MIT computer scientists have developed a system that learns to identify objects within an image, based on a spoken description of the image. Given an image and an audio caption, the model will highlight in real-time the relevant regions of the image being described.
RUDN University mathematicians simulated the work of a cellular network. In their model unmanned aerial vehicles are employed as additional transmitters. Most of the available communication systems give a flat coverage and do not take into account the difference in altitude, which results in the appearance of the so-called 'blind' zones. Flying drones will help in solving this issue. The work is published in the journal IEEE Transactions on Vehicular Technology.
Researchers find AI-generated reviews and comments pose a significant threat to consumers, but machine learning can help detect the fakes.
Hateful text and comments are an ever-increasing problem in online environments, yet addressing the rampant issue relies on being able to identify toxic content. A new study by the Aalto University Secure Systems research group has discovered weaknesses in many machine learning detectors currently used to recognize and keep hate speech at bay.
New research in the INFORMS journal Operations Research has found a way to identify extremists, such as those associated with the terrorist group ISIS, by monitoring their social media accounts, and can identify them even before they post threatening content.
Participants in cryptocurrency networks like Bitcoin need to be better at preempting beneficial software changes. This will ensure the security and privacy of addresses and transactions, and help retain the value of cryptocurrencies, says Benjamin Trump (ORISE Fellow, United States Army Corps of Engineers). He is the lead author of a study in Springer's journal Environment Systems and Decisions, which analyzes the governance challenges of many cryptocurrencies and explains why such challenges threaten the long-term usefulness of such cryptocurrencies.
Researchers investigating the use of Twitter to propagate or debunk conspiracy theories related to the 2015-2016 Zika virus outbreak analyzed the content of more than 25,000 Tweets and the characteristics of the social networks used to disseminate them.
A team of researchers from the U.S. Army Research Laboratory, the University of Canterbury in New Zealand and the Gwangju Institute of Science and Technology in the Republic of Korea have taken a step toward the development of moving target defense techniques in software-defined networks. This is a demanding cybersecurity research topic, scientists said.
Do you frequently forget passwords to a baffling array of accounts and websites? Much depends on a password's importance and how often you use it, according to a Rutgers University-New Brunswick-led study that could spur improved password technology and use.
There are many barriers to innovation in wireless communications. Inadequate documentation; uncooperative chipset manufacturers; widely varying hardware and software specifications; steep learning curves in the experimentation phase and difficulties in prototyping are among the biggest issues that hamper development.