Topic Review
Fedora (Operating System)
Fedora is a Linux distribution developed by the community-supported Fedora Project which is sponsored primarily by Red Hat, a subsidiary of IBM, with additional support from other companies. Fedora contains software distributed under various free and open-source licenses and aims to be on the leading edge of free technologies. Fedora is the upstream source of the commercial Red Hat Enterprise Linux distribution and for CentOS. Fedora is a fork of Red Hat Linux since RHL was discontinued in 2003. Since the release of Fedora 30, five different editions are currently available: Workstation, focused on the personal computer, Server for servers, CoreOS, focused on cloud computing, Silverblue, focused on an immutable desktop specialized to container-based workflows and IoT, focused on IoT devices. (As of February 2016), Fedora has an estimated 1.2 million users, including Linus Torvalds ((As of May 2020)), creator of the Linux kernel.
  • 4.0K
  • 27 Oct 2022
Topic Review
Telegram (Service)
Telegram is a cloud-based instant messaging and voice over IP service developed by Telegram Messenger LLP, a privately held company registered in London, United Kingdom , founded by the Russian entrepreneur Pavel Durov. Telegram client apps are available for Android, iOS, Windows Phone, Windows NT, macOS and Linux. Users can send messages and exchange photos, videos, stickers, audio and files of any type. Telegram's client-side code is open-source software but the source code for recent versions is not always immediately published, whereas its server-side code is closed-source and proprietary. The service also provides APIs to independent developers. In March 2018, Telegram stated that it had 200 million monthly active users. According to its CEO, (As of April 2017), Telegram’s annual growth rate was greater than 50%. Messages and media in Telegram are only client-server encrypted and stored on the servers by default. The service provides end-to-end encryption for voice calls, and optional end-to-end encrypted "secret" chats between two online users, yet not for groups or channels. Telegram's security model has received notable criticism by cryptography experts. They criticized the general security model of permanently storing all contacts, messages and media together with their decryption keys on its servers by default and by not enabling end-to-end encryption for messages by default. Pavel Durov has argued that this is because it helps to avoid third-party unsecure backups, and to allow users to access messages and files from any device. Cryptography experts have furthermore criticized Telegram's use of a custom-designed encryption protocol that has not been proven reliable and secure. Telegram has faced censorship or outright bans in some countries over accusations that the app's services have been used to facilitate illegal activities, such as protests and terrorism, as well as declining demands to facilitate government access to user data and communications.
  • 4.0K
  • 21 Nov 2022
Topic Review
Agriculture Robotics
Agricultural robotics aims to overcome the challenges imposed by population growth, accelerated urbanization, high competitiveness of high-quality products, environmental preservation and a lack of qualified labor. The main existing applications of agricultural robotic systems are for the execution of land preparation before planting, sowing, planting, plant treatment, harvesting, yield estimation and phenotyping.
  • 4.0K
  • 05 May 2021
Topic Review
Routing Protocol for Low Power and Lossy Network
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN.
  • 3.9K
  • 19 May 2022
Topic Review
MPQ (File Format)
MPQ (Mo'PaQ, short for Mike O'Brien Pack, named after its creator), is an archiving file format used in several of Blizzard Entertainment's games. MPQs used in Blizzard's games generally contain a game's data files, including graphics, sounds, and level data. The format's capabilities include compression, encryption, file segmentation, extensible file metadata, cryptographic signature and the ability to store multiple versions of the same file for internationalization, platform-specific differences and patching. MPQ archives can use a variety of compression algorithms which may also be combined.
  • 3.9K
  • 02 Dec 2022
Topic Review
Constraints Accounting
Constraints accounting (CA) allow some variations generally accepted accounting principles(GAAP) when reporting financial statements of company and these variations do not violate the GAAP in light of recognised CA. CA contains explicit consideration of the role of constraints in accounting and constraints relate to limitations when providing financial information. The definition of a constraint is a regulation which belongs to prescribed bounds and there are four main types of constraints which are the cost-benefit relationship, materiality, industry practices, and conservatism, and these constraints are also accounting guidelines which border the hierarchy of qualitative information.
  • 3.9K
  • 01 Nov 2022
Topic Review
Closed Graph
In mathematics, particularly in functional analysis and topology, closed graph is a property of functions. A function f : X → Y between topological spaces has a closed graph if its graph is a closed subset of the product space X × Y. A related property is open graph. This property is studied because there are many theorems, known as closed graph theorems, giving conditions under which a function with a closed graph is necessarily continuous. One particularly well-known class of closed graph theorems are the closed graph theorems in functional analysis.
  • 3.9K
  • 18 Oct 2022
Topic Review
Digital Image Watermarking Techniques
Image authentication is an extremely significant concern for the digital revolution, as it is easy to alter any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed to find state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.
  • 3.8K
  • 29 Oct 2020
Topic Review
Chi square statistic
The Chi-Square test is based on a series of assumptions frequently used in the statistical analysis of experimental data. The main weakness of the chi-square test is that is very accurate only in convergence (in large size samples), and for small sample sizes is exposed to errors of both types (type I and type II). On two scenarios of use - goodness of fit and contingencies assessment (2x2 tables of contingency) - here are discussed different aspects involving it. Further knowledge on the regard of the type of the error in contingencies assessment push further the analysis of the data, while in the same time opens the opportunity to devise a method for filling the gaps in contingencies (e.g. censored data), both scenarios being discussed here in detail. A program designed to fill the gaps in the assumption of the association is provided.
  • 3.8K
  • 24 Dec 2020
Topic Review
Impact Factor
The impact factor (IF) or journal impact factor (JIF) of an academic journal is a scientometric index calculated by Clarivate that reflects the yearly average number of citations of articles published in the last two years in a given journal. It is frequently used as a proxy for the relative importance of a journal within its field; journals with higher impact factor values are often deemed to be more important, or carry more intrinsic prestige in their respective fields, than those with lower values.
  • 3.8K
  • 03 Mar 2023
  • Page
  • of
  • 371
Video Production Service