Topic Review
Keystroke Dynamics as a Language Profiling Tool
Understanding the distinct characteristics of unidentified Internet users is helpful in various contexts, including digital forensics, targeted advertising, and user interaction with services and systems. Keystroke dynamics (KD) enables the analysis of data derived from a user’s typing behaviour on a keyboard as one approach to obtain such information. 
  • 252
  • 20 Oct 2023
Topic Review
Safety in Traffic Management Systems
Traffic management systems play a vital role in ensuring safe and efficient transportation on roads. However, the use of advanced technologies in traffic management systems has introduced new safety challenges. Therefore, it is important to ensure the safety of these systems to prevent accidents and minimize their impact on road users.
  • 292
  • 20 Oct 2023
Topic Review
Machine Failure Prediction Using Survival Analysis
With the rapid growth of cloud computing and the creation of large-scale systems such as IoT environments, the failure of machines/devices and, by extension, the systems that rely on them is a major risk to their performance, usability, and the security systems that support them. The need to predict such anomalies in combination with the creation of fault-tolerant systems to manage them is a key factor for the development of safer and more stable systems. 
  • 442
  • 19 Oct 2023
Topic Review
Methods for Melanoma and Nonmelanoma Skin Cancers Classification
Skin cancer is considered a dangerous type of cancer with a high global mortality rate. Manual skin cancer diagnosis is a challenging and time-consuming method due to the complexity of the disease. In the field of transfer learning and federated learning, there are several new algorithms and techniques for classifying melanoma and nonmelanoma skin cancer.
  • 352
  • 19 Oct 2023
Topic Review
Deep Learning Stranded Neural Network Model
Maintenance processes are of high importance for industrial plants. They have to be performed regularly and uninterruptedly. To assist maintenance personnel, industrial sensors monitored by distributed control systems observe and collect several machinery parameters in the cloud. Then, machine learning algorithms try to match patterns and classify abnormal behaviors.
  • 170
  • 19 Oct 2023
Topic Review
Cryptosystem for Encryption
Electronic commerce(E-commerce) transactions require secure communication to protect sensitive information such as credit card numbers, personal identification, and financial data from unauthorized access and fraud. Encryption using public key cryptography is essential to ensure secure electronic commerce transactions. RSA and Rabin cryptosystem algorithms are widely used public key cryptography techniques, and their security is based on the assumption that it is computationally infeasible to factorize the product of two large prime numbers into its constituent primes. However, existing variants of RSA and Rabin cryptosystems suffer from issues like high computational complexity, low speed, and vulnerability to factorization attacks. 
  • 261
  • 19 Oct 2023
Topic Review
Boundary-Element Analysis of Cracks in Multilayered Elastic Media
Crack problems in multilayered elastic media have attracted extensive attention for years due to their wide applications in both a theoretical analysis and practical industry. The boundary element method (BEM) is widely chosen among various numerical methods to solve the crack problems. Compared to other numerical methods, such as the phase field method (PFM) or the finite element method (FEM), the BEM ensures satisfying accuracy, broad applicability, and satisfactory efficiency.
  • 293
  • 19 Oct 2023
Topic Review
Phishing Email Detection Model Using Deep Learning
Email phishing is a widespread cyber threat that can result in the theft of sensitive information and financial loss. It uses malicious emails to trick recipients into providing sensitive information or transferring money, often by disguising themselves as legitimate organizations or individuals. As technology advances and attackers become more sophisticated, the problem of email phishing becomes increasingly challenging to detect and prevent.
  • 775
  • 19 Oct 2023
Topic Review
Applying Machine Learning in Retail Demand Prediction
In the realm of retail supply chain management, accurate forecasting is paramount for informed decision making, as it directly impacts business operations and profitability. 
  • 258
  • 19 Oct 2023
Topic Review
MapReduce Job Scheduling Exploiting Heterogeneity in Cloud Environments
In cyber-physical systems (CPS), micromachines are typically deployed across a wide range of applications, including smart industry, smart healthcare, and smart cities. Providing on-premises resources for the storage and processing of huge data collected by such CPS applications is crucial. The cloud provides scalable storage and computation resources, typically through a cluster of virtual machines (VMs) with big data tools such as Hadoop MapReduce.
  • 172
  • 18 Oct 2023
  • Page
  • of
  • 371
Video Production Service