Topic Review
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing. A 2 TBps attack was reported in mid-August 2020 directed towards critical infrastructure, such as finance, amidst the COVID-19 pandemic. It is estimated that these attacks will double, reaching over 15 million, in the next 2 years. A number of mitigation schemes have been designed and developed since its inception but the increasing complexity demands advanced solutions based on emerging technologies. Blockchain has emerged as a promising and viable technology for DDoS mitigation. The inherent and fundamental characteristics of blockchain such as decentralization, internal and external trustless attitude, immutability, integrity, anonymity and verifiability have proven to be strong candidates, in tackling this deadly cyber threat. This survey discusses different approaches for DDoS mitigation using blockchain in varied domains to date. The paper aims at providing a comprehensive review, highlighting all necessary details, strengths, challenges and limitations of different approaches. It is intended to serve as a single platform to understand the mechanics of current approaches to enhance research and development in the DDoS mitigation domain.
  • 1.2K
  • 07 Feb 2021
Topic Review
ArchiCAD
ARCHICAD is an architectural BIM CAD software for Macintosh and Windows developed by the Hungarian company Graphisoft. ARCHICAD offers computer aided solutions for handling all common aspects of aesthetics and engineering during the whole design process of the built environment — buildings, interiors, urban areas, etc. Development of ARCHICAD started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, ARCHICAD became regarded by some as the first implementation of BIM. ARCHICAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model. Today, it has over 120,000 users.
  • 1.2K
  • 11 Nov 2022
Topic Review
Forensic Dentistry
Forensic dentistry or forensic odontology involves handling, examination and evaluation of dental evidence in criminal justice cases. Forensic dentists are involved in assisting investigative agencies to identify recovered human remains in addition to the identification of whole or fragmented bodies. Forensic dentists have also been known to use their investigative techniques to identify burn victims by using the victims previous dental records. Forensic dentists may also be asked to assist in determining age, race, occupation, previous dental history and socioeconomic status of unidentified human beings. The evidence that may be derived from teeth is the age (in children) and identification of the person to whom the teeth belong. This is done using dental records including radiographs, ante-mortem (prior to death) and post-mortem (after death) photographs and DNA. Another type of evidence is that of bite marks, left on either the victim (by the attacker), the perpetrator (from the victim of an attack), or on an object found at the crime scene. Bite mark analysis has been condemned by several scientific bodies, such as the National Academy of Sciences (NAS), the President's Council of Advisors on Science and Technology (PCAST), and the Texas Forensic Science Commission. No scientific studies or evidence substantiate that bite marks can demonstrate sufficient detail for positive identification. There are numerous instances where experts diverge widely in their evaluations of the same bite mark evidence.
  • 1.2K
  • 18 Nov 2022
Topic Review
Microsoft OneDrive
Microsoft OneDrive (formerly SkyDrive) is a file hosting service and synchronization service operated by Microsoft as part of its web version of Office. First launched in August 2007, OneDrive allows users to store files and personal data like Windows settings or BitLocker recovery keys in the cloud, share files, and sync files across Android, Windows Phone, and iOS mobile devices, Windows and macOS computers, and the Xbox 360, Xbox One, and Xbox Series X and S consoles. Users can upload Microsoft Office documents to OneDrive. OneDrive offers 5 GB of storage space free of charge, with 100 GB, 1 TB, and 6 TB storage options available either separately or with Office 365 subscriptions.
  • 1.2K
  • 01 Nov 2022
Topic Review
Kerberos (Protocol)
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos uses UDP port 88 by default. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades.
  • 1.2K
  • 25 Oct 2022
Topic Review
Modern Computing in Iran
Iran’s modern computing history can be divided into four distinct periods: (1) Computers were first introduced to Iran in 1962. As a result, the introduction of computers in Iran occurred approximately ten years after introducing computers in developed countries. (2) Computer development, Iran’s computer development era began in 1971 and lasted until 1981. This path was followed by a lot of competition to buy hardware, introduce massive software systems, recruit more manpower, and follow rigorous programs based on the country’s technological realities. (3) Computer revisit: As a result of the Islamic Revolution, improvements and innovations in computers occurred, and a series of general reviews were conducted until 1980. (4) Technological maturity and growth in Iran: Following the reopening of universities in 1983, the next stage of computer development began, with software and hardware becoming widely available. The Persian language and script processing is among this century’s most important works.
  • 1.2K
  • 29 Aug 2022
Topic Review
Near-Infrared Spectroscopy Coupled to Hyperspectral Imaging
Near-infrared (800–2500 nm; NIR) spectroscopy coupled to hyperspectral imaging (NIR-HSI) has greatly enhanced its capability and thus widened its application and use across various industries. This non-destructive technique that is sensitive to both physical and chemical attributes of virtually any material can be used for both qualitative and quantitative analyses.
  • 1.2K
  • 18 Mar 2022
Topic Review
Digital Cloud Environment
This article addresses the challenges of a digital cloud environment when it comes to global scalability with a large number of remote servers and an unsecure public cloud, such as Amazon. The goal of the study was to work out an approach for evaluating the reasonable system capacity under heavy workload. For that purpose, Zabbix monitoring solution is used and business metrics are applied in relation to existing system ones. A prediction data model is proposed to compute the future forecast of the user activity based on the collected historical statistics and to verify whether capacity adjustment is possible or not. The results of capacity planning are implemented at Genesys International Telecommunications Company. System analysis of the production environment indicates the possibility to downscale the capacity of certain virtual servers, which allowed savings to the annual operational costs of $3500 (50%) for each affected server.
  • 1.2K
  • 30 Oct 2020
Topic Review
Xbox 360 System Software
The Xbox 360 system software or the Xbox 360 Dashboard is the updateable software and operating system for the Xbox 360. It formerly resided in a 16 MB file system. However, starting with the NXE Update, more storage became a requirement, rectified by either having a Hard Drive installed, or one of the later revisions of the console with adequate flash storage embedded within the console. The system software has access to a maximum of 32 MB of the system's Random Access Memory. The updates can be downloaded from the Xbox Live service directly to the Xbox 360 and subsequently installed. Microsoft has also provided the ability to download system software updates from their respective official Xbox website to their PCs and then storage media, from which the update can be installed to the system. The Xbox 360 game system allows users to download applications that add to the functionality of the dashboard. Most apps required the user to be signed into a valid Xbox Live Gold account in order to use the features advertised for the given app. But as of the 2.0.16756.0 update, most apps do not require an Xbox Live Gold Subscription to access them, although the app may have its own subscription to be able to use it. With the exception of a few early apps, Microsoft has added partners to develop apps for the Xbox 360 system since the New Xbox Experience (NXE) Dashboard update in 2008. Following the success of Xbox One preview program launched in 2014, in March 2015, Microsoft announced the Xbox 360 preview program to the public.
  • 1.2K
  • 11 Nov 2022
Topic Review
Social Security Number
In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as 42 U.S.C. § 405(c)(2). The number is issued to an individual by the Social Security Administration, an independent agency of the United States government. Although the original purpose for the number was for the Social Security Administration to track individuals, the Social Security number has become a de facto national identification number for taxation and other purposes. A Social Security number may be obtained by applying on Form SS-5, Application for a Social Security Number Card.
  • 1.2K
  • 25 Oct 2022
  • Page
  • of
  • 371
Video Production Service