Topic Review
Remote Attestation
Remote Attestation (RA) is a security mechanism to remotely detect adversarial presence on untrusted devices in order to guarantee their trustworthiness. RA runs as a two-party security protocol in which a trusted party (i.e., verifier) assures the integrity of the untrusted remote device (i.e., prover). Software-based RA approaches aim at verifying device integrity without relying on specialized hardware components. Despite their limited security guarantees, software-based RA approaches bring opportunities in attesting legacy and resource-constrained Internet of Things (IoT) devices, in which the presence of a hardware root-of-trust is not always a realistic assumption.
  • 4.4K
  • 31 Jan 2022
Topic Review
Internet of Things in the Industry Revolution 4.0
Researchers offers a wide range of information on Industry 4.0, finds research gaps and recommends future directions. Seven research questions are addressed: (i) What are the contributions of WSN in IR 4.0? (ii) What are the contributions of IoT in IR 4.0? (iii) What are the types of WSN coverage areas for IR 4.0? (iv) What are the major types of network intruders in WSN and IoT systems? (v) What are the prominent network security attacks in WSN and IoT? (vi) What are the significant issues in IoT and WSN frameworks? and (vii) What are the limitations and research gaps in the existing work? Researchers mainly focuses on the solutions and new techniques to automate Industry 4.0 and analyzed over 130 articles from 2014 until 2021. The entry covers several aspects of Industry 4.0, from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.
  • 4.1K
  • 16 Mar 2022
Topic Review
Digital Image Watermarking Techniques
Image authentication is an extremely significant concern for the digital revolution, as it is easy to alter any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed to find state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.
  • 4.1K
  • 29 Oct 2020
Topic Review
Control Flow Graph
A control flow graph (CFG) in computer science is a representation, using graph notation, of all paths that might be traversed through a program during its execution. The control flow graph is due to Frances E. Allen, who notes that Reese T. Prosser used boolean connectivity matrices for flow analysis before. The CFG is essential to many compiler optimizations and static analysis tools.
  • 4.1K
  • 28 Sep 2022
Topic Review
BitTorrent
BitTorrent is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a decentralized manner. To send or receive files, users use a BitTorrent client on their Internet-connected computer. A BitTorrent client is a computer program that implements the BitTorrent protocol. BitTorrent clients are available for a variety of computing platforms and operating systems, including an official client released by Rainberry, Inc. Popular clients include μTorrent, Xunlei Thunder, Transmission, qBittorrent, Vuze, Deluge, BitComet and Tixati. BitTorrent trackers provide a list of files available for transfer and allow the client to find peer users, known as "seeds", who may transfer the files. Programmer Bram Cohen designed the protocol in April 2001, and released the first available version on 2 July 2001. On 15 May 2017, BitTorrent, Inc. (later renamed Rainberry, Inc.) released BitTorrent v2 protocol specification. libtorrent was updated to support the new version on 6 September 2020. BitTorrent is one of the most common protocols for transferring large files, such as digital video files containing TV shows and video clips, or digital audio files containing songs. (As of February 2013) BitTorrent was responsible for 3.35% of all worldwide bandwidth—more than half of the 6% of total bandwidth dedicated to file sharing. In 2019, BitTorrent was a dominant file sharing protocol and generated a substantial amount of Internet traffic, with 2.46% of downstream, and 27.58% of upstream traffic. (As of 2013), BitTorrent had 15–27 million concurrent users at any time. (As of January 2012), BitTorrent is utilized by 150 million active users. Based on this figure, the total number of monthly users may be estimated to more than a quarter of a billion (≈ 250 million). The use of BitTorrent may sometimes be limited by Internet Service Providers (ISPs), on legal or copyright grounds. Users may choose to run seedboxes or virtual private networks (VPNs) to circumvent these restrictions.
  • 4.1K
  • 01 Nov 2022
Topic Review
IBM Mainframe Utility Programs
IBM mainframe utility programs are utility software supplied with IBM mainframe operating systems such as MVS and zOS to carry out various tasks associated with maintenance of the computer system or datasets. The following list describes utilities distributed with OS/360 and successors. No VSE or VM utilities are included.
  • 4.0K
  • 26 Oct 2022
Topic Review
Fedora Version History
Fedora is a popular Linux distribution developed by the community-supported Fedora Project and is sponsored by Red Hat. Fedora attempts to maintain a six-month release schedule, offering new versions in May and November, although some releases have experienced minor delays.
  • 3.9K
  • 28 Oct 2022
Topic Review
Roadside Unit Deployment in Internet of Vehicles Systems
The network technology known as Internet of Vehicles (IoV) has been developed to improve road safety and vehicle security, with the goal of servicing the digital demands of car drivers and passengers. The highly dynamical network topology that characterizes these networks, and which often leads to discontinuous transmissions, is one of the most significant challenges of IoV. To address this issue, IoV infrastructure-based components known as roadside units (RSU) are designed to play a critical role by providing continuous transmission coverage and permanent connectivity. The main challenges that arise when deploying RSUs are balancing IoVs’ performances and total cost so that optimal vehicle service coverage is provided with respect to some target Quality of Service (QoS) such as: service coverage, throughput, low latency, or energy consumption.
  • 3.6K
  • 05 May 2022
Topic Review
2020 Nintendo Data Leak
The 2020 Nintendo data leak, more commonly referred to as the Nintendo Gigaleak is a series of leaks of data from Japanese video game company Nintendo on the anonymous imageboard website 4chan. The releasing of data started in March 2018, but became most prominent in 2020. Nine main sets of data leaked on 4chan, ranging from game and console source code to internal documentation and development tools. The name "Gigaleak" mainly refers to the second leak on July 24, 2020, which was 3 gigabytes in size. The leaks are believed to have come either from companies contracted by Nintendo in the design of these consoles, or from individuals previously convicted of intrusion into Nintendo systems. An earlier, much smaller leak had also occurred in 2018 which had the Nintendo Space World 1997 demos for Pokémon Gold and Silver leaked. The leaks are infamous for the sheer size and the amount of internal material leaked; video game journalists have described the magnitude of the leaks as unprecedented, and suggested that they might have significant effects for emulation and to preservationists, in addition to the legal questions posed by the leak. As of May 2021, Nintendo has not made any official response.
  • 3.5K
  • 14 Oct 2022
Topic Review
Background on Computing Paradigms
General overview of the different mentioned paradigms needs to be provided in order to be oriented in the computing field. For clarity and consistency, each paradigm is carefully discussed concisely in the oncoming text. The reason for discussing each of these paradigms is to have an overview that will guide the understanding of the research goal for this entry, which is primarily the information security and privacy aspects for each paradigm.
  • 3.4K
  • 25 Feb 2022
Topic Review
Recognition Technologies of Hand Gesture
Hand gesture recognition plays a significant part in delivering diverse messages using hand gestures in the digital domain. Real-time hand gesture identification is now possible because of advancements in both imaging technology and image processing algorithmic frameworks.
  • 3.4K
  • 17 Jun 2022
Topic Review
Google+
Google Plus (stylized as Google+) is an Internet-based social network that is owned and operated by Google. The service, Google's fourth foray into social networking, experienced strong growth in its initial years, although usage statistics have varied, depending on how the service is defined. Three Google executives have overseen the service, which has undergone substantial changes leading to a redesign in November 2015. On October 8, 2018, Google announced that it was shutting down Google+ for consumers, citing low user engagement and a software error, first reported by The Wall Street Journal , that potentially exposed the data of hundreds of thousands of users. Google indicated that Google+ would operate until August 2019, allowing users to download and migrate their information.
  • 3.4K
  • 12 Oct 2022
Topic Review
Addiction and Spending in Gacha Games
Gacha games are the most dominant games on the mobile market. These are free-to-play games with a lottery-like system, where the user pays with in-game currency to enter a draw in order to obtain the character or item they want. If a player does not obtain what he hoped for, there is the option of paying with his own money for more draws, and this is the main way to monetize the Gacha game.
  • 3.1K
  • 21 Jul 2023
Topic Review
Integration of Blockchain Technology with Cloud Computing
Blockchain technology’s desirable characteristics are decentralization, integrity, immutability, verification, fault tolerance, anonymity, audibility, and transparency. There are many benefits of blockchain technology concerning cloud computing, including those associated with business data handling, privacy, and encryption. 
  • 3.1K
  • 29 Nov 2022
Topic Review
Comparison Between Esperanto and Interlingua
Esperanto and Interlingua are two planned languages which have taken radically different approaches to the problem of providing an International auxiliary language (IAL). Although they are both classed as IALs, the intellectual bases of Esperanto and Interlingua are quite different. It has been argued that each language is a successful implementation of a particular IAL model. However, in both language communities there is a polemical tradition of using external criteria to critique the perceived opponent language (that is, judging Interlingua by Esperantist criteria and vice versa). In practical use, moreover, language usage in the two communities has sometimes shown convergences despite divergent theory.
  • 3.1K
  • 18 Oct 2022
Topic Review
Pandora Radio
Pandora Media Inc. (also known as Pandora Internet Radio or simply Pandora) is a music streaming and automated music recommendation internet radio service powered by the Music Genome Project. As of August 1, 2017, the service, operated by Pandora Media, Inc., is available only in the United States. The service plays songs that have similar musical traits. The user then provides positive or negative feedback (as thumbs up or thumbs down) for songs chosen by the service, and the feedback is taken into account in the subsequent selection of other songs to play. The service can be accessed either through a web browser or with its mobile app. Pandora is a freemium service; basic features are free with advertisements or limitations, while additional features, such as improved streaming quality, music downloads and offline channels are offered via paid subscriptions. On September 24, 2018, Sirius XM Holdings announced its intent to acquire Pandora for $3.5 billion.
  • 3.0K
  • 15 Nov 2022
Topic Review
HBase Storage Architecture
HBase is the top option for storing huge data. HBase has been selected for several purposes, including its scalability, efficiency, strong consistency support, and the capacity to support a broad range of data models.
  • 2.9K
  • 21 Feb 2021
Topic Review
Big Data Analytics in COVID-19
The COVID-19 epidemic has caused a large number of human losses and havoc in the economic, social, societal, and health systems around the world. Controlling such epidemic requires understanding its characteristics and behavior, which can be identified by collecting and analyzing the related big data. Big data analytics tools play a vital role in building knowledge required in making decisions and precautionary measures. However, due to the vast amount of data available on COVID-19 from various sources, there is a need to review the roles of big data analysis in controlling the spread of COVID-19, presenting the main challenges and directions of COVID-19 data analysis, as well as providing a framework on the related existing applications and studies to facilitate future research on COVID-19 analysis.
  • 2.9K
  • 04 Jun 2021
Topic Review
Decentralized Smart IoT
Decentralized smart Internet of Things (IoT) refers to future IoT powered by blockchain-enabled edge intelligence. This new form of IoT is motivated by the recent advancement of distributed ledger technology (DLT), multi-access edge computing (MEC) and artificial intelligence (AI). The idea is to empower all kinds of IoT devices to observe, identify, and understand the world not by the help of humans but by cooperation and consensus among edge devices, in a secure and verifiable manner. Decentralized smart IoT will provide trust and intelligence to satisfy the sophisticated needs of industries and society.
  • 2.9K
  • 26 Apr 2021
Topic Review
HVAC Systems of Smart Building
Early fault detection and diagnosis in heating, ventilation and air conditioning (HVAC) systems may reduce the damage of equipment, improving the reliability and safety of smart buildings, generating social and economic benefits. Data models for fault detection and diagnosis are increasingly used for extracting knowledge in the supervisory tasks. This article proposes an autonomic cycle of data analysis tasks (ACODAT) for the supervision of the building’s HVAC systems. Data analysis tasks incorporate data mining models for extracting knowledge from the system monitoring, analyzing abnormal situations and automatically identifying and taking corrective actions. This article shows a case study of a real building’s HVAC system, for the supervision with our ACODAT, where the HVAC subsystems have been installed over the years, providing a good example of a heterogeneous facility. The proposed supervisory functionality of the HVAC system is capable of detecting deviations, such as faults or gradual increment of energy consumption in similar working conditions. The case study shows this capability of the supervisory autonomic cycle, usually a key objective for smart buildings.
  • 2.8K
  • 01 Jun 2021
  • Page
  • of
  • 25
ScholarVision Creations