Computing & information processing

Computing & information processing

Technology. image by pixabay

A new type of technology has recently been developed. AI technology that mimics the human eye. Researchers at the University of Central Florida have...
image by pixabay

One of the challenges involved with the use of artificial intelligence is trust. While machine learning algorithms show promise for defense systems, determining how...
electric eye. image by pixabay

The Georgia State University has developed a new and innovative technology for artificial vision, which utilizes a new architecture to enhance color recognition on...
artificial-intelligence. image by pixabay

Sentiment analysis is the interpretation and classification of emotions (positive, negative and neutral) within text data. These tools allow businesses to identify customer sentiment...
photo illus. cybersecurity by Pixabay

Cyber security is often associated with protecting data, but hackers are increasingly targeting physical devices. A technology under development makes digital chips more resilient...
photo drone swarm illus. by Pixabay

Groups of drones now can work together in networks for purposes such as traffic control, smart agriculture, surveillance and security systems, law enforcement, public...
IoT. image by pixabay

The manufacturers of connected systems, interested in defending their code and data in the Internet of Things realm will now have another channel to...
Cyber Security. image by pixabay

While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
police officers. image by pixabay

Just like the rest of the world, the Law Enforcement field must invest in keeping up with modern technologies. To carry out efficient, smart...
electric power-lines. image by pixabay

Can we better utilize the idea of Internet of Things with connectivity and data analytics to reduce our consumption and enhance our knowledge and...
smartphone. image by pixabay

Following the widespread protests and anger over police brutality in the US during these last few years, an iPhone user created a shortcut that...
Image by pixabay

Quantum technology translates the principles of quantum physics into technological applications. In general, quantum technology has not yet reached maturity; however, it could hold...
image by pixabay

AI accelerators are a class of hardware that are designed, as the name suggests, to accelerate AI models. By boosting the performance of algorithms,...
Battlefield. image by pixabay

Artificial intelligence software in battlefield autonomous systems can be vulnerable to cyber attacks. Researchers are looking for ways to make the systems’ machine learning...
Army. image by pixabay

In the case of spare parts and components, snapping a photo of the part is much more effective than conducting a text search, that...
Cyber space. image by pixabay

The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...
security. image by pixabay

With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Cyber security and City Lights. image by pixabay

A game-changing cybersecurity technology is bringing about a new era, claims the US Army Combat Capabilities Development Command (DEVCOM). US Army researchers are creating...
cyber security. image by pixabay

Ransomware and malware, as well as cyberattacks, are a real threat to the systems of governments and local authorities, and the number of warnings...
IoT chip. image by pixabay

Internet-of-things devices are vulnerable to various cyber threats. Recent reports suggest that one of those supposed attacks is the side-channel attack. This tactic seeks...
AI security. image by pixabay

As Russian leadership attempts to come to terms with technology's impact on its military power and role in the world, artificial intelligence and autonomy...
Security. image by pixabay

By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...