Topic Review
Eye Tracking Technology
Eye tracking is a technique for detecting and measuring eye movements and characteristics. An eye tracker can sense a person’s gaze locations and features at a certain frequency.
  • 325
  • 06 Sep 2023
Topic Review
Practical AI Cases for Solving ESG Challenges
Artificial intelligence (AI) is a rapidly advancing area of research that encompasses numerical methods to solve various prediction, optimization, and classification/clustering problems. Recently, AI tools were proposed to address the environmental, social, and governance (ESG) challenges associated with sustainable business development. While many publications discuss the potential of AI, few focus on practical cases in the three ESG domains altogether, and even fewer highlight the challenges that AI may pose in terms of ESG.
  • 235
  • 06 Sep 2023
Topic Review
Detecting Deceptive Behaviours
Interest in detecting deceptive behaviours by various application fields, such as security systems, political debates, advanced intelligent user interfaces, etc., makes automatic deception detection an active research topic. This interest has stimulated the development of many deception-detection methods in the literature in recent years.
  • 272
  • 06 Sep 2023
Topic Review
Improving Visual Defect Detection
Reliable functionality in anomaly detection in thermal image datasets is crucial for defect detection of industrial products. Nevertheless, achieving reliable functionality is challenging, especially when datasets are image sequences captured during equipment runtime with a smooth transition from healthy to defective images. This causes contamination of healthy training data with defective samples. Anomaly detection methods based on autoencoders are susceptible to a slight violation of a clean training dataset and lead to challenging threshold determination for sample classification. 
  • 225
  • 06 Sep 2023
Topic Review
ML Techniques for Intrusion Detection in Cyber-Physical Systems
Cyber-physical systems (CPS) are vital to key infrastructures such as Smart Grids and water treatment, and are increasingly vulnerable to a broad spectrum of evolving attacks. Whereas traditional security mechanisms, such as encryption and firewalls, are often inadequate for CPS architectures, the implementation of Intrusion Detection Systems (IDS) tailored for CPS has become an essential strategy for securing them. In this context, it is worth noting the difference between traditional offline Machine Learning (ML) techniques and understanding how they perform under different IDS applications. 
  • 217
  • 06 Sep 2023
Topic Review
Arabic Mispronunciation Recognition System Using LSTM Network
The widespread use of CALL (computer-assisted language learning) systems attests to their success in helping people improve their language and speech skills. CALL is predominantly concerned with addressing pronunciation errors in non-native speakers’ speech. Accurate mispronunciation detection, voice recognition, and accurate pronunciation evaluation are all activities that may be accomplished with CALL.
  • 251
  • 05 Sep 2023
Topic Review
FCAN–XGBoost
Emotion recognition has broad application prospects in fields such as artificial intelligence (AI), intelligent healthcare, remote education, and virtual reality (VR) games. Accurately recognizing human emotions is one of the most urgent issues in the brain–computer interface. FCAN XGBoost is a electroencephalogram (EEG) based emotion recognition model that can quickly and accurately recognize four types of emotions in EEG.
  • 346
  • 05 Sep 2023
Topic Review
Detecting Misalignment State of Angle Cocks
As one of the key components in the braking system, the angle cock is the switch of the train ventilation duct, which realizes the braking through the air transmission between carriages, so that the train can achieve the purpose of regulating speed or stopping.
  • 216
  • 05 Sep 2023
Topic Review
Zero-Day Attack and Cybersecurity on Twitter
In the information era, knowledge can pose risks in the online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only identified after they have occurred. These types of risks are referred to as zero-day attacks since no pre-existing anti-malware measures are available to mitigate them. Consequently, significant damages occur when vulnerabilities in systems are exploited. The effectiveness of security systems, such as IPS and IDS, relies heavily on the prompt and efficient response to emerging threats.
  • 288
  • 05 Sep 2023
Topic Review
IoT's Impact: From Healthcare to Smart City Solutions
The Internet of Things (IoT) technology and devices represent an exciting field in computer science that is rapidly emerging worldwide. The demand for automation and efficiency has also been a contributing factor to the advancements in this technology. The proliferation of IoT devices coincides with advancements in wireless networking technologies, driven by the enhanced connectivity of the internet. Nearly any everyday object can be connected to the network, reflecting the growing demand for automation and efficiency.
  • 339
  • 04 Sep 2023
  • Page
  • of
  • 371
Video Production Service