Topic Review
Guccifer 2.0
"Guccifer 2.0" is a persona which claimed to be the hacker(s) that hacked into the Democratic National Committee (DNC) computer network and then leaked its documents to the media, the website WikiLeaks, and a conference event. Some of the documents "Guccifer 2.0" released to the media appear to be forgeries cobbled together from public information and previous hacks, which had been mixed with disinformation. According to indictments in February 2018, the persona is operated by Russian military intelligence agency GRU. On July 13, 2018, Special Counsel Robert Mueller indicted 12 GRU agents for allegedly perpetrating the cyberattacks. The U.S. Intelligence Community concluded that some of the genuine leaks from "Guccifer 2.0" were part of a series of cyberattacks on the DNC committed by two Russian military intelligence groups, and that "Guccifer 2.0" is actually a persona created by Russian intelligence services to cover for their interference in the 2016 U.S. presidential election. This conclusion is based on analyses conducted by various private sector cybersecurity individuals and firms, including CrowdStrike, Fidelis Cybersecurity, FireEye's Mandiant, SecureWorks, ThreatConnect, Trend Micro, and the security editor for Ars Technica. The Russian government denies involvement in the theft, and "Guccifer 2.0" denied links to Russia. WikiLeaks founder Julian Assange said multiple parties had access to DNC emails and that there was "no proof" Russia was behind the attack. In March 2018, Special Counsel Robert Mueller took over investigation of Guccifer 2.0 from the FBI while it was reported that forensic determination had found the Guccifer 2.0 persona to be a "particular military intelligence directorate (GRU) officer working out of the agency's headquarters on Grizodubovoy Street in Moscow".
  • 2.5K
  • 10 Oct 2022
Topic Review
Smart Libraries
With the rapid development of artificial intelligence (AI) and Internet-of-Things (IoT), thousands of smart devices can be interconnected with each other. A series of innovative concepts have emerged and penetrated into all aspects of human life, e.g., “Smarter Planet”, “Smart City”, “Smart Community”, and “Smart Campus”. As a key and indispensable field, librarianship has become a convenient scenario aided by AI and IoT. Distinctive advanced AI-based approaches applied in libraries include, but are not limited to, natural language processing (NLP), deep learning (DL), recommender systems, machine vision, and smart acquisition.
  • 2.5K
  • 19 Apr 2022
Topic Review
Kübler-Ross Model
The Kübler-Ross model, or the Five Stages of Grief, postulates a series of emotions experienced by terminally ill patients prior to death, or people who have lost a loved one, wherein the five stages are: denial, anger, bargaining, depression, and acceptance. Although commonly referenced in popular media, the existence of these stages has not been empirically demonstrated and the model is not considered helpful in explaining the grieving process. It is considered to be of historical value but outdated in scientific terms and in clinical practice. The model was first introduced by Swiss-American psychiatrist Elisabeth Kübler-Ross in her 1969 book On Death and Dying, and was inspired by her work with terminally ill patients. Motivated by the lack of instruction in medical schools on the subject of death and dying, Kübler-Ross examined death and those faced with it at the University of Chicago's medical school. Kübler-Ross's project evolved into a series of seminars which, along with patient interviews and previous research, became the foundation for her book. Although Kübler-Ross is commonly credited with creating stage models, earlier bereavement theorists and clinicians such as Erich Lindemann, Collin Murray Parkes, and John Bowlby used similar models of stages of phases as early as the 1940s. Later in her life, Kübler-Ross noted that the stages are not a linear and predictable progression and that she regretted writing them in a way that was misunderstood. "Kübler-Ross originally saw these stages as reflecting how people cope with illness and dying," observed grief researcher Kenneth J. Doka, "not as reflections of how people grieve."
  • 2.4K
  • 03 Nov 2022
Topic Review
List of Dell PowerEdge Servers
Dell PowerEdge is a server line by Dell, following the naming convention for other Dell products: the PowerVault (data storage) and the PowerConnect (data transfer & switches). Below is an overview of current and former servers within Dell's PowerEdge product line. Different models are or were available as towers, 19-inch racks or blades. In the current naming scheme, towers are designated by T, racks by R, and blades by M (for modular). The 19″ rack-servers come in different physical heights expressed in rack units or U. Most modern servers are either 1U or 2U high while in the past the 4U was more common.
  • 2.4K
  • 21 Oct 2022
Topic Review
Compliant Continuum Robots
Compliant continuum robots (CCRs) are usually made of elastic materials, including nitinol alloy (NiTi), silicone, rubberand polyamide, etc. They are designed to be slender, i.e., low diameter to length ratio. CCRs have been widely employed in a constraint environment to manipulate tasks, such as minimally invasive cardiac surgery, orthopaedic surgery, endoscopic surgery, bariatric surgeryand the inspection of gas turbine engines, in-situ aero-engine maintenance works.
  • 2.4K
  • 03 Aug 2021
Topic Review
Markov Chain Applications to Education
The theory of Markov chains is a smart combination of Linear Algebra and Probability theory offering ideal conditions for modelling situations depending on random variables. Markov chains have found important applications to many sectors of the human activity. In this work a finite Markov chain is introduced representing mathematically the teaching process which is based on the ideas of constructivism for learning. Interesting conclusions are derived and a measure is obtained for the teaching effectiveness. An example on teaching the derivative to fresher university students is also presented illustrating our results.
  • 2.4K
  • 03 Dec 2020
Topic Review
Prediction of Water Quality Classification using Machine Learning
Machine Learning (ML) has been used for a long time and has gained wide attention over the last several years. It can handle a large amount of data and allow non-linear structures by using complex mathematical computations. However, traditional ML models do suffer some problems, such as high bias and overfitting. Therefore, this has resulted in the advancement and improvement of ML techniques, such as the bagging and boosting approach, to address these problems.
  • 2.4K
  • 21 Jun 2022
Topic Review
Fashion Recommendation Systems
Image-based fashion recommendation systems (FRSs) have attracted a huge amount of attention from fast fashion retailers as they provide a personalized shopping experience to consumers. With the technological advancements, this branch of artificial intelligence exhibits a tremendous amount of potential in image processing, parsing, classification, and segmentation.
  • 2.4K
  • 12 Aug 2021
Topic Review
Cybersecurity
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.
  • 2.4K
  • 10 Feb 2021
Topic Review
Sina Weibo
Sina Weibo (NASDAQ: WB) (新浪微博) is a Chinese microblogging (weibo) website. Launched by Sina Corporation on 14 August 2009, it is one of the biggest social media platforms in China, with over 445 million monthly active users as of Q3 2018. The platform has been a huge financial success, with surging stocks, lucrative advertising sales and high revenue and total earnings per quarter. At the start of 2018, it surpassed the US$30 billion market valuation mark for the first time. In March 2014, Sina Corporation announced a spinoff of Weibo as a separate entity and filed an IPO under the symbol WB. Sina carved out 11% of Weibo in the IPO, with Alibaba owning 32% post-IPO. The company began trading publicly on 17 April 2014. In March 2017, Sina launched Sina Weibo International Version. This new version has a clean, concise user interface design, as well as an ad-free feature; while its volume is very small, only occupying one-fifth of the space of the original, it still performs all of the original's functions. In June 2018, Sina Weibo reached 413 million active users. In November 2018, Sina Weibo suspended its registration function for minors under the age of 14. In July 2019, Sina Weibo announced that it would launch a two-month campaign to clean up pornographic and vulgar information, named The Blue Plan. Sina Weibo has attracted criticism over censoring its users.
  • 2.4K
  • 02 Nov 2022
  • Page
  • of
  • 371
ScholarVision Creations