Topic Review
Technological Breakthroughs in Sport
We are currently witnessing an unprecedented era of digital transformation in sports, driven by the revolutions in Artificial Intelligence (AI), Virtual Reality (VR), Augmented Reality (AR), and Data Visualization (DV). These technologies hold the promise of redefining sports performance analysis, automating data collection, creating immersive training environments, and enhancing decision-making processes. Traditionally, performance analysis in sports relied on manual data collection, subjective observations, and standard statistical models. These methods, while effective, had limitations in terms of time and subjectivity.
  • 257
  • 29 Feb 2024
Topic Review
Technological Aspects for Pleasant Learning
The teaching–learning process, at each educational level, is often an open problem for educators and researchers related to the stated topic. Researchers combine emerging technologies to formulate learning tools in order to understand the abstract contents of the subjects; however, the problem still persists. A technological learning tool would be effective when projected into an educational model that looks at motivation, usability, engagement, and technological acceptability. Some of these aspects could be attributed through the use of augmented reality and games. 
  • 632
  • 22 Apr 2021
Topic Review
Techno-Nationalism and Country of Origin
Techno-nationalism is a viewpoint that emphasizes the importance of domestic control over technology and the digital economy as a means to achieve national security and economic prosperity. It advocates for policies that support national technological advancement, protect against foreign dependency, and prioritize the development of domestic technological capabilities. The country of origin (COO) concept is crucial as it directly impacts economic independence and technological supremacy. By understanding and controlling the COO of technological products and services, a nation can reduce dependency on external tech suppliers and foster domestic innovation. Furthermore, the COO may be essential in protecting national digital infrastructure from potential foreign cyber threats and improving national cybersecurity culture. A framework is introduced with a multi-faceted approach for assessing the country of origin of digital products, incorporating 19 parameters that consider the complexities of hardware, software, and data sources.
  • 177
  • 04 Feb 2024
Topic Review
Techniques Related to Chinese Speech Emotion Recognition
The use of Artificial Intelligence for emotion recognition has attracted much attention. The industrial applicability of emotion recognition is quite comprehensive and has good development potential. 
  • 435
  • 12 Jul 2022
Topic Review
Techniques for Credit Card Fraud Detection
Fraudulent activities are on the rise within the financial sector, with an escalating trend observed in credit card fraud. The incidence of credit card fraud is expanding swiftly in tandem with the increasing daily usage of credit cards. The Federal Trade Commission (FTC) report underscores the severity of the issue, noting that 2021 marked the most challenging year in history for identity theft. It is crucial to note that many cases of identity theft go unreported, suggesting that the actual number may surpass the reported figures. The FTC report emphasises the need for innovative approaches to safeguard the financial well-being of both consumers and businesses. In the era of digital advancements, the escalation of credit card fraud necessitates the development of robust and efficient fraud detection systems. 
  • 112
  • 17 Jan 2024
Topic Review
Technique for Searching Data
The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms that provide the ability to effectively use encryption to protect data. However, the use of traditional encryption methods faces a problem. Namely, traditional encryption, by making it impossible for insiders and outsiders to access data without knowing the keys, excludes the possibility of searching. 
  • 240
  • 14 Nov 2023
Topic Review
Technical Support Scam
A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users. Such calls are mostly targeted at Microsoft Windows users, with the caller often claiming to represent a Microsoft technical support department. In English-speaking countries such as the United States , Canada , United Kingdom , Ireland, Australia and New Zealand, such cold call scams have occurred as early as 2008. and primarily originate from call centers in India . The scammer will typically attempt to get the victim to allow remote access to their computer. After remote access is gained, the scammer relies on confidence tricks, typically involving utilities built into Windows and other software, in order to gain the victim's trust to pay for the supposed "support" services. The scammer will often then steal the victim's credit card account information or persuade the victim to log in to their online banking account to receive a promised refund, only to steal more money, claiming that a secure server is connected and that the scammer cannot see the details. Many schemes involve convincing the victim to purchase expensive gift cards and then to divulge the card information to the scammer.
  • 672
  • 21 Nov 2022
Topic Review
Team Foundation Server
Team Foundation Server (commonly abbreviated to TFS) is a Microsoft product that provides source code management (either with Team Foundation Version Control or Git), reporting, requirements management, project management (for both agile software development and waterfall teams), automated builds, lab management, testing and release management capabilities. It covers the entire application lifecycle, and enables DevOps capabilities. TFS can be used as a back-end to numerous integrated development environments (IDEs) but is tailored for Microsoft Visual Studio and Eclipse on all platforms.
  • 559
  • 26 Oct 2022
Topic Review
TCP-based Congestion Control Algorithms
In today’s data networks, the main protocol used to ensure reliable communications is the transmission control protocol (TCP). The TCP performance is largely determined by the used congestion control (CC) algorithm, which main purpose is to avoid the congestion of the network that can be caused by a large burst of data traffic. TCP CC algorithms have evolved over the past three decades and a large number of CC algorithm variations have been developed to accommodate various communication network environments. Considering the importance of CC in communication networks, the fundamentals of the TCP as the main transport layer protocol and CC process have been explained in detail. Also, an encyclopedic overview of the most popular single-flow and multi-flow TCP CC algorithms with corresponding alternatives has been present. Future directions in the possible improvement of CC algorithms for implementation in complex heterogeneous networks composed of wired and wireless elements are lastly discussed in this encyclopedic work. 
  • 19.4K
  • 21 Jul 2021
Topic Review
Taxonomy of Machine Learning Methods for Urban Applications
Machine Learning (ML) as an intersection of informatics and statistics is a promising challenge for more evidence-based decisions to fill in the gap of existing technological tools and instruments for spatiotemporal requirements. As ML transcended the conventional techniques of modeling, a huge potential of big data management to address complex city problems is presented at the crossroads of modern urban planning challenges to make up their dynamics. Generally speaking, the ML methods are categorized based on the type of ‘learning’.
  • 385
  • 10 Jan 2023
  • Page
  • of
  • 371
Video Production Service