Topic Review
Six Stages to Choose Sampling Techniques
In order to answer the research questions, it is doubtful that researcher should be able to collect data from all cases. Thus, there is a need to select a sample. The entire set of cases from which researcher sample is drawn in called the population. Since, researchers neither have time nor the resources to analysis the entire population so they apply sampling technique to reduce the number of cases. There are six stages to choose sampling techniques.
  • 101.5K
  • 17 Jul 2023
Topic Review
Blockchain Interoperability
Blockchain Interoperability is defined according to the National Institute of Standards and Technology (NIST) as: “a composition of distinguishable blockchain systems, each representing a unique distributed data ledger, where atomic transaction execution may span multiple heterogeneous blockchain systems, and where data recorded in one blockchain are reachable, verifiable, and referable by another possibly foreign transaction in a semantically compatible manner”.
  • 646
  • 17 Jul 2023
Topic Review
Deep-Learning-Based Approach to Keystroke-Injection Payload Generation
USB-based keystroke-injection attacks involve manipulating USB devices to inject malicious keystrokes into the target system. These attacks exploit the trust of USB devices and can bypass traditional security measures if they are taken into account and adapted to the systems designed to prevent such attacks. By impersonating a keyboard or using programmable USB devices, attackers can execute unauthorized commands or gain unauthorized access to sensitive information mimicking legitimate user keystrokes. Different attack vectors, such as BadUSB and rogue device attacks, have drawn attention to the potential risks and ramifications involved in these types of attacks. However, the emergence of advanced attack methods necessitates the development of more sophisticated countermeasures. These attacks pose a significant security risk and highlight the importance of implementing strong defenses to mitigate the potential impact of such exploits, especially those that can bypass keystroke dynamics systems using rogue USB devices with implants.
  • 366
  • 17 Jul 2023
Topic Review
Methods for Enhancing Security of Precision Agriculture
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Many schemes have been developed to enhance security in the smart farm environment. 
  • 539
  • 17 Jul 2023
Topic Review
U-Net_dc
Mutated cells may constitute a source of cancer. As an effective approach to quantifying the extent of cancer, cell image segmentation is of particular importance for understanding the mechanism of the disease, observing the degree of cancer cell lesions, and improving the efficiency of treatment and the useful effect of drugs. However, traditional image segmentation models are not ideal solutions for cancer cell image segmentation due to the fact that cancer cells are highly dense and vary in shape and size. To tackle this problem, researchers propose a novel U-Net-based image segmentation model, named U-Net_dc, which expands twice the original U-Net encoder and decoder and, in addition, uses a skip connection operation between them, for better extraction of the image features.
  • 327
  • 14 Jul 2023
Topic Review
Deep Learning Methods of Small Object Detection
Remote sensing methodology has been increasingly applied in fields such as forest fire detection, iceberg detection, ship detection, floating object detection, and agriculture monitoring. Synthetic aperture radar (SAR) images can be used to construct two-dimensional images, which can be further reconstructed into multidimensional images if necessary. When the SAR focuses on the target application, such as biomass detection in the forest, ship detection in the ocean, and vehicle count on land, it comprises many small objects. Detecting these small images is less effortless than general object detection in typical images.
  • 265
  • 14 Jul 2023
Topic Review
Kinases/Protein Phosphatases in Signaling Pathways Activation
Optimizing physical training regimens to increase muscle aerobic capacity requires an understanding of the internal processes that occur during exercise that initiate subsequent adaptation. During exercise, muscle cells undergo a series of metabolic events that trigger downstream signaling pathways and induce the expression of many genes in working muscle fibers. There are a number of studies that show the dependence of changes in the activity of AMP-activated protein kinase (AMPK), one of the mediators of cellular signaling pathways, on the duration and intensity of single exercises. The activity of various AMPK isoforms can change in different directions, increasing for some isoforms and decreasing for others, depending on the intensity and duration of the load.
  • 327
  • 11 Jul 2023
Topic Review
Pattern Tracking Problem
A pattern is a collection of objects that are similar to each other, arranged in a way that is in contradiction of their natural arrangement. It can also be defined as the opposite of chaos, an entity, loosely defined, which one can assign a specific name. For pattern tracking, tracked objects are usually called patterns. Objects can be defined as something of interest for future analysis. For example, in images, tracking boats at sea, vehicles on the road, aircraft in the air, and people walking on the street can be considered monitoring for a certain purpose and thus tracking.
  • 335
  • 11 Jul 2023
Topic Review
The Classification of Fraudulent Bank Transactions
The modern financial sector requires high security standards due to rapid technological progress. Banks utilize many security measures for transactions, including artificial intelligence (AI), neural networks, and machine learning. The use of these techniques allows advanced technological problems to be solved. The most common types of financial frauds are money laundering, identity fraud, and credit and debit card frauds.
  • 699
  • 11 Jul 2023
Topic Review
Online Roadshow
The Online Roadshow, a new type of web application, is a digital marketing approach that aims to maximize contactless business engagement. It leverages web computing to conduct interactive game sessions via the internet. As a result, massive amounts of personal data are generated during the engagement process between the audience and the Online Roadshow (e.g., gameplay data and clickstream information). The high volume of data collected is valuable for more effective market segmentation in strategic business planning through data-driven processes such as web personalization and trend evaluation.
  • 330
  • 11 Jul 2023
  • Page
  • of
  • 371
Video Production Service