News & Updates

News & Insight

Blogs

Green screen, can we use other colors?

Nowadays, content creators are increasingly creating content in the form of photos and videos using green screen techniques, Stewart and Alina channels...

IAES Nawala: AI in professional fields

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala of the Institute of Advanced Engineering and...

Smart poster in the tourism sector

Implementation of the Internet of Things (IoT) on a poster using near-field communication (NFC) technology. Hamzah et al. (2022) designed a smart...

IAES Nawala: How AI improve our healthcare service

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala from the Institute of Advanced Engineering and...
1 2 3 4 5 6 17

Announcements

Top 3 topics of evaluation and research in education at IJERE February 2024

The International Journal of Evaluation and Research in Education (IJERE) is a journal that publishes education research. The journal covers various educational...

Top 3 topics on BEEI February 2024

Bulletin of Electrical Engineering and Informatics (BEEI) publishes scientific papers in the fields of electrical engineering, computers, and informatics. Topics include things...

Top 4 AI topics in IJ-AI January 2024

Artificial intelligence (AI) is a field that many researchers are keen to develop. AI is a very broad and dynamic field. Here...

National Taiwan University Masters Scholarship

National Taiwan University (NTU) offers various scholarships for international students, which can be applied for along with submitting your application for admission....
1 2 3 4 5 6 13

News

Scopus discontinued titles January-October 2023

Scopus is an abstract and citation database used by researchers, academics, and institutions to track and analyze scientific literature. The database covers...

A cybercriminal service circumvents Android security measures to implant malicious software

A new cybercrime operation called ‘SecuriDropper’ has emerged, which uses a method to bypass the ‘Restricted Settings’ feature in Android to install...

Cybercriminals are employing the Citrix Bleed vulnerability to target government networks on a global scale

Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such...

Prolific Puma, An Obscure Link-Shortening Service, Has Been Revealed As A Hub For Cybercriminal Activities Through An Analysis Of DNS Data

A figure known as Prolific Puma, identified by security experts, has been offering cybercriminals the service of shortening links for over four...
1 2 3 4 5 6 21