Topic Review
WikiLeaks
WikiLeaks (/ˈwɪkiliːks/) is an international non-profit organisation that publishes news leaks and classified media provided by anonymous sources. Its website, initiated in 2006 in Iceland by the organisation Sunshine Press, stated in 2015 that it had released online 10 million documents in its first 10 years. Julian Assange, an Australian Internet activist, is generally described as its founder and director. Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief. WikiLeaks has variously described itself as an organization of journalists, political activists, mathematicians, and start-up company technologists, an intermediary between sources and journalists, an advocacy group for sources, and a public intelligence agency. The group has released a number of prominent document caches that exposed serious violations of human rights and civil liberties to the US and international public. Early releases included documentation of equipment expenditures and holdings in the Afghanistan war, a report about a corruption investigation in Kenya, and an operating procedures manual for the U.S. prison at Guantanamo Bay, Cuba. In April 2010, WikiLeaks released the Collateral Murder footage from the 12 July 2007 Baghdad airstrike in which Iraqi Reuters journalists were among several civilians killed. Other releases in 2010 included the Afghan War Diary and the "Iraq War Logs". The latter release allowed the mapping of 109,032 deaths in "significant" attacks by insurgents in Iraq that had been reported to Multi-National Force – Iraq, including about 15,000 that had not been previously published. In 2010, WikiLeaks also released classified diplomatic cables that had been sent to the US State Department. In April 2011, WikiLeaks began publishing 779 secret files relating to prisoners detained in the Guantanamo Bay detention camp. In 2012, WikiLeaks released the "Syria Files," over two million emails sent by Syrian politicians, corporations and government ministries. In 2015, WikiLeaks published Saudi Arabian diplomatic cables, documents detailing spying by the U.S. National Security Agency on successive French presidents, and the intellectual property chapter of the Trans-Pacific Partnership, a controversial international trade agreement which had been negotiated in secret. During the 2016 U.S. presidential election campaign, WikiLeaks released emails and other documents from the Democratic National Committee and from Hillary Clinton's campaign manager, John Podesta, showing that the party's national committee favoured Clinton over her rival Bernie Sanders in the primaries, leading to the resignation of DNC chairwoman Debbie Wasserman Schultz and an apology to Sanders from the DNC. These releases caused significant harm to the Clinton campaign, and have been attributed as a potential contributing factor to her loss in the general election against Donald Trump. The U.S. intelligence community expressed "high confidence" that the leaked emails had been hacked by Russia and supplied to WikiLeaks. WikiLeaks said that the source of the documents was not Russia or any other state. During the campaign, WikiLeaks promoted conspiracy theories about Hillary Clinton and the Democratic Party. In 2016, WikiLeaks released nearly 300,000 emails it described as coming from Turkey's ruling Justice and Development Party, later found to be taken from public mailing archives, and rereleased over 50,000 emails from the Turkish Minister of Energy and Natural Resources. In 2017, WikiLeaks published internal CIA documents describing tools used by the agency to hack devices including mobile phones and routers. In 2019, WikiLeaks published over 30,000 files as part of the Fishrot Files, exposing corruption at Samherji, a multinational fishing company based in Iceland. In October 2021, WikiLeaks' secure chat stopped working and in February 2022 their submission system and email server went offline. The organisation has been criticised for inadequately curating its content and violating the personal privacy of individuals. WikiLeaks has, for instance, revealed Social Security numbers, medical information, credit card numbers and details of suicide attempts.
  • 3.9K
  • 11 Oct 2022
Topic Review
Alternating Direction Implicit Method
In numerical linear algebra, the Alternating Direction Implicit (ADI) method is an iterative method used to solve Sylvester matrix equations. It is a popular method for solving the large matrix equations that arise in systems theory and control, and can be formulated to construct solutions in a memory-efficient, factored form. It is also used to numerically solve parabolic and elliptic partial differential equations, and is a classic method used for modeling heat conduction and solving the diffusion equation in two or more dimensions. It is an example of an operator splitting method.
  • 3.8K
  • 14 Oct 2022
Topic Review
Spiking Neural Networks
Spiking neural networks (SNNs) are artificial neural network models that more closely mimic natural neural networks. In addition to neuronal and synaptic state, SNNs also incorporate the concept of time into their operating model. The idea is that neurons in the SNN do not fire at each propagation cycle (as it happens with typical multi-layer perceptron networks), but rather fire only when a membrane potential – an intrinsic quality of the neuron related to its membrane electrical charge – reaches a specific value. When a neuron fires, it generates a signal which travels to other neurons which, in turn, increase or decrease their potentials in accordance with this signal (ref).
  • 3.8K
  • 13 Oct 2021
Topic Review
BitTorrent
BitTorrent is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a decentralized manner. To send or receive files, users use a BitTorrent client on their Internet-connected computer. A BitTorrent client is a computer program that implements the BitTorrent protocol. BitTorrent clients are available for a variety of computing platforms and operating systems, including an official client released by Rainberry, Inc. Popular clients include μTorrent, Xunlei Thunder, Transmission, qBittorrent, Vuze, Deluge, BitComet and Tixati. BitTorrent trackers provide a list of files available for transfer and allow the client to find peer users, known as "seeds", who may transfer the files. Programmer Bram Cohen designed the protocol in April 2001, and released the first available version on 2 July 2001. On 15 May 2017, BitTorrent, Inc. (later renamed Rainberry, Inc.) released BitTorrent v2 protocol specification. libtorrent was updated to support the new version on 6 September 2020. BitTorrent is one of the most common protocols for transferring large files, such as digital video files containing TV shows and video clips, or digital audio files containing songs. (As of February 2013) BitTorrent was responsible for 3.35% of all worldwide bandwidth—more than half of the 6% of total bandwidth dedicated to file sharing. In 2019, BitTorrent was a dominant file sharing protocol and generated a substantial amount of Internet traffic, with 2.46% of downstream, and 27.58% of upstream traffic. (As of 2013), BitTorrent had 15–27 million concurrent users at any time. (As of January 2012), BitTorrent is utilized by 150 million active users. Based on this figure, the total number of monthly users may be estimated to more than a quarter of a billion (≈ 250 million). The use of BitTorrent may sometimes be limited by Internet Service Providers (ISPs), on legal or copyright grounds. Users may choose to run seedboxes or virtual private networks (VPNs) to circumvent these restrictions.
  • 3.8K
  • 01 Nov 2022
Topic Review
False Position Method
In mathematics, the false position method or regula falsi is a very old method for solving an equation in one unknown, that, in modified form, is still in use. In simple terms, the method is the trial and error technique of using test ("false") values for the variable and then adjusting the test value according to the outcome. This is sometimes also referred to as "guess and check". Versions of the method predate the advent of algebra and the use of equations. As an example, consider problem 26 in the Rhind papyrus, which asks for a solution of (written in modern notation) the equation x + x/4 = 15. This is solved by false position, using a technique that predates formally written equations. First, guess that x = 4 to obtain, on the left, 4 + 4/4 = 5. This guess is a good choice since it produces an integer value. However, 4 is not the solution of the original equation, as it gives a value which is three times too small. To compensate, multiply x (currently set to 4) by 3 and substitute again to get 12 + 12/4 = 15, verifying that the solution is x = 12. Modern versions of the technique employ systematic ways of choosing new test values and are concerned with the questions of whether or not an approximation to a solution can be obtained, and if it can, how fast can the approximation be found.
  • 3.8K
  • 15 Nov 2022
Topic Review
DualShock
The DualShock (originally Dual Shock; trademarked as DUALSHOCK or DUAL SHOCK; with the PlayStation 5 version named DualSense) is a line of gamepads with vibration-feedback and analog controls developed by Sony Interactive Entertainment for the PlayStation family of systems. Introduced in November 1997, it was initially marketed as a secondary peripheral for the original PlayStation, with updated versions of the PlayStation console including the controller, Sony subsequently phased out the controller that was originally included with the console, called the PlayStation controller, as well as the Sony Dual Analog Controller. The DualShock is the best-selling gamepad of all time in terms of units sold, excluding bundled controllers.
  • 3.8K
  • 24 Nov 2022
Topic Review
Internet of Things in the Industry Revolution 4.0
Researchers offers a wide range of information on Industry 4.0, finds research gaps and recommends future directions. Seven research questions are addressed: (i) What are the contributions of WSN in IR 4.0? (ii) What are the contributions of IoT in IR 4.0? (iii) What are the types of WSN coverage areas for IR 4.0? (iv) What are the major types of network intruders in WSN and IoT systems? (v) What are the prominent network security attacks in WSN and IoT? (vi) What are the significant issues in IoT and WSN frameworks? and (vii) What are the limitations and research gaps in the existing work? Researchers mainly focuses on the solutions and new techniques to automate Industry 4.0 and analyzed over 130 articles from 2014 until 2021. The entry covers several aspects of Industry 4.0, from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.
  • 3.8K
  • 16 Mar 2022
Topic Review
Architecture and Challenges of Industrial Internet of Things
The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable.
  • 3.7K
  • 21 Oct 2021
Topic Review
Persuasive Technology
Persuasive technology is broadly defined as technology that is designed to change attitudes or behaviors of the users through persuasion and social influence, but not necessarily through coercion. Such technologies are regularly used in sales, diplomacy, politics, religion, military training, public health, and management, and may potentially be used in any area of human-human or human-computer interaction. Most self-identified persuasive technology research focuses on interactive, computational technologies, including desktop computers, Internet services, video games, and mobile devices, but this incorporates and builds on the results, theories, and methods of experimental psychology, rhetoric, and human-computer interaction. The design of persuasive technologies can be seen as a particular case of design with intent.
  • 3.7K
  • 28 Sep 2022
Topic Review
Salient Object Detection
Detection and localization of regions of images that attract immediate human visual attention is currently an intensive area of research in computer vision. The capability of automatic identification and segmentation of such salient image regions has immediate consequences for applications in the field of computer vision, computer graphics, and multimedia. A large number of salient object detection (SOD) methods have been devised to effectively mimic the capability of the human visual system to detect the salient regions in images. These methods can be broadly categorized into two categories based on their feature engineering mechanism: conventional or deep learning-based. In this survey, most of the influential advances in image-based SOD from both conventional as well as deep learning-based categories have been reviewed in detail. Relevant saliency modeling trends with key issues, core techniques, and the scope for future research work have been discussed in the context of difficulties often faced in salient object detection. Results are presented for various challenging cases for some large-scale public datasets. Different metrics considered for assessment of the performance of state-of-the-art salient object detection models are also covered. Some future directions for SOD are presented towards end.
  • 3.6K
  • 19 Nov 2020
  • Page
  • of
  • 371
Video Production Service