Topic Review
A Unified Framework for RGB-Infrared Transfer
Infrared(IR) images (both 0.7-3 µm and 8-15 µm) offer radiation intensity texture information that visible images lack, making them particularly helpful in daytime, nighttime, and complex scenes. Many researchers are studying how to translate RGB images into infrared images for deep learning-based visual tasks such as object tracking, crowd counting, panoramic segmentation, and image fusion in urban scenarios. The utilization of the RGB-IR dataset in the aforementioned tasks holds the potential to provide comprehensive multi-band fusion data for urban scenes, thereby facilitating precise modeling across different scenarios. In addressing the challenge of accurately generating high-radiance textures for the targets in the infrared spectrum, the proposed approach aims to ensure alignment between the generated infrared images and the radiation feature of ground-truth IR images.
  • 254
  • 18 Dec 2023
Topic Review
Random Forest, Feedforward Neural Network, GRU and FinGAT
Stock prediction has garnered considerable attention among investors, with a recent focus on the application of machine learning techniques to enhance predictive accuracy. Prior research has established the effectiveness of machine learning in forecasting stock market trends, irrespective of the analytical approach employed, be it technical, fundamental, or sentiment analysis. 
  • 263
  • 18 Dec 2023
Topic Review
Blockchain-Based Identity and Access Management
Identity and Access Management (IAM) has the ability to provide defense against a great number of security threats. While decentralization of IoT seems to be a solution for improved resource management and scalability, most of the services remain centralized exposing IoT systems to malicious attacks. Blockchain however, is a technology which can natively support decentralization as well as access and authorization management techniques, by using the corresponding programmable logic and leveraging cryptographic mechanisms for privacy and security. Using standardized frameworks (e.g., Decentralized Identifiers and Verifiable Credentials), a blockchain-based access and authorization solution can present the basis for a uniform decentralized IAM framework not only for IoT, but for decentralized systems in general. The two main issues which stand between such a radical system and its broad use are firstly, to be able to seamlessly integrate blockchain and provide the basis for a decentralized IAM framework, while secondly (and most importantly) resolving the challenge of integrating within existing IoT (or other) systems, avoiding redesigning and redeveloping on behalf of the manufacturers.
  • 258
  • 15 Dec 2023
Topic Review
Segmentation and Path Planning of Unmanned Ariel Vehicle
Unmanned aerial vehicles (UAVs), sometimes known as “drones”, are unmanned aircraft that can be flown without a pilot on board. Aircraft, ground control stations, and communications systems all fall under the umbrella term unmanned aircraft systems (UAS), which describes the infrastructure necessary for sophisticated drone operations. An autonomous drone is a UAV that can fly missions independently of a human pilot. It can take off, execute its task, and return to base without human assistance. Rather than relying on a human pilot, communications management software handles mission planning and flight control for autonomous drones.
  • 172
  • 15 Dec 2023
Topic Review
Machine Learning Methods in Weather and Climate Applications
With the rapid development of artificial intelligence, machine learning is gradually becoming popular for predictions in all walks of life. In meteorology, it is gradually competing with traditional climate predictions dominated by physical models. 
  • 709
  • 15 Dec 2023
Topic Review
Digital Image Authentication for Security and Validation Enhancement
Digital face approaches possess currently received awesome attention because of their huge wide variety of digital audio, and visual programs. Digitized snapshots are progressively more communicated using an un-relaxed medium together with cyberspace. Consequently, defence, clinical, medical, and exceptional supervised photographs are essentially blanketed towards trying to employ it; such controls ought to damage such choices constructed totally based on those pictures.
  • 114
  • 15 Dec 2023
Topic Review
Decentralized Federated Learning and Knowledge Graph Embedding
Anomaly detection plays a crucial role in data security and risk management across various domains, such as financial insurance security, medical image recognition, and Internet of Things (IoT) device management. Researchers rely on machine learning to address potential threats in order to enhance data security.
  • 188
  • 15 Dec 2023
Topic Review
Data Analysis Using Machine Learning for Cybersecurity
The internet has become an indispensable tool for organizations, permeating every facet of their operations. Virtually all companies leverage Internet services for diverse purposes, including the digital storage of data in databases and cloud platforms. Furthermore, the rising demand for software and applications has led to a widespread shift toward computer-based activities within the corporate landscape. However, this digital transformation has exposed the information technology (IT) infrastructures of these organizations to a heightened risk of cyber-attacks, endangering sensitive data. Consequently, organizations must identify and address vulnerabilities within their systems, with a primary focus on scrutinizing customer-facing websites and applications. 
  • 259
  • 15 Dec 2023
Topic Review
Digital Marketing for SMEs in Tourism
Social media has become an essential tool for travel planning, with tourists increasingly using it to research destinations, book accommodation, and make travel arrangements. Small and medium-sized enterprises’(SMEs) most common use of social media is to promote their products or services, but they can also use it to build customer relationships, provide customer service, and gather feedback.
  • 363
  • 15 Dec 2023
Topic Review
Comparative Study of Keccak SHA-3 Implementations
SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies. This text aims to provide valuable insights into selecting and optimizing Keccak SHA-3 implementations. It encompasses an in-depth analysis of hardware, software, and software–hardware (hybrid) solutions. Researchers assess the strengths, weaknesses, and performance metrics of each approach. Critical factors, including computational efficiency, scalability, and flexibility, are evaluated across different use cases. Researchers investigate how each implementation performs in terms of speed and resource utilization. This text aims to improve the knowledge of cryptographic systems, aiding in the informed design and deployment of efficient cryptographic solutions. By providing a comprehensive overview of SHA-3 implementations, it offers a clear understanding of the available options and equips professionals and researchers with the necessary insights to make informed decisions in their cryptographic endeavors.
  • 222
  • 15 Dec 2023
  • Page
  • of
  • 371
Video Production Service