Topic Review
Strengthening Privacy Security in Biomedical Microelectromechanical Systems
Biomedical Microelectromechanical Systems (BioMEMS) serve as a crucial catalyst in enhancing internet of things (IoT) communication security and safeguarding smart healthcare systems. Situated at the nexus of advanced technology and healthcare, BioMEMS are instrumental in pioneering personalized diagnostics, monitoring, and therapeutic applications. Nonetheless, this integration brings forth a complex array of security and privacy challenges intrinsic to IoT communications within smart healthcare ecosystems, demanding comprehensive scrutiny. 
  • 315
  • 13 Nov 2023
Topic Review
Stream Classification Algorithms and Architectures
Areas of stream classification are diverse—ranging, e.g., from monitoring sensor data to analyzing a wide range of (social) media applications. Research in stream classification is related to developing methods that adapt to the changing and potentially volatile data stream. It focuses on individual aspects of the stream classification pipeline, e.g., designing suitable algorithm architectures, an efficient train and test procedure, or detecting so-called concept drifts. 
  • 455
  • 30 Nov 2022
Topic Review
Strawberry Ripeness Classification
Image analysis-based artificial intelligence (AI) models leveraging convolutional neural networks (CNN) take a significant role in evaluating the ripeness of strawberry, contributing to the maximization of productivity. However, the convolution, which constitutes the majority of the CNN models, imposes significant computational burdens. Additionally, the dense operations in the fully connected (FC) layer necessitate a vast number of parameters and entail extensive external memory access. Therefore, reducing the computational burden of convolution operations and alleviating memory overhead is essential in embedded environment.
  • 159
  • 07 Feb 2024
Topic Review
Strategy for Catastrophic Forgetting Reduction in Incremental Learning
Catastrophic forgetting or catastrophic interference is a serious problem in continuous learning in machine learning. It happens not only in traditional machine learning algorithms such as SVM (Support Vector Machine), NB (Naive Bayes), DT (Decision Tree), and CRF (Conditional Random Field) but also in DNNs.
  • 288
  • 05 Jun 2023
Topic Review
Strategy (Game Theory)
In game theory, a player's strategy is any of the options which they choose in a setting where the outcome depends not only on their own actions but on the actions of others. The discipline mainly concerns the action of a player in a game affecting the behavior or actions of other players. Some examples of "games" include chess, bridge, poker, monopoly, diplomacy or battleship. A player's strategy will determine the action which the player will take at any stage of the game. In studying game theory, economists enlist a more rational lens in analyzing decisions rather than the psychological or sociological perspectives taken when analyzing relationships between decisions of two or more parties in different disciplines. The strategy concept is sometimes (wrongly) confused with that of a move. A move is an action taken by a player at some point during the play of a game (e.g., in chess, moving white's Bishop a2 to b3). A strategy on the other hand is a complete algorithm for playing the game, telling a player what to do for every possible situation throughout the game. It is helpful to think about a "strategy" as a list of directions, and a "move" as a single turn on the list of directions itself. This strategy is based on the payoff or outcome of each action. The goal of each agent is to consider their payoff based on a competitors action. For example, competitor A can assume competitor B enters the market. From there, Competitor A compares the payoffs they receive by entering and not entering. The next step is to assume Competitor B doesn't enter and then consider which payoff is better based on if Competitor A chooses to enter or not enter. This technique can identify dominant strategies where a player can identify an action that they can take no matter what the competitor does to try and maximize the payoff. This also helps players to identify Nash equilibrium which are discussed in more detail below. A strategy profile (sometimes called a strategy combination) is a set of strategies for all players which fully specifies all actions in a game. A strategy profile must include one and only one strategy for every player.
  • 2.0K
  • 28 Nov 2022
Topic Review
Strategic Urban Planning
The general objectives of strategic urban planning (SUP) include clarifying which city model is desired and working towards that goal, coordinating public and private efforts, channelling energy, adapting to new circumstances and improving the living conditions of the citizens affected. Strategic planning is a technique that has been applied to many facets of human activity; we have only to mention Sun Tzu, Arthur Thomson or Henry Mintzberg; however, the application of strategic planning to urban contexts, or cities, regions and other metropolitan areas is a relatively recent development whose beginnings were eminently practical and artistical: a mixture of thought, techniques and art or expertise. Fifteen years of practice proved to be enough time for the technique to spread and for the first “Meeting of American and European cities for the Exchange of Experiences in Strategic Planning” to be organized. Institutions sponsoring the meeting, held in Barcelona in 1993, included the Inter-American Development Bank, the European Community Commission and the Iberoamerican Cooperation Institute. The cities of Amsterdam, Lisbon, Lille, Barcelona, Toronto and Santiago de Chile participated, among others. At that meeting it was demonstrated, along with other relevant aspects, that if cooperative processes are used in large cities in order to carry out strategic planning processes, and if a reasonable degree of comprehension is reached between the administration, businesses and an ample representation of social agents, organizational synergies will develop that will eventually improve resource management and citizens’ quality of life.
  • 920
  • 24 Oct 2022
Topic Review
Storm Botnet
The Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware) was a remotely controlled network of "zombie" computers (or "botnet") that had been linked by the Storm Worm, a Trojan horse spread through e-mail spam. At its height in September 2007, the Storm botnet was running on anywhere from 1 million to 50 million computer systems, and accounted for 8% of all malware on Microsoft Windows computers. It was first identified around January 2007, having been distributed by email with subjects such as "230 dead as storm batters Europe," giving it its well-known name. The botnet began to decline in late 2007, and by mid-2008 had been reduced to infecting about 85,000 computers, far less than it had infected a year earlier. As of December 2012, the original creators of Storm have not been found. The Storm botnet has displayed defensive behaviors that indicated that its controllers were actively protecting the botnet against attempts at tracking and disabling it, by specifically attacking the online operations of some security vendors and researchers who had attempted to investigate it. Security expert Joe Stewart revealed that in late 2007, the operators of the botnet began to further decentralize their operations, in possible plans to sell portions of the Storm botnet to other operators. It was reportedly powerful enough to force entire countries off the Internet, and was estimated to be capable of executing more instructions per second than some of the world's top supercomputers. The United States Federal Bureau of Investigation considered the botnet a major risk to increased bank fraud, identity theft, and other cybercrimes.
  • 1.6K
  • 11 Oct 2022
Topic Review
Storage Systems in Edge Computing Infrastructures
Edge computing constitutes a promising paradigm of managing and processing the massive amounts of data generated by Internet of Things (IoT) devices. Data and computation are moved closer to the client, thus enabling latency- and bandwidth-sensitive applications. However, the distributed and heterogeneous nature of the edge as well as its limited resource capabilities pose several challenges in implementing or choosing an efficient edge-enabled storage system. Therefore, it is imperative for the research community to contribute to the clarification of the purposes and highlight the advantages and disadvantages of various edge-enabled storage systems.
  • 274
  • 28 Sep 2022
Topic Review
Stoned (Computer Virus)
Stoned is a boot sector computer virus created in 1987. It is one of the first viruses and is thought to have been written by a student in Wellington, New Zealand. By 1989 it had spread widely in New Zealand and Australia, and variants became very common worldwide in the early 1990s. A computer infected with the original version had a one in eight probability that the screen would declare: "Your PC is now Stoned!", a phrase found in infected boot sectors of infected floppy disks and master boot records of infected hard disks, along with the phrase "Legalise Marijuana". Later variants produced a range of other messages.
  • 371
  • 03 Nov 2022
Topic Review
Stock Market Prediction Using Deep Reinforcement Learning
Stock market investment, a cornerstone of global business, has experienced unprecedented growth, becoming a lucrative, yet complex field. Predictive models, powered by cutting-edge technologies like artificial intelligence (AI), sentiment analysis, and machine learning algorithms, have emerged to guide investors in their decision-making processes.
  • 289
  • 22 Nov 2023
  • Page
  • of
  • 371
Video Production Service