Topic Review
Contrastive Self-Supervised Learning
Self-supervised learning has gained popularity because of its ability to avoid the cost of annotating large-scale datasets. It is capable of adopting self-defined pseudolabels as supervision and use the learned representations for several downstream tasks. 
  • 1.4K
  • 18 Feb 2021
Topic Review
Wearable Sensors and Computer-Vision-Based Methods
Real-time sensing and modeling of the human body, especially the hands, is an important research endeavor for various applicative purposes such as in natural human computer interactions. Hand pose estimation is a big academic and technical challenge due to the complex structure and dexterous movement of human hands. Boosted by advancements from both hardware and artificial intelligence, various prototypes of data gloves and computer-vision-based methods have been proposed for accurate and rapid hand pose estimation in recent years. However, existing reviews either focused on data gloves or on vision methods or were even based on a particular type of camera, such as the depth camera. The purpose of this survey is to conduct a comprehensive and timely review of recent research advances in sensor-based hand pose estimation, including wearable and vision-based solutions. Hand kinematic models are firstly discussed. An in-depth review is conducted on data gloves and vision-based sensor systems with corresponding modeling methods. Particularly, this review also discusses deep-learning-based methods, which are very promising in hand pose estimation. Moreover, the advantages and drawbacks of the current hand gesture estimation methods, the applicative scope, and related challenges are also discussed.
  • 1.4K
  • 22 Feb 2021
Topic Review
Disk Defragmenter (Windows)
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation. Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk. Beginning with Windows XP, Disk Defragmenter also reduces system startup times. From Windows 8, the program was renamed to Defragment and Optimize Drives.
  • 1.4K
  • 31 Oct 2022
Topic Review
Palm Oil Background
Palm oil plantations cover millions of hectares worldwide, which encompass a significant portion of global trade. Palm oil trees, or Arecaceae, are a genus of stemless, tree-like monocot plants that thrive in the tropics and are extremely valuable to humans and the ecosystem. The African oil palm, or Elaeis guineensis, is the most prominent palm species native to West Africa, cultivated for its oil-rich fruit as a semiwild food source for over 7000 years. The tree produces a profusion of fruit bunches yearly with each containing between 1000 and 3000 fruits.
  • 1.4K
  • 14 Jul 2022
Topic Review
Principles of Grid Generation
Grids or meshes are geometrical shapes (formed after discretisation of the geometric domain) which are small-sized discrete cells that cover the physical domain, whose objective is to identify the discrete volumes or elements where conservation laws can be applied. They have applications in the fields of computational fluid dynamics (CFD), geography, designing and many more places where numerical solutions to the partial differential equations (PDEs) are required. Numerical grid generation is the crucial initial step involved in computing numerical solutions to the equations that describe a physical process. The accuracy of the solution depends upon the quality of the grid generated. A well-constructed grid can improve the quality of solution whereas, deviations from the numerical solution can be observed with a poorly constructed grid. Techniques for creating the cell forms the basis of grid generation. Various methods for the grid generation are discussed below.
  • 1.4K
  • 28 Oct 2022
Topic Review
Nest Labs
Nest Labs is an American manufacturer of smart home products including thermostats, smoke detectors, and security systems. Its flagship product, which was the company's first offering, is the Nest Learning Thermostat that was introduced in 2011. The product is programmable, self-learning, sensor-driven, and Wi-Fi-enabled – features that are often found in other Nest products. It was followed by the Nest Protect smoke and carbon monoxide detector in October 2013. After its acquisition of Dropcam in 2014, the company introduced its Nest Cam branding of security cameras beginning in June 2015. Co-founded by former Apple engineers Tony Fadell and Matt Rogers in 2010, the company quickly expanded to more than 130 employees by the end of 2012. Google acquired Nest Labs for United States dollar 3.2 billion in January 2014, when the company employed 280. As of late 2015, Nest employs more than 1,100 and has a primary engineering center in Seattle.
  • 1.4K
  • 18 Oct 2022
Topic Review
Reflection (Computer Programming)
In computer science, reflection is the ability of a process to examine, introspect, and modify its own structure and behavior.
  • 1.4K
  • 11 Oct 2022
Topic Review
Machine Learning-Based Network Anomaly Detection
Artificial intelligence (AI) techniques have been used to describe the characteristics of information, as they help in the process of data mining (DM) to analyze data and reveal rules and patterns. In DM, anomaly detection is an important area that helps discover hidden behavior within the data that is most vulnerable to attack. It also helps detect network intrusion. Algorithms such as hybrid K-mean array and sequential minimal optimization (SMO) rating can be used to improve the accuracy of the anomaly detection rate. 
  • 1.4K
  • 19 Aug 2022
Topic Review
Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act (CISA S. 2588 [113th Congress], S. 754 [114th Congress]) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police. The text of the bill was incorporated by amendment into a consolidated spending bill in the U.S. House on December 15, 2015, which was signed into law by President Barack Obama on December 18, 2015.
  • 1.4K
  • 07 Nov 2022
Topic Review
Sensor Fusion for Radar Detection
Sensor fusion can be considered as the mapping of different modalities into a common latent space where different features of the same object can be associated together. Sensor fusion frameworks are classified into four categories: input fusion, ROI fusion, feature map fusion, and decision fusion.
  • 1.4K
  • 08 Jun 2022
  • Page
  • of
  • 371
Video Production Service