Topic Review
AI-Based Wormhole Attack Detection Techniques
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. 
  • 1.1K
  • 12 Aug 2022
Topic Review
Machine Learning in Gastroenterology/Endoscopy
Over time, machine learning (ML), a component of artificial intelligence (AI), has been implemented in a variety of medical specialties, such as radiology, pathology, gastroenterology, neurology, obstetrics and gynecology, ophthalmology, and orthopedics, with the goal of improving the quality of healthcare and medical diagnosis. In clinical gastroenterology practice, due to technological developments, estimates show that AI could have the ability to create a predictive model; for instance, it could develop an ML model that can stratify the risk in patients with upper gastrointestinal bleeding, establish the existence of a specific gastrointestinal disease, define the best treatment, and offer prognosis and prediction of the therapeutic response. In this context, by applying ML or deep learning (DL) (AI using neural networks), clinical management in gastroenterology can begin to focus on more personalized treatment centered on the patient and based on making the best individual decisions, instead of relying mostly on guidelines developed for a specific condition. Moreover, the goal of implementing these AI-based algorithms is to increase the possibility of diagnosing a gastrointestinal disease at early stage or the ability to predict the development of a particular condition in advance. Because both AI and gastroenterology encompass many subdomains, the interaction between them might take on various forms. In recent years, we have witnessed a large explosion of research in attempts to improve various fields of gastroenterology, such as endoscopy, hepatology, inflammatory bowel diseases, and many others, with the aid of ML. We also note that, because of the requirement to diagnose more patients with gastrointestinal cancers at an early stage of the disease, which is associated with curative treatment and better prognosis, many studies were developed to address improvement of the detection of these tumors with the aid of AI. The term ML, introduced for the first time in 1959 by Arthur Samuel from the IBM company, refers to an IT domain whereby a computer system can acquire the ability to “learn” by using data without specific programming and can therefore develop a predictive mathematical algorithm based on input data, using recognition of “features”. The ML “model” is subsequently able to adapt to new situations in which it becomes able to predict and make decisions.
  • 1.1K
  • 02 Feb 2021
Topic Review
Microsoft Store (Digital)
Microsoft Store (formerly known as Windows Store) is a digital distribution platform owned by Microsoft. It started as an app store for Windows 8 and Windows Server 2012 as the primary means of distributing Universal Windows Platform (UWP) apps. With Windows 10, Microsoft merged its other distribution platforms (Windows Marketplace, Windows Phone Store, Xbox Music, Xbox Video, Xbox Store, and a web storefront also known as "Microsoft Store") into Microsoft Store, making it a unified distribution point for apps, console games, and digital videos. Digital music was included until the end of 2017, and E-books were included until 2019. Some content is available free of charge from the store. In 2015, over 669,000 apps were available on the store. Categories containing the largest number of apps are "Books and Reference", "Education", "Entertainment", and "Games". The majority of the app developers have one app. As with other similar platforms, such as the Google Play and Mac App Store, Microsoft Store is curated, and apps must be certified for compatibility and content. In addition to the user-facing Microsoft Store client, the store has a developer portal with which developers can interact. Microsoft takes 30% of the sale price for apps. Prior to January 1, 2015, this cut was reduced to 20% after the developer's profits reached $25,000.
  • 1.1K
  • 01 Nov 2022
Topic Review
Geant4-DNA Modeling of Water Radiolysis
In this work, we use the next sub-volume method (NSM) to investigate the possibility of using the compartment-based (“on-lattice”) model to simulate water radiolysis.
  • 1.1K
  • 24 Jun 2021
Topic Review
Virtual Synchrony
Virtual synchrony is an interprocess message passing (sometimes called ordered, reliable multicast) technology. Virtual synchrony systems allow programs running in a network to organize themselves into process groups, and to send messages to groups (as opposed to sending them to specific processes). Each message is delivered to all the group members, in the identical order, and this is true even when two messages are transmitted simultaneously by different senders. Application design and implementation is greatly simplified by this property: every group member sees the same events (group membership changes and incoming messages) in the same order. A virtually synchronous service is typically implemented using a style of programming called state machine replication, in which a service is first implemented using a single program that receives inputs from clients through some form of remote message passing infrastructure, then enters a new state and responds in a deterministic manner. The initial implementation is then transformed so that multiple instances of the program can be launched on different machines, using a virtually synchronous message passing system to replicate the incoming messages over the members. The replicas will see the same events in the same order, and are in the same states, hence they will make the same state transitions and remain in a consistent state. The replication of the service provides a form of fault-tolerance: if a replica fails (by crashing), the others remain and can continue to provide responses. Different members of the replica group can also be programmed to subdivide the workload, typically by using the group membership to determine their respective roles. This permits a group of N members to run as much as N times faster than a single member, or to handle N times as many requests, while continuing to offer fault-tolerance in the event of a crash. Virtual synchrony is distinguished from classical state machine replication because the model includes features whereby a programmer can request early (optimistic) delivery of messages, or relaxed forms of ordering. When used appropriately, these features can enable substantial speedup. However, the programmer needs to be sure that the relaxation of guarantees will not compromise correctness. For example, in a service that uses locking to protect concurrently updated data, the messaging system can be instructed to use an inexpensive form of message ordering, in which the messaging system respects the ordering in which individual senders send messages (FIFO guarantee) but does not attempt to impose an agreed order if messages are sent concurrently by different senders. Provided that the sender indeed held locks on the data, it can be shown that FIFO ordering suffices for correctness. The benefit is that FIFO ordering is much less costly to implement than total ordering for concurrent messages. To give another example, by delivering messages optimistically, virtual synchrony systems can outperform the Paxos that is normally required for implementation of state machine replication: Paxos normally requires a 2-phase protocol, whereas optimistic virtual synchrony protocols can deliver messages immediately upon their arrival. However, this could result in a violation of the safety property of the state machine replication model. To prevent such problems, the programmer who uses this feature is required to invoke a primitive called flush, which delays the caller until any optimistically delivered messages have reached all of the group members. Provided that the programmer understands this behavior and is careful to call flush before interacting with external clients or persistent storage, higher performance can be achieved without loss of safety. The flexibility associated with these limited forms of event reordering and optimistic early delivery permit virtual synchrony platforms to achieve extremely high data rates while still preserving very strong fault-tolerance and consistency guarantees.
  • 1.1K
  • 01 Dec 2022
Topic Review
Deep Learning for Accurate Real-Time Weed Detection
This article discusses the possibility of accurately detecting the position of weeds in real-time in real conditions. Presented detailed recommendations for solving the problem with scene density, considered ways for increasing accuracy, and FPS.
  • 1.1K
  • 09 Jan 2022
Topic Review
Clipboard (Computing)
The clipboard is a buffer that some operating systems provide for short-term storage and transfer within and between application programs. The clipboard is usually temporary and unnamed, and its contents reside in the computer's RAM. The clipboard provides an application programming interface by which programs can specify cut, copy and paste operations. It is left to the program to define methods for the user to command these operations, which may include keybindings and menu selections. When an element is copied or cut, the clipboard must store enough information to enable a sensible result no matter where the element is pasted. Application programs may extend the clipboard functions that the operating system provides. A clipboard manager may give the user additional control over the clipboard. Specific clipboard semantics vary among operating systems, can also vary between versions of the same system, and can sometimes be changed by programs and by user preferences. Windows, Linux and macOS support a single clipboard transaction.
  • 1.1K
  • 19 Oct 2022
Topic Review
3D Interaction
In computing, 3D interaction is a form of human-machine interaction where users are able to move and perform interaction in 3D space. Both human and machine process information where the physical position of elements in the 3D space is relevant. The 3D space used for interaction can be the real physical space, a virtual space representation simulated in the computer, or a combination of both. When the real space is used for data input, humans perform actions or give commands to the machine using an input device that detects the 3D position of the human action. When it is used for data output, the simulated 3D virtual scene is projected onto the real environment through one output device or a combination of them.
  • 1.1K
  • 29 Nov 2022
Topic Review
Free Software License
A free-software license is a notice that grants the recipient of a piece of software extensive rights to modify and redistribute that software. These actions are usually prohibited by copyright law, but the rights-holder (usually the author) of a piece of software can remove these restrictions by accompanying the software with a software license which grants the recipient these rights. Software using such a license is free software (or free and open-source software) as conferred by the copyright holder. Free-software licenses are applied to software in source code and also binary object-code form, as the copyright law recognizes both forms.
  • 1.1K
  • 21 Nov 2022
Topic Review
Speakwrite
Newspeak is the language of Oceania, a fictional totalitarian state and the setting of the dystopian novel Nineteen Eighty-Four (1949), by George Orwell. To meet the ideological requirements of English Socialism (Ingsoc) in Oceania, the ruling Party created Newspeak, a controlled language of restricted grammar and limited vocabulary, meant to limit the freedom of thought—personal identity, self-expression, free will—that threatens the ideology of the régime of Big Brother and the Party, who have criminalized such concepts into thoughtcrime, as contradictions of Ingsoc orthodoxy. In "The Principles of Newspeak", the appendix to the novel, George Orwell explains that Newspeak usage follows most of the English grammar, yet is a language characterised by a continually diminishing vocabulary; complete thoughts reduced to simple terms of simplistic meaning. Linguistically, the contractions of Newspeak—Ingsoc (English Socialism), Minitrue (Ministry of Truth), etc.—derive from the syllabic abbreviations of Russian, which identify the government and social institutions of the Soviet Union, such as politburo (Politburo of the Central Committee of the Communist Party of the Soviet Union), Comintern (Communist International), kolkhoz (collective farm), and Komsomol (Young Communists' League). The long-term political purpose of the new language is for every member of the Party and society, except the Proles—the working-class of Oceania—to exclusively communicate in Newspeak, by A.D. 2050; during that 66-year transition, the usage of Oldspeak (Standard English) shall remain interspersed among Newspeak conversations. Newspeak is also a constructed language, of planned phonology, grammar, and vocabulary, like Basic English, which Orwell promoted (1942–44) during the Second World War (1939–45), and later rejected in the essay "Politics and the English Language" (1946), wherein he criticizes the bad usage of English in his day: dying metaphors, pretentious diction, and high-flown rhetoric, which produce the meaningless words of doublespeak, the product of unclear reasoning. Orwell's conclusion thematically reiterates linguistic decline: "I said earlier that the decadence of our language is probably curable. Those who deny this may argue that language merely reflects existing social conditions, and that we cannot influence its development, by any direct tinkering with words or constructions."
  • 1.1K
  • 28 Sep 2022
  • Page
  • of
  • 365
Video Production Service