Topic Review
Mo Siang Online
Mo Siang Online is an MMORPG based on the warring states of ancient China . The game is mainly focused on Martial Arts and Kung Fu, allowing each character to choose 6 fighting styles. At present, Mo Siang only has five English servers and eight Chinese servers with their own language interface.The Korean game developer once released its global server and renamed this game as Titan, but this game used to be called as Dark Story in Korea with its Korean server. In Japan, Mo Siang is called Feats of Arms. After the agent in Japan is replaced, this game is renamed as Crest of Jade. The Japanese game distributor run its Beta on 19th Feb. 2009. From August 2009 on, there is another English version of Mo Siang released, the game agent PlayOMG renames this game as Azuga, Age of Chaos. On the contrary, from September 2009 on, the Japanese game agent of Mo Siang decides to close their server.
  • 1.9K
  • 22 Nov 2022
Topic Review
Outlier Detection
Outlier detection is a statistical procedure that aims to find suspicious events or items that are different from the normal form of a dataset. It has drawn considerable interest in the field of data mining and machine learning. Outlier detection is important in many applications, including fraud detection in credit card transactions and network intrusion detection. There are two general types of outlier detection: global and local. Global outliers fall outside the normal range for an entire dataset, whereas local outliers may fall within the normal range for the entire dataset, but outside the normal range for the surrounding data points. 
  • 1.9K
  • 07 Feb 2021
Topic Review
Deep Learning in Deconvolution Problem
In modern digital microscopy, deconvolution methods are widely used to eliminate a number of image defects and increase resolution.
  • 1.9K
  • 24 Dec 2021
Topic Review
DEFLATE
In computing, Deflate is a lossless data compression file format that uses a combination of LZSS and Huffman coding. It was designed by Phil Katz, for version 2 of his PKZIP archiving tool. Deflate was later specified in RFC 1951 (1996). Katz also designed the original algorithm used to construct Deflate streams. This algorithm was patented as U.S. Patent 5,051,745, and assigned to PKWARE, Inc. As stated in the RFC document, an algorithm producing Deflate files was widely thought to be implementable in a manner not covered by patents. This led to its widespread use, for example in gzip compressed files and PNG image files, in addition to the ZIP file format for which Katz originally designed it. The patent has since expired.
  • 1.9K
  • 11 Oct 2022
Topic Review
Industrial IoT for Mining Industry
The Industrial Internet of Things (IIoT) has the potential to improve the production and business processes by enabling the extraction of valuable information from industrial processes. The mining industry, however, is rather traditional and somewhat slow to change due to infrastructural limitations in communication, data management, storage, and exchange of information. Most research efforts so far on applying IIoT in the mining industry focus on specific concerns such as ventilation monitoring, accident analysis, fleet and personnel management, tailing dam monitoring, and pre-alarm system while an overall IIoT architecture suitable for the general conditions in the mining industry is still missing.
  • 1.9K
  • 16 Jun 2021
Topic Review
Handwritten Character Recognition in Handwritten Character Recognition
Neural networks have made big strides in image classification. Convolutional neural networks (CNN) work successfully to run neural networks on direct images. Handwritten character recognition (HCR) is now a very powerful tool to detect traffic signals, translate language, and extract information from documents, etc. Although handwritten character recognition technology is in use in the industry, present accuracy is not outstanding, which compromises both performance and usability.
  • 1.9K
  • 13 May 2022
Topic Review
Cybersecurity Frameworks and Information Security Standards
Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of protecting sensitive data from damage or theft. To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes. Cybersecurity standards demonstrate whether an information system can meet security requirements through a range of best practices and procedures. A range of standards has been established by various organizations to be employed in information systems of different sizes and types. 
  • 1.9K
  • 21 Jul 2022
Topic Review
Cloud-Fog-Edge Computing for Smart Agriculture
Cloud Computing is a well-established paradigm for building service-centric systems. However, ultra-low latency, high bandwidth, security, and real-time analytics are limitations in Cloud Computing when analysing and providing results for a large amount of data. Fog and Edge Computing offer solutions to the limitations of Cloud Computing. The number of agricultural domain applications that use the combination of Cloud, Fog, and Edge is increasing in the last few decades.
  • 1.9K
  • 08 Oct 2021
Topic Review
Privacy Concerns with Facebook
Meta Platforms Inc., or Meta for short, (formerly known as Facebook) has faced a number of privacy concerns. These stem partly from the company’s revenue model that involves selling information collected about its users for many things including advertisement targeting. Meta Platforms Inc. has also been a part of many data breaches that have occurred within the company. These issues and others are further described including user data concerns, vulnerabilities in the company’s platform, investigations by pressure groups and government agencies, and even issues with students. In addition, employers and other organizations/individuals have been known to use Meta Platforms Inc. for their own purposes. As a result, individuals’ identities and private information have sometimes been compromised without their permission. In response to these growing privacy concerns, some pressure groups and government agencies have increasingly asserted the users’ right to privacy and to be able to control their personal data.
  • 1.9K
  • 19 Oct 2022
Topic Review
Convolutional Neural Network + Recurrent Neural Network
A convolutional neural network and recurrent neural network (CNN + RNN) combination is an effective approach for many modern image recognition tasks that need to identify the behaviour of objects through a sequence of frames. For example, in a security CCTV camera footage, want to identify what abnormal actions a character is doing in the scene (e.g. fighting with someone, breaking into a store, etc.). A deep convolutional neural network (e.g. ResNet50) has many layers of abstraction and is good for extracting essential features in each frame of the input stream. These extracted features, which may represent low-level image features or even high-level objects, can be monitored over a sequence of frames by a recurrent neural network (e.g. ConvLSTM) so as to detect whether a certain action or event has happened.
  • 1.9K
  • 23 Feb 2022
  • Page
  • of
  • 371
Video Production Service