Topic Review
HAR in Smart Homes
Human Activity Recognition (HAR) consists in monitoring and analyzing the behavior of one or more persons in order to deduce their activity. In a smart home context, the HAR consists in monitoring daily activities of the residents, based on a network of IoT devices. Owing to this monitoring, a smart home can offer personalized home assistance services to improve quality of life, autonomy and health of their residents, especially for elderly and dependent people.
  • 796
  • 19 Nov 2021
Topic Review
Crackdown
Crackdown is a series of action-adventure video games created by David Jones and published by Xbox Game Studios. The series takes place in a futuristic dystopian city controlled and enforced by a secret organization called the Agency. The games center on the Agency's super soldiers, known as 'Agents', as they fight threats ranging from various criminal syndicates, a terrorist group known as 'Cell', and zombie-like monsters called 'Freaks'. Games of the series have been developed by various game developers, with the first game Crackdown completed by Realtime Worlds on February 20, 2007, and a sequel called Crackdown 2 developed by Ruffian Games on July 6, 2010. Both games were released for the Xbox 360. A third installment Crackdown 3 developed by Sumo Digital was released on February 15, 2019 for Xbox One and Microsoft Windows. Although Crackdown started as a game that was released with access codes for the Halo 3 multiplayer beta, the game itself has been met with positive critical reception and won several video game awards. Critics praised the sandbox style third-person shooter for allowing the ability to cause massive destruction in a non-linear gameplay, while also criticizing the series for lacking an actual story. The series has garnered mostly positive reception and commercial success.
  • 796
  • 20 Oct 2022
Topic Review
Location-Aware Wi-Fi Authentication Scheme
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. A location-aware authentication scheme was proposed, using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. The smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.
  • 796
  • 01 Nov 2020
Topic Review
Nominet UK
Nominet UK is the .uk domain name registry in the United Kingdom , which was founded by Dr Willie Black and five others on 14 May 1996 when its predecessor, the "Naming Committee" was unable to deal with the volume of registrations then being sought under the .uk domain. Nominet is a non-profit company limited by guarantee. It has members who act as shareholders, but without the right to participate in the profits of the company. Anyone can become a member, but most members are internet service providers who are also registrars. As one of the first professional ccTLD operators, Nominet became the model for many other operators worldwide. Customers wishing to register a domain do not approach Nominet directly but register the domain via a domain registrar – a business entity authorised by Nominet to register and manage .uk domains on behalf of customers. Registrars for .uk domains were formerly known as "tagholders". As of 2019, the .uk register held over 12,000,000 .uk domain names, making it the fourth largest ccTLD in the world. Nominet also deals with disputes about registrations of .uk domain names, via its Dispute Resolution Service (DRS) which is similar to the UDRP system used for generic Top Level Domain Names, but with certain innovations such as a free mediation service. Nominet, which operates the .uk domain, has launched a charitable foundation, the Nominet Trust, funded with Nominet grants.
  • 795
  • 23 Nov 2022
Topic Review
Optimal Interpolation for infrared satellite data
Thermal infrared remote sensing measurements are blinded to surface emissions under cloudiness because infrared sensors cannot penetrate thick cloud layers. Therefore, surface and atmospheric parameters can be retrieved only in clear sky conditions giving origin to spatial fields flagged with missing pieces of information. Motivated by this we present a methodology to retrieve missing values of some interesting geophysical variables retrieved from spatially scattered infrared satellite observations in order to yield level 3 (L3), regularly gridded, data. The technique is based on a 2-Dimensional (2D) Optimal Interpolation (OI) scheme. The goodness of the approach has been tested on 15-min temporal resolution Spinning Enhanced Visible and Infrared Imager (SEVIRI) emissivity and surface temperature (ST) products over South Italy (land and sea), on Infrared Atmospheric Sounding Interferometer (IASI) atmospheric ammonia (NH3) concentration over North Italy and carbon monoxide (CO), sulfur dioxide (SO2) and NH3 concentrations over China. Sea surface temperature (SST) retrievals have been compared with gridded data from MODIS (Moderate-resolution Imaging Spectroradiometer) observations. For gases concentration, we have considered data from 3 different emission inventories, that is, Emissions Database for Global Atmospheric Research v3.4.2 (EDGARv3.4.2), the Regional Emission inventory in ASiav3.1 (REASv3.1) and MarcoPolov0.1, plus an independent study.
  • 794
  • 30 Oct 2020
Topic Review
UBB.threads
UBB.threads (formerly WWWThreads) is an Internet forum software package originally written by Rick Baker. Written with PHP using a MySQL database backend, it is comparable to other forum software written in PHP. WWWThreads was originally written in Perl starting in 1997, then a PHP version was made in 2000. WWWThreads was notable for being one of the first forum software packages to support both flat and threaded discussion. In 2001, WWWThreads was acquired by Infopop Corporation (later known as Groupee, Inc. and now known as Social Strata), owners of the Ultimate Bulletin Board software. It was consequently renamed UBB.threads. After WWWThreads' acquisition by Infopop, the Perl version of WWWThreads was discontinued. The last Perl version of WWWThreads was version 5.4.3. All subsequent versions of UBB.threads starting with version 5.5 were released in PHP only. UBB.threads 6.0 was released in the spring of 2002. The current version is 7.6.2. On January 1, 2010, UBB.threads was spun off from Social Strata, and sold to Mindraven, Inc. However, in June 2011, UBB.threads was sold to UBB Systems.
  • 793
  • 09 Nov 2022
Topic Review
BlackDog
The BlackDog is a pocket-sized, self-contained computer with a built-in biometric fingerprint reader which was developed in 2005 by Realm Systems, which is plugged into and powered by the USB port of a host computer using its peripheral devices for input and output. It is a mobile personal server which allows a user to use Linux, ones applications and data on any computer with a USB port. The host machine's monitor, keyboard, mouse, and Internet connection are used by the BlackDog for the duration of the session. As the system is self-contained and isolated from the host, requiring no additional installation, it is possible to make use of untrusted computers, yet using a secure system. Various hardware iterations exist, and the original developer Realm Systems closed down in 2007, being picked up by the successor Inaura, Inc.
  • 793
  • 15 Nov 2022
Topic Review
Technology Roadmap
A technology roadmap is a flexible planning schedule to support strategic and long-range planning, by matching short-term and long-term goals with specific technology solutions. It is a plan that applies to a new product or process and may include using technology forecasting or technology scouting to identify suitable emerging technologies. It is a known technique to help manage the fuzzy front-end of innovation. It is also expected that roadmapping techniques may help companies to survive in turbulent environments and help them to plan in a more holistic way to include non-financial goals and drive towards a more sustainable development. Here roadmaps can be combined with other corporate foresight methods to facilitate systemic change. Developing a roadmap has three major uses. It helps reach a consensus about a set of needs and the technologies required to satisfy those needs, it provides a mechanism to help forecast technology developments, and it provides a framework to help plan and coordinate technology developments. It may also be used as an analysis tool to map the development and emergence from new industries.
  • 792
  • 29 Nov 2022
Topic Review
Physical Layer Authentication in Wireless Networks
The physical layer security of wireless networks is becoming increasingly important because of the rapid development of wireless communications and the increasing security threats. In addition, because of the open nature of the wireless channel, authentication is a critical issue in wireless communications. Physical layer authentication (PLA) is based on distinctive features to provide information-theory security and low complexity.
  • 790
  • 15 Mar 2023
Topic Review
IoT and Machine Learning
Machine learning (ML) is a powerful tool that delivers insights hidden in Internet of Things (IoT) data. These hybrid technologies work smartly to improve the decision-making process in different areas such as education, security, business, and the healthcare industry. ML empowers the IoT to demystify hidden patterns in bulk data for optimal prediction and recommendation systems. Healthcare has embraced IoT and ML so that automated machines make medical records, predict disease diagnoses, and, most importantly, conduct real-time monitoring of patients. Individual ML algorithms perform differently on different datasets. Due to the predictive results varying, this might impact the overall results. The variation in prediction results looms large in the clinical decision-making process. Therefore, it is essential to understand the different ML algorithms used to handle IoT data in the healthcare sector.
  • 789
  • 16 Jun 2021
  • Page
  • of
  • 366
ScholarVision Creations