Topic Review
Reversible Data Hiding Schemes Using Image Steganography
Encryption is a significant technique to secure data. Steganography and cryptography are two widely used techniques used to secure data. The steganographic technique is used to conceal the confidential information within data, whereas cryptography obfuscates the secret data to make it unreadable. The basic aim of the steganographic technique is to protect the copyrights, authorization, and ownership of the digital media transmitted over a network. A good stego-image should have high embedding capacity, robustness, imperceptibility, security, and less computational complexity.
  • 467
  • 27 Sep 2022
Topic Review
Reversible Data Hiding in Encrypted Images
As a necessary technical means, reversible data hiding in encrypted images (RDH-EIs) provides superior performance in terms of security. To simultaneously improve the effectiveness of RDH-EIs, the researchers proposed a mixed multi-bit layer embedding strategy in encrypted images.
  • 285
  • 24 May 2023
Topic Review
Reverse DNS Lookup
In computer networks, a reverse DNS lookup or reverse DNS resolution (rDNS) is the querying technique of the Domain Name System (DNS) to determine the domain name associated with an IP address – the reverse of the usual "forward" DNS lookup of an IP address from a domain name. The process of reverse resolving of an IP address uses PTR records. rDNS involves searching domain name registry and registrar tables. This may be used to try to identify the originator’s domain name to track, for example, a spammer sending spam emails or the domain name of a computer trying to break into a firewall or someone trying to hack the system. It may also be used to determine the name of the internet service provider assigned to a particular IP address. The reverse DNS database of the Internet is rooted in the .arpa top-level domain. Although the informational RFC 1912 (Section 2.1) recommends that "every Internet-reachable host should have a name" and that "for every IP address, there should be a matching PTR record," it is not an Internet Standard requirement, and not all IP addresses have a reverse entry.
  • 659
  • 20 Nov 2022
Topic Review
RetroShare
RetroShare is a free and open-source peer-to-peer communication and file sharing app based on a friend-to-friend network built on GNU Privacy Guard (GPG). Optionally, peers may communicate certificates and IP addresses from and to their friends.
  • 575
  • 31 Oct 2022
Topic Review
RETRIEVE
RETRIEVE is a database management system (DBMS) offered on Tymshare's systems starting in August 1971. It was written in Tymshare's own SUPER FORTRAN on the SDS 940. It offered basic single-file, non-relational database functionality using an interactive programming language. It is one of the earliest examples of software as a service (SaaS). RETRIEVE was highly influential and spawned a number of relatively direct clones. Wang Laboratories's RECALL on the Wang 2200 minicomputer was almost identical to RETRIEVE, to the point the differences were detailed in a single page. JPL made a version known as JPLDIS for the UNIVAC 1108 in 1973 that was also very similar. Wayne Ratliff, a contractor at JPL for many years, was inspired by JPLDIS to port it to the IMSAI 8080 to manage his football pool, later releasing it commercially as Vulcan for CP/M in 1979. Ashton-Tate licensed Vulcan and re-released it as dBASE II in 1980, which sparked the microcomputer database market. Most of RETRIEVE's original syntax remains unchanged in dBASE and the many xBASE clones that survive into the 21st century.
  • 593
  • 10 Oct 2022
Topic Review
Retraction
A retraction is a public statement made about an earlier statement that withdraws, cancels, refutes, or reverses the original statement or ceases and desists from publishing the original statement.
  • 579
  • 18 Oct 2022
Topic Review
Responsive Traffic Signaling System Using Graph Theory/VDM-SL
The Responsive Traffic Signaling System Using Graph Theory and Vienna Development Method Specification Language (VDM-SL) is a robust traffic monitoring and signaling system that improves signal efficiency by providing a responsive scheme; appropriate routes; a mechanism for emergency vehicles and pedestrians in real-time using VDM-SL formal method and graph theory. A formal model is constructed by considering objects, such as wireless sensors and cameras that are used for collecting information. Graph theory is used to represent the network and find appropriate routes. Unified Modeling Language is used to design the system requirements. The graph-based framework is converted into a formal model by using VDM-SL. The model has been validated and analyzed using many facilities available in the VDM-SL toolbox. 
  • 1.7K
  • 01 Nov 2021
Topic Review
Resource Elasticity
Elasticity as the ability of a system to be able to add or remove computational resources during the use and processing of data, in order to adapt to workload variations in real time . These resources can be CPU cores, RAM memory, GPU, Virtual Machine instances (known as VM's), among others. Elasticity is a dynamic property of Cloud Computing. There are two types of elasticity in the literature: horizontal and vertical. Vertical elasticity consists of the system's ability to increase or decrease the characteristics of computational resources, such as CPU time, cores, memory and network. Horizontal elasticity consists of the system's ability to add or remove instances of computational resources associated with the application that uses them. This entry will describe the main classifications for elastic systems.
  • 199
  • 01 Mar 2024
Topic Review
Resource Allocation Schemes for 5G Network
Resource allocation is an important aspect of any cellular network environment. It plays a significant part in maintaining friendly access for end-users, business partners, and customers of cellular-based applications. Resource allocation has great benefits for the cellular network environment.
  • 1.0K
  • 21 Oct 2021
Topic Review
Resistance Database Initiative
HIV Resistance Response Database Initiative (RDI) is a not-for-profit organisation established in 2002 with the mission of improving the clinical management of HIV infection through the application of bioinformatics to HIV drug resistance and treatment outcome data. The RDI has the following specific goals: The RDI consists of a small executive group based in the UK, an international advisory group of leading HIV/AIDS scientists and clinicians, and an extensive global network of collaborators and data contributors.
  • 231
  • 04 Nov 2022
  • Page
  • of
  • 371
Video Production Service