Topic Review
Water Quality Monitoring System Using LoRaWAN
For effective process monitoring and enhanced control in wide areas, reliable and accurate real-time measuring is essential. LoRa, a low-power, wide-area network modulation technology (LPWAN), refers to long-range data communications. LoRa allows for long-range communications of up to three miles or five kilometers in urban areas and up to ten miles or 15 km in rural areas. The ultra-low power requirements of LoRa-based systems are a crucial feature, allowing for the design of battery-operated devices that can last up to 10 years. A star network based on the open LoRaWAN protocol is suitable for an implementation scheme that needs long-range or deep in-building communication.
  • 1.3K
  • 29 Jun 2022
Topic Review
Water Molecules and Electroconvection on Salt Ion Transport
Electrodialysis has gained global recognition as a water purification method with the potential to enhance the overall efficiency of the purification process. The efficiency of electrodialysis depends strongly on the hydrodynamics of the process, as the advent of new high performance membranes on the world market removes the kinetic limitations associated with membranes and shifts the stage that determines the economic efficiency of desalination towards the liquid phase.
  • 179
  • 31 Jan 2024
Topic Review
Warning Systems in Cloud Computing Early Warning Systems
An early warning system (EWS) is an integrated system that facilitates preparedness and response mechanisms through the dissemination of early warning to reduce the impact of a natural disaster. An early warning system is an indispensable tool that helps save lives and reduce the impact of disasters on any infrastructure, such as roads, buildings, farmlands, etc. It has been estimated that USD 800 million is spent annually to develop and operationalize EWSs in developing countries that lack the requisite resources to mitigate the impact of any natural disaster.
  • 220
  • 22 Sep 2023
Topic Review
Wargaming
A wargame (also war game) is a strategy game that deals with military operations of various types, real or fictional. Wargaming is the hobby dedicated to the play of such games, which can also be called conflict simulations, or consims for short. When used professionally by the military to study warfare, "war game" may refer to a simple theoretical study or a full-scale military exercise. Hobby wargamers have traditionally used "wargame", while the military has generally used "war game"; this is not a hard rule. Although there may be disagreements as to whether a particular game qualifies as a wargame or not, a general consensus exists that all such games must explore and represent some feature or aspect of human behaviour directly bearing on the conduct of war, even if the game subject itself does not concern organized violent conflict or warfare. Business wargames exist as well, but in general, they are only role-playing games based on market situations. Wargames are generally categorized as historical, hypothetical, fantasy, or science fiction. Historical games form by far the largest group. These games are based upon real events and attempt to represent a reasonable approximation of the actual forces, terrain, and other material factors faced by the actual participants. Hypothetical games are games grounded in historical fact but concern battles or conflicts that did not (or have yet to) actually happen. Fantasy and science fiction wargames either draw their inspiration from works of fiction or provide their own imaginary setting. Highly stylized conflict games such as chess are not generally considered wargames, although they are recognized as being related. Games involving conflict in other arenas than the battlefield, such as business, sports or natural environment are similarly usually excluded. The modern wargaming hobby has its origins at the beginning of the 19th century, with von Reiswitz's Kriegsspiel rules. Later, H.G. Wells' book Little Wars ushered in the age of miniatures games in which two or more players simulated a battle as a pastime. During the 1950s the first large-scale, mass-produced board games depicting military conflicts were published. These games were at the height of their popularity during the 1970s, and became quite complex and technical in that time. Wargaming has changed dramatically over the years, from its roots in miniatures and board wargaming, to contemporary computer and computer assisted wargames; however, both miniature and board wargames maintain a healthy, if small, hobby market with lighter games being popular with many 'non-wargamers'.
  • 753
  • 10 Oct 2022
Topic Review
WannaCry Ransomware Attack
The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated through EternalBlue, an exploit developed by the United States National Security Agency (NSA) for older Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches were imperative to organizations' cyber security but many were not implemented due to ignorance of their importance. Some have claimed a need for 24/7 operation, aversion to risking having formerly working applications breaking because of patch changes, lack of personnel or time to install them, or other reasons. The attack began at 07:44 UTC on 12 May 2017 and was halted a few hours later at 15:03 UTC by the registration of a kill switch discovered by Marcus Hutchins. The kill switch prevented already infected computers from being encrypted or further spreading WannaCry. The attack was estimated to have affected more than 200,000 computers across 150 countries, with total damages ranging from hundreds of millions to billions of United States dollar . Security experts believed from preliminary evaluation of the worm that the attack originated from North Korea or agencies working for the country. In December 2017, the United States and United Kingdom formally asserted that North Korea was behind the attack. A new variant of WannaCry forced Taiwan Semiconductor Manufacturing Company (TSMC) to temporarily shut down several of its chip-fabrication factories in August 2018. The virus spread to 10,000 machines in TSMC's most advanced facilities.
  • 1.8K
  • 14 Oct 2022
Topic Review
Wannacry
The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated through EternalBlue, an exploit developed by the United States National Security Agency (NSA) for older Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches were imperative to organizations' cyber security but many were not implemented due to ignorance of their importance. Some have claimed a need for 24/7 operation, aversion to risking having formerly working applications breaking because of patch changes, lack of personnel or time to install them, or other reasons. The attack began at 07:44 UTC on 12 May 2017 and was halted a few hours later at 15:03 UTC by the registration of a kill switch discovered by Marcus Hutchins. The kill switch prevented already infected computers from being encrypted or further spreading WannaCry. The attack was estimated to have affected more than 200,000 computers across 150 countries, with total damages ranging from hundreds of millions to billions of United States dollar . Security experts believed from preliminary evaluation of the worm that the attack originated from North Korea or agencies working for the country. In December 2017, the United States and United Kingdom formally asserted that North Korea was behind the attack. A new variant of WannaCry forced Taiwan Semiconductor Manufacturing Company (TSMC) to temporarily shut down several of its chip-fabrication factories in August 2018. The virus spread to 10,000 machines in TSMC's most advanced facilities.
  • 1.2K
  • 23 Oct 2022
Topic Review
Walking Recognition in Mobile Devices
Presently, smartphones are used more and more for purposes that have nothing to do with phone calls or simple data transfers. One example is the recognition of human activity, which is relevant information for many applications in the domains of medical diagnosis, elderly assistance, indoor localization, and navigation. The information captured by the inertial sensors of the phone (accelerometer, gyroscope, and magnetometer) can be analyzed to determine the activity performed by the person who is carrying the device, in particular in the activity of walking. Nevertheless, the development of a standalone application able to detect the walking activity starting only from the data provided by these inertial sensors is a complex task. This complexity lies in the hardware disparity, noise on data, and mostly the many movements that the smartphone can experience and which have nothing to do with the physical displacement of the owner. In this work, we explore and compare several approaches for identifying the walking activity. We categorize them into two main groups: the first one uses features extracted from the inertial data, whereas the second one analyzes the characteristic shape of the time series made up of the sensors readings. Due to the lack of public datasets of inertial data from smartphones for the recognition of human activity under no constraints, we collected data from 77 different people who were not connected to this research. Using this dataset, which we published online, we performed an extensive experimental validation and comparison of our proposals.
  • 996
  • 01 Nov 2020
Topic Review
Vulnerabilities and Potential Threats of Cloud computing
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology.
  • 667
  • 28 Mar 2022
Topic Review
Vulgar Word Extraction in Chittagonian Dialect of Bangla
The proliferation of the internet, especially on social media platforms, has amplified the prevalence of cyberbullying and harassment. Addressing this issue involves harnessing natural language processing (NLP) and machine learning (ML) techniques for the automatic detection of harmful content. However, these methods encounter challenges when applied to low-resource languages like the Chittagonian dialect of Bangla. This entry compares two approaches for identifying offensive language containing vulgar remarks in Chittagonian. The first relies on basic keyword matching, while the second employs machine learning and deep learning techniques. The keyword- matching approach involves scanning the text for vulgar words using a predefined lexicon. Despite its simplicity, this method establishes a strong foundation for more sophisticated ML and deep learning approaches. An issue with this approach is the need for constant updates to the lexicon.
  • 289
  • 17 Nov 2023
Topic Review
VRPN
VRPN (Virtual-Reality Peripheral Network) is a device-independent, network-based interface for accessing virtual reality peripherals in VR applications. It was originally designed and implemented by Russell M. Taylor II at the Department of Computer Science of the University of North Carolina at Chapel Hill. VRPN was maintained and supported by Sensics while it was business. It is currently maintained by ReliaSolve and developed in collaboration with a productive community of contributors. It is described more fully at vrpn.org and in VRPN-VRST. The purpose of VRPN is to provide a unified interface to input devices, like motion trackers or joystick controllers. It also provides the following: The VRPN system consists of programming interfaces for both the client application and the hardware drivers and a server application that communicates with the hardware devices. The client interfaces are written in C++ but have been wrapped in C#, Python and Java. A typical application of VRPN is to encode and send 6DoF motion capture data through the network in real time.
  • 436
  • 28 Nov 2022
  • Page
  • of
  • 365
Video Production Service