Skip Content
You are currently on the new version of our website. Access the old version .

Most Viewed

  • Review
  • Open Access
491 Citations
127,557 Views
42 Pages

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

  • Ömer Aslan,
  • Semih Serkant Aktuğ,
  • Merve Ozkan-Okay,
  • Abdullah Asim Yilmaz and
  • Erdal Akin

Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread...

  • Article
  • Open Access
21 Citations
118,756 Views
30 Pages

In the past twenty years, the IT industry has moved away from using physical servers for workload management to workloads consolidated via virtualization and, in the next iteration, further consolidated into containers. Later, container workloads bas...

  • Review
  • Open Access
73 Citations
87,359 Views
38 Pages

Blockchain-Based E-Voting Systems: A Technology Review

  • Mohammad Hajian Berenjestanaki,
  • Hamid R. Barzegar,
  • Nabil El Ioini and
  • Claus Pahl

The employment of blockchain technology in electronic voting (e-voting) systems is attracting significant attention due to its ability to enhance transparency, security, and integrity in digital voting. This study presents an extensive review of the...

  • Feature Paper
  • Review
  • Open Access
326 Citations
78,038 Views
21 Pages

Virtual Reality in Education: A Review of Learning Theories, Approaches and Methodologies for the Last Decade

  • Andreas Marougkas,
  • Christos Troussas,
  • Akrivi Krouska and
  • Cleo Sgouropoulou

In the field of education, virtual reality (VR) offers learners an immersive and interactive learning experience, allowing them to comprehend challenging concepts and ideas more efficiently and effectively. VR technology has enabled educators to deve...

  • Review
  • Open Access
56 Citations
63,811 Views
27 Pages

A Comprehensive Review of DeepFake Detection Using Advanced Machine Learning and Fusion Methods

  • Gourav Gupta,
  • Kiran Raja,
  • Manish Gupta,
  • Tony Jan,
  • Scott Thompson Whiteside and
  • Mukesh Prasad

Recent advances in Generative Artificial Intelligence (AI) have increased the possibility of generating hyper-realistic DeepFake videos or images to cause serious harm to vulnerable children, individuals, and society at large with misinformation. To...

  • Article
  • Open Access
1 Citations
61,496 Views
22 Pages

Pixelator v2: A Novel Perceptual Image Comparison Method with LAB Colour Space and Sobel Edge Detection for Enhanced Security Analysis

  • Somdip Dey,
  • Jabir Alshehabi Al-Ani,
  • Aikaterini Bourazeri,
  • Suman Saha,
  • Rohit Purkait,
  • Samuel Hill and
  • Julian Thompson

19 November 2024

In this paper, we introduce Pixelator v2, a novel perceptual image comparison method designed to enhance security and analysis through improved image difference detection. Unlike traditional metrics such as MSE, Q, and SSIM, which often fail to captu...

  • Review
  • Open Access
154 Citations
60,233 Views
37 Pages

23 February 2023

The greatest technological changes in our lives are predicted to be brought about by Artificial Intelligence (AI). Together with the Internet of Things (IoT), blockchain, and several others, AI is considered to be the most disruptive technology, and...

  • Systematic Review
  • Open Access
177 Citations
58,901 Views
50 Pages

22 September 2024

This paper reviews the literature on integrating AI in e-learning, from the viewpoint of cognitive neuropsychology, for Personalized Learning (PL) and Adaptive Assessment (AA). This review follows the PRISMA systematic review methodology and synthesi...

  • Systematic Review
  • Open Access
134 Citations
58,751 Views
44 Pages

Intelligent Robotics—A Systematic Review of Emerging Technologies and Trends

  • Josip Tomo Licardo,
  • Mihael Domjan and
  • Tihomir Orehovački

Intelligent robotics has the potential to revolutionize various industries by amplifying output, streamlining operations, and enriching customer interactions. This systematic literature review aims to analyze emerging technologies and trends in intel...

  • Review
  • Open Access
137 Citations
58,121 Views
24 Pages

Photoplethysmography (PPG) is an affordable and straightforward optical technique used to detect changes in blood volume within tissue microvascular beds. PPG technology has found widespread application in commercial medical devices, enabling measure...

  • Article
  • Open Access
164 Citations
55,040 Views
15 Pages

FDA-Approved Artificial Intelligence and Machine Learning (AI/ML)-Enabled Medical Devices: An Updated Landscape

  • Geeta Joshi,
  • Aditi Jain,
  • Shalini Reddy Araveeti,
  • Sabina Adhikari,
  • Harshit Garg and
  • Mukund Bhandari

As artificial intelligence (AI) has been highly advancing in the last decade, machine learning (ML)-enabled medical devices are increasingly used in healthcare. In this study, we collected publicly available information on AI/ML-enabled medical devic...

  • Systematic Review
  • Open Access
124 Citations
53,937 Views
38 Pages

4 September 2024

Synthetic data are increasingly being recognized for their potential to address serious real-world challenges in various domains. They provide innovative solutions to combat the data scarcity, privacy concerns, and algorithmic biases commonly used in...

  • Review
  • Open Access
133 Citations
52,865 Views
35 Pages

Recently, there has been an evolution toward a science-supported medicine, which uses replicable results from comprehensive studies to assist clinical decision-making. Reliable techniques are required to improve the consistency and replicability of s...

  • Review
  • Open Access
276 Citations
51,703 Views
24 Pages

Techniques and Challenges of Image Segmentation: A Review

  • Ying Yu,
  • Chunping Wang,
  • Qiang Fu,
  • Renke Kou,
  • Fuyu Huang,
  • Boxiong Yang,
  • Tingting Yang and
  • Mingliang Gao

Image segmentation, which has become a research hotspot in the field of image processing and computer vision, refers to the process of dividing an image into meaningful and non-overlapping regions, and it is an essential step in natural scene underst...

  • Article
  • Open Access
553 Citations
46,304 Views
14 Pages

DC-YOLOv8: Small-Size Object Detection Algorithm Based on Camera Sensor

  • Haitong Lou,
  • Xuehu Duan,
  • Junmei Guo,
  • Haiying Liu,
  • Jason Gu,
  • Lingyun Bi and
  • Haonan Chen

Traditional camera sensors rely on human eyes for observation. However, human eyes are prone to fatigue when observing objects of different sizes for a long time in complex scenes, and human cognition is limited, which often leads to judgment errors...

  • Feature Paper
  • Review
  • Open Access
158 Citations
45,001 Views
43 Pages

In the current world of the Internet of Things, cyberspace, mobile devices, businesses, social media platforms, healthcare systems, etc., there is a lot of data online today. Machine learning (ML) is something we need to understand to do smart analys...

  • Review
  • Open Access
38 Citations
40,105 Views
35 Pages

Review of Smart-Home Security Using the Internet of Things

  • George Vardakis,
  • George Hatzivasilis,
  • Eleftheria Koutsaki and
  • Nikos Papadakis

22 August 2024

As the Internet of Things (IoT) continues to revolutionize the way we interact with our living spaces, the concept of smart homes has become increasingly prevalent. However, along with the convenience and connectivity offered by IoT-enabled devices i...

  • Systematic Review
  • Open Access
150 Citations
37,475 Views
19 Pages

Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues

  • Mohit Kumar,
  • Ashwani Kumar,
  • Sahil Verma,
  • Pronaya Bhattacharya,
  • Deepak Ghimire,
  • Seong-heum Kim and
  • A. S. M. Sanwar Hosen

Advancements in Healthcare Internet of Things (H-IoT) systems have created new opportunities and solutions for healthcare services, including the remote treatment and monitoring of patients. In addition, the security and privacy of personal health da...

  • Article
  • Open Access
6 Citations
35,544 Views
15 Pages

A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks

  • Hyeonsu Byun,
  • Jueun Kim,
  • Yunseok Jeong,
  • Byoungjin Seok,
  • Seonghyeon Gong and
  • Changhoon Lee

Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually. However, many studies focus on large-s...

  • Article
  • Open Access
53 Citations
35,295 Views
13 Pages

Ethical ChatGPT: Concerns, Challenges, and Commandments

  • Jianlong Zhou,
  • Heimo Müller,
  • Andreas Holzinger and
  • Fang Chen

28 August 2024

Large language models, e.g., Chat Generative Pre-Trained Transformer (also known as ChatGPT), are currently contributing enormously to making artificial intelligence even more popular, especially among the general population. However, such chatbot mo...

  • Article
  • Open Access
92 Citations
34,601 Views
21 Pages

Thermal Runaway Characteristics and Gas Composition Analysis of Lithium-Ion Batteries with Different LFP and NCM Cathode Materials under Inert Atmosphere

  • Hengjie Shen,
  • Hewu Wang,
  • Minghai Li,
  • Cheng Li,
  • Yajun Zhang,
  • Yalun Li,
  • Xinwei Yang,
  • Xuning Feng and
  • Minggao Ouyang

During thermal runaway (TR), lithium-ion batteries (LIBs) produce a large amount of gas, which can cause unimaginable disasters in electric vehicles and electrochemical energy storage systems when the batteries fail and subsequently combust or explod...

  • Article
  • Open Access
160 Citations
33,932 Views
21 Pages

YOLO-Drone: An Optimized YOLOv8 Network for Tiny UAV Object Detection

  • Xianxu Zhai,
  • Zhihua Huang,
  • Tao Li,
  • Hanzheng Liu and
  • Siyuan Wang

30 August 2023

With the widespread use of UAVs in commercial and industrial applications, UAV detection is receiving increasing attention in areas such as public safety. As a result, object detection techniques for UAVs are also developing rapidly. However, the sma...

  • Review
  • Open Access
38 Citations
32,243 Views
22 Pages

Deepfakes are notorious for their unethical and malicious applications to achieve economic, political, and social reputation goals. Recent years have seen widespread facial forgery, which does not require technical skills. Since the development of ge...

  • Review
  • Open Access
172 Citations
32,099 Views
23 Pages

Dropout is one of the most popular regularization methods in the scholarly domain for preventing a neural network model from overfitting in the training phase. Developing an effective dropout regularization technique that complies with the model arch...

  • Review
  • Open Access
28 Citations
31,974 Views
20 Pages

Temporary Bonding and Debonding in Advanced Packaging: Recent Progress and Applications

  • Zihao Mo,
  • Fangcheng Wang,
  • Jinhui Li,
  • Qiang Liu,
  • Guoping Zhang,
  • Weimin Li,
  • Chunlei Yang and
  • Rong Sun

Temporary bonding/debonding (TBDB) technologies have greatly contributed to the reliable fabrication of thin devices. However, the rapid development of large-scale, high-precision and ultra-thin devices in the semiconductor field has also proposed mo...

  • Article
  • Open Access
124 Citations
31,835 Views
18 Pages

Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey

  • Antonio João Gonçalves de Azambuja,
  • Christian Plesker,
  • Klaus Schützer,
  • Reiner Anderl,
  • Benjamin Schleich and
  • Vilson Rosa Almeida

The increase in cyber-attacks impacts the performance of organizations in the industrial sector, exploiting the vulnerabilities of networked machines. The increasing digitization and technologies present in the context of Industry 4.0 have led to a r...

  • Feature Paper
  • Review
  • Open Access
99 Citations
31,755 Views
29 Pages

The Influence of Emerging Technologies on Distance Education

  • Magdalena Garlinska,
  • Magdalena Osial,
  • Klaudia Proniewska and
  • Agnieszka Pregowska

Recently, during the COVID-19 pandemic, distance education became mainstream. Many students were not prepared for this situation—they lacked equipment or were not even connected to the Internet. Schools and government institutions had to react...

  • Article
  • Open Access
50 Citations
31,430 Views
26 Pages

15 October 2023

Email phishing is a widespread cyber threat that can result in the theft of sensitive information and financial loss. It uses malicious emails to trick recipients into providing sensitive information or transferring money, often by disguising themsel...

  • Systematic Review
  • Open Access
71 Citations
31,297 Views
89 Pages

IoT Solutions with Artificial Intelligence Technologies for Precision Agriculture: Definitions, Applications, Challenges, and Opportunities

  • Elisha Elikem Kofi Senoo,
  • Lia Anggraini,
  • Jacqueline Asor Kumi,
  • Luna Bunga Karolina,
  • Ebenezer Akansah,
  • Hafeez Ayo Sulyman,
  • Israel Mendonça and
  • Masayoshi Aritsugi

The global agricultural sector confronts significant obstacles such as population growth, climate change, and natural disasters, which negatively impact food production and pose a threat to food security. In response to these challenges, the integrat...

  • Article
  • Open Access
31 Citations
31,094 Views
22 Pages

28 August 2023

Information-technology (IT) security standards are regularly updated in a rapidly changing technological world to maintain pace with advanced technologies. This study was motivated by the realization that established IT risk-management frameworks mig...

  • Article
  • Open Access
18 Citations
30,826 Views
21 Pages

Performance Comparison of VVC, AV1, HEVC, and AVC for High Resolutions

  • Miroslav Uhrina,
  • Lukas Sevcik,
  • Juraj Bienik and
  • Lenka Smatanova

Over the years, there has been growing interest in multimedia services, especially in the video domain, where firms and subscribers require higher resolutions, framerates, and sampling precision. This results in a huge amount of data that needs to be...

  • Review
  • Open Access
235 Citations
30,789 Views
29 Pages

Unlocking the Potential: A Comprehensive Evaluation of Augmented Reality and Virtual Reality in Education

  • Mohammed A. M. AlGerafi,
  • Yueliang Zhou,
  • Mohamed Oubibi and
  • Tommy Tanu Wijaya

20 September 2023

Augmented Reality (AR) and Virtual Reality (VR) are poised to revolutionize education by offering immersive and interactive learning experiences. This research comprehensively evaluates the educational applications of AR and VR, specifically emphasiz...

  • Review
  • Open Access
40 Citations
30,359 Views
21 Pages

Cybersecurity in Autonomous Vehicles—Are We Ready for the Challenge?

  • Irmina Durlik,
  • Tymoteusz Miller,
  • Ewelina Kostecka,
  • Zenon Zwierzewicz and
  • Adrianna Łobodzińska

The rapid development and deployment of autonomous vehicles (AVs) present unprecedented opportunities and challenges in the transportation sector. While AVs promise enhanced safety, efficiency, and convenience, they also introduce significant cyberse...

  • Review
  • Open Access
102 Citations
30,280 Views
34 Pages

Review of Industry 4.0 from the Perspective of Automation and Supervision Systems: Definitions, Architectures and Recent Trends

  • Francisco Javier Folgado,
  • David Calderón,
  • Isaías González and
  • Antonio José Calderón

16 February 2024

Industry 4.0 is a new paradigm that is transforming the industrial scenario. It has generated a large amount of scientific studies, commercial equipment and, above all, high expectations. Nevertheless, there is no single definition or general agreeme...

  • Review
  • Open Access
18 Citations
29,679 Views
36 Pages

8 September 2024

Blockchain technology has gained significant attention in recent years for its potential to revolutionize various sectors, including finance, supply chain management, and digital forensics. While blockchain’s decentralization enhances security,...

  • Feature Paper
  • Review
  • Open Access
23 Citations
29,466 Views
12 Pages

Application of Artificial Intelligence Techniques to Detect Fake News: A Review

  • Maialen Berrondo-Otermin and
  • Antonio Sarasa-Cabezuelo

18 December 2023

With the rapid growth of social media platforms and online news consumption, the proliferation of fake news has emerged as a pressing concern. Detecting and combating fake news has become crucial in ensuring the accuracy and reliability of informatio...

  • Systematic Review
  • Open Access
52 Citations
28,961 Views
26 Pages

A Systematic Review on Deep-Learning-Based Phishing Email Detection

  • Kutub Thakur,
  • Md Liakat Ali,
  • Muath A. Obaidat and
  • Abu Kamruzzaman

5 November 2023

Phishing attacks are a growing concern for individuals and organizations alike, with the potential to cause significant financial and reputational damage. Traditional methods for detecting phishing attacks, such as blacklists and signature-based tech...

  • Review
  • Open Access
86 Citations
28,647 Views
63 Pages

Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives

  • Dimitris Kanellopoulos,
  • Varun Kumar Sharma,
  • Theodor Panagiotakopoulos and
  • Achilles Kameas

Numerous municipalities employ the smart city model in large cities to improve the quality of life of their residents, utilize local resources efficiently, and save operating expenses. This model incorporates many heterogeneous technologies such as C...

  • Article
  • Open Access
29 Citations
28,307 Views
19 Pages

In the context of the industrial revolution 4.0 that is firmly taking place globally, the digital transformation process is considered a revolution that changes the operating and business model. In Vietnam, logistics is one of eight areas that need t...

  • Review
  • Open Access
57 Citations
27,241 Views
23 Pages

Along with the growing of population and social and technological improvements, the use of energy and natural resources has risen over the past few decades. The sustainability of using coal, oil, and natural gas as the main energy sources faces, howe...

  • Article
  • Open Access
5 Citations
27,198 Views
16 Pages

24 October 2024

Side-channel attacks (SCAs) are powerful techniques used to recover keys from electronic devices by exploiting various physical leakages, such as power, timing, and heat. Although heat is one of the less frequently analyzed channels due to the high n...

  • Review
  • Open Access
52 Citations
27,079 Views
19 Pages

Cybersecurity Risk Analysis in the IoT: A Systematic Review

  • Thanaa Saad AlSalem,
  • Mohammed Amin Almaiah and
  • Abdalwali Lutfi

20 September 2023

The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising significant concerns about future cybersecurity risks and the need for reliable solutions. This study conducts a comprehensive systematic literature review to ex...

  • Feature Paper
  • Review
  • Open Access
101 Citations
26,326 Views
35 Pages

Reviewing Federated Learning Aggregation Algorithms; Strategies, Contributions, Limitations and Future Perspectives

  • Mohammad Moshawrab,
  • Mehdi Adda,
  • Abdenour Bouzouane,
  • Hussein Ibrahim and
  • Ali Raad

The success of machine learning (ML) techniques in the formerly difficult areas of data analysis and pattern extraction has led to their widespread incorporation into various aspects of human life. This success is due in part to the increasing comput...

  • Review
  • Open Access
26 Citations
26,298 Views
83 Pages

21 December 2024

Large language model-related technologies have shown astonishing potential in tasks such as machine translation, text generation, logical reasoning, task planning, and multimodal alignment. Consequently, their applications have continuously expanded...

  • Review
  • Open Access
122 Citations
26,247 Views
30 Pages

The concept of learning has multiple interpretations, ranging from acquiring knowledge or skills to constructing meaning and social development. Machine Learning (ML) is considered a branch of Artificial Intelligence (AI) and develops algorithms that...

  • Review
  • Open Access
39 Citations
26,219 Views
26 Pages

Advances in Robotic Surgery: A Review of New Surgical Platforms

  • Paola Picozzi,
  • Umberto Nocco,
  • Chiara Labate,
  • Isabella Gambini,
  • Greta Puleo,
  • Federica Silvi,
  • Andrea Pezzillo,
  • Rocco Mantione and
  • Veronica Cimolin

27 November 2024

In recent decades, the development of surgical systems which minimize patient impact has been a major focus for surgeons and researchers, leading to the advent of robotic systems for minimally invasive surgery. These technologies offer significant pa...

  • Review
  • Open Access
38 Citations
26,031 Views
36 Pages

Overview on Battery Charging Systems for Electric Vehicles

  • Pierpaolo Dini,
  • Sergio Saponara and
  • Antonio Colicelli

17 October 2023

Catalyzed by the increasing interest in bi-directional electric vehicles, this paper delves into their significance and the challenges they encounter. Bi-directional electric vehicles not only serve as transportation but also function as essential el...

  • Review
  • Open Access
33 Citations
25,913 Views
17 Pages

E-commerce platforms enable companies of all sizes to sell their items and promote their brand to a broader audience. The e-commerce sector is continually developing, as new technology and methods of purchasing and selling services and items are deve...

  • Article
  • Open Access
56 Citations
25,425 Views
17 Pages

Review of Wafer Surface Defect Detection Methods

  • Jianhong Ma,
  • Tao Zhang,
  • Cong Yang,
  • Yangjie Cao,
  • Lipeng Xie,
  • Hui Tian and
  • Xuexiang Li

Wafer surface defect detection plays an important role in controlling product quality in semiconductor manufacturing, which has become a research hotspot in computer vision. However, the induction and summary of wafer defect detection methods in the...

  • Review
  • Open Access
67 Citations
25,334 Views
32 Pages

Augmented Reality: Current and New Trends in Education

  • Dorota Kamińska,
  • Grzegorz Zwoliński,
  • Anna Laska-Leśniewicz,
  • Rui Raposo,
  • Mário Vairinhos,
  • Elisabeth Pereira,
  • Frane Urem,
  • Martina Ljubić Hinić,
  • Rain Eric Haamer and
  • Gholamreza Anbarjafari

21 August 2023

The educational landscape is an environment prone to change due to the volatile and ever-changing nature of the digital society in which we all live. Although the world moves at different speeds and any generalization is bound to have some exceptions...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292