this study are: (1) to examine the difference in communication network structure across the networks generated among the six mHealth apps included in our study; (2) to analyze the sentiment surrounding the six mHealth apps conversations; and (3) to evaluate the performance of a sentiment classifier using machine learning approaches.
  • 460
  • 10 Jan 2022
Topic Review
Pedestrian Identification and Classification in Autonomous Vehicles
Pedestrian detection is at the core of autonomous road vehicle navigation systems as they allow a vehicle to understand where potential hazards lie in the surrounding area and enable it to act in such a way that avoids traffic-accidents, which may result in individuals being harmed. This paper demonstrates that the use of image augmentation on training data can yield varying results. 
  • 533
  • 10 Jan 2022
Topic Review
Sustainable Ship Management Post COVID-19
COVID-19 is spreading out in the world now. Passenger ships such as cruise ships are very critical in this situation. Boats’ hazardous areas need to be identified in advance and managed carefully to prevent the virus. Three technologies are required to support the sustainable management of ships in the post-COVID-19 era. They are ship indoor positioning, close contact identification, and risk area calculation. Ship environment-aware indoor positioning algorithms are proposed for the first time for the moving ship environment, followed by a clustering algorithm for close contact identification. Then, the risk area is calculated using the convex hull algorithm. Finally, a sustainable management approach for ships post COVID-19 is proposed.
  • 351
  • 10 Jan 2022
Topic Review
Smart Grid Management, Control, and Operation
Smart grid management, control and operation (SGMCO) are key tasks for maintaining their proper functioning as well as for their extension and expansion. The current challenges of power generation, distribution, transmission, and consumption, as well as growing energy demand, facilitate the integration of a large number of smart grids with renewable energy generators and physical information systems, while smart grids are moving toward distribution and decentralization in response to the evolving application of the Internet of Energy (IoE). SGMCO handles not only traditional management, control, and operations, but also the future challenges for smart grids: Collaboration between stakeholders, control of network imbalances (e.g. frequency and voltage regulation), data analysis and management, decentralized network management and operation, and security and privacy.
  • 4.5K
  • 10 Jan 2022
  • Page
  • of
  • 371
Video Production Service