Topic Review
Machine Learning and Fuzzy Logic in Electronics
Machine learning is a part of artificial intelligence science and works in close collaboration with data science. The main aim is the collected big data to be processed and studied in such a way to give meaningful knowledge when problems have to be solved or decisions have to be made. Fuzzy logic is another scientific field that is used for modeling, description and evaluation of objects and systems with different levels of complexity, which are characterized with uncertainty, fuzziness and vagueness of their parameters and properties. The application of machine learning and fuzzy logic in electronics is studied to outline the current research topics, scientific achievements and directions for future exploration.
  • 876
  • 07 Dec 2021
Topic Review
Integrated IoT-Fog-Cloud Systems
Integrated IoT-fog-cloud system (iIFC) offers the opportunity to create suitable platforms to develop and operate important smart city applications. These applications can utilize services provided by IoT devices, fog nodes, and cloud services.
  • 570
  • 07 Dec 2021
Topic Review
Analysis of Time Use Surveys Using CO-STATIS
The aim of this article was to study 23 time use activities measured in the two latest Colombian National Time Use Surveys, taken in 2013 (with 119,899 participants over the age of 10) and in 2017 (with a sample of 122,620 participants), to identify similarities and differences between the years of the survey by gender, age group, and socioeconomic level. The study’s results were obtained using the CO-STATIS multiway multivariate data analysis technique, which is comprised of two X-STATIS analyses and co-inertia analysis. The results confirm the existence of gender issues related to time use in Colombia, which are associated with gender stereotypes that link women to unpaid work and home care, especially in low socioeconomic levels, where women face limitations in terms of the time available to earn their own income. Additionally, differences were found by socioeconomic level, where Colombians of high socioeconomic status in all age groups are able to devote more time to leisure and recreational activities.
  • 572
  • 01 Dec 2021
Topic Review
LiFi Network
Light Fidelity (LiFi), a new technology that uses light to transmit data as a high-speed wireless connection system from a wide spectrum of domains.
  • 781
  • 01 Dec 2021
Topic Review
CyberGenomics
Cybersecurity (CS) field is a complex discipline with multiple layers. We deconstruct the CS specialist as a material (naturally/ genetically determined) and non-material (psychologically determined) entity. This entity is mapped to CS competences required to conduct everyday tasks where psychological factors are also present (e.g. stress). All the structural prerequisites for the development and functioning of the psyche are genetically coded and controlled. Behavior genetics addresses the interdisciplinary effort to establish causal links between genomic loci and human behavioral traits and neural mechanisms. Almost every human behavioral trait is a result of many genome variants in action altogether with environmental factors. Cybergenomics focuses on contextualizing the behavior genetics aspects in the application of cybersecurity.
  • 496
  • 30 Nov 2021
Topic Review
Deep Learning in Predicting Aging-Related Diseases
Aging refers to progressive physiological changes in a cell, an organ, or the whole body of an individual, over time. Aging-related diseases are highly prevalent and could impact an individual’s physical health. Recently, artificial intelligence (AI) methods have been used to predict aging-related diseases and issues, aiding clinical providers in decision-making based on patient’s medical records. Deep learning (DL), as one of the most recent generations of AI technologies, has embraced rapid progress in the early prediction and classification of aging-related issues.
  • 716
  • 29 Nov 2021
Topic Review
Applications of Deep Reinforcement Learning in Other Industries
Reinforcement Learning (RL) is an approach to simulate the human’s natural learning process, whose key is to let the agent learn by interacting with the stochastic environment. 
  • 813
  • 29 Nov 2021
Topic Review
Dragonfly Algorithm and Its Hybrids: A Survey
Optimization algorithms are essential for numerous optimization applications where usually certain parameters are minimized or maximized by considering an objective function. These algorithms include exact methods and heuristic algorithms such as swarm intelligence algorithms. Swarm intelligence is a discipline which makes use of a number of agents, thereby forming a population in which individuals interact among themselves and with their environment, to give rise to a global intelligent behavior. The Dragonfly Algorithm (DA) is a swarm intelligence algorithm that was proposed in 2016, and it is inspired by the behavior of dragonflies in nature. It has been found to have a higher performance than some of the most popular evolutionary algorithms, such as the genetic algorithm (GA), and swarm intelligence algorithms such as particle swarm optimization (PSO). Owing to its high effectiveness and efficiency, it has been utilized in multifarious applications and attempts to further improve its performance have been made and hence a number of hybrids of DA have been proposed.
  • 717
  • 25 Nov 2021
Topic Review
Resilience in the Cyberworld
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. 
  • 685
  • 25 Nov 2021
Topic Review
Misconfiguration in Firewalls and Network Access Controls
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control rules added to the firewall that will control network traffic. The three most common misconfigurations are shadowing, correlation and redundancy.
  • 721
  • 24 Nov 2021
  • Page
  • of
  • 371
Video Production Service