Topic Review
Public Interest Registry
Public Interest Registry is a Reston, Virginia-based not-for-profit created by the Internet Society in 2002 to manage the .ORG top-level domain. It took over operation of .ORG in January 2003 and launched the .NGO and .ONG top-level domains in March 2015. In November 2019, it was announced the Public Interest Registry would be sold by the Internet Society to private equity investment firm Ethos Capital for 1.135 billion USD, but in April 2020, ICANN decided to reject the sale.
  • 913
  • 05 Dec 2022
Topic Review
Blockchain and Fog Based Architecture
Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities’ applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time response applications. There are various frameworks in real-world to support the IoE in smart-cities but they face the issues like security, platform Independence, multi-application assistance, and resource management. This article is motivated from the Blockchain and Fog computing technologies and presents a secured architecture Blockchain and Fog-based Architecture Network (BFAN) for IoE applications in the smart cities. The proposed architecture secures sensitive data with encryption, authentication, and Blockchain. It assists the System-developers and Architects to deploy the applications in smart city paradigm. The goal of the proposed architecture is to reduce the latency and energy, and ensure improved security features through Blockchain technology. The simulation results demonstrate that the proposed architecture performs better than the existing frameworks for smart-cities.
  • 913
  • 28 Oct 2020
Topic Review
Hyperbolic Function
In mathematics, hyperbolic functions are analogs of the ordinary trigonometric functions defined for the hyperbola rather than on the circle: just as the points (cos t, sin t) form a circle with a unit radius, the points (cosh t, sinh t) form the right half of the equilateral hyperbola. Hyperbolic functions occur in the solutions of many linear differential equations (for example, the equation defining a catenary), of some cubic equations, in calculations of angles and distances in hyperbolic geometry, and of Laplace's equation in Cartesian coordinates. Laplace's equations are important in many areas of physics, including electromagnetic theory, heat transfer, fluid dynamics, and special relativity. The basic hyperbolic functions are: from which are derived: corresponding to the derived trigonometric functions. The inverse hyperbolic functions are: The hyperbolic functions take a real argument called a hyperbolic angle. The size of a hyperbolic angle is twice the area of its hyperbolic sector. The hyperbolic functions may be defined in terms of the legs of a right triangle covering this sector. In complex analysis, the hyperbolic functions arise as the imaginary parts of sine and cosine. The hyperbolic sine and the hyperbolic cosine are entire functions. As a result, the other hyperbolic functions are meromorphic in the whole complex plane. By Lindemann–Weierstrass theorem, the hyperbolic functions have a transcendental value for every non-zero algebraic value of the argument. Hyperbolic functions were introduced in the 1760s independently by Vincenzo Riccati and Johann Heinrich Lambert. Riccati used Sc. and Cc. (sinus/cosinus circulare) to refer to circular functions and Sh. and Ch. (sinus/cosinus hyperbolico) to refer to hyperbolic functions. Lambert adopted the names but altered the abbreviations to what they are today. The abbreviations sh, ch, th, cth are also at disposition, their use depending more on personal preference of mathematics of influence than on the local language.
  • 913
  • 10 Nov 2022
Topic Review
Vehicle Forensics
Traffic accident investigation has been used to reconstruct the cause and condition of the accident by using images and driving record data that introduce IT technology, and to analyze both sides of the accident, skid marks, and vehicle damage to identify the perpetrators and victims. However, level 3 self-driving vehicles are the most important factor in determining the cause and imputation of the accident by the driver or manufacturer with control information at the time of the accident. It is also developing into a network and connected vehicle with various restrictions such as the burden of the price of sensors equipped with self-driving cars and climate and rapidly changing road traffic information. In addition, network and connected vehicle driving data are stored on the outside, or various devices and sensors are installed to store information on the outside for convenience in operation, and efforts to enact laws are continuing.
  • 912
  • 13 Feb 2021
Topic Review
Bumble (App)
Bumble is a location-based social application that facilitates communication between interested users. In heterosexual matches, only female users can make the first contact with matched male users, while in same-sex matches either person can send a message first. Users can sign up using their phone number or Facebook profile, and have options of searching for romantic matches or, in "BFF mode", friends. Bumble Bizz facilitates business communications. Bumble was founded by Whitney Wolfe Herd shortly after she left Tinder, a dating app she co-founded, due to growing tensions with other company executives. Wolfe Herd has described Bumble as a "feminist dating app". As of September 2019, with a monthly user base of 5 million, Bumble is the second-most popular dating app in the U.S. after Tinder. According to a June 2016 survey, 46.2% of its users are female. According to Forbes , the company is valued at more than $1 billion, and has over 55 million users.
  • 912
  • 17 Oct 2022
Topic Review
Squid
Squid is a caching and forwarding HTTP web proxy. It has a wide variety of uses, including speeding up a web server by caching repeated requests, caching web, DNS and other computer network lookups for a group of people sharing network resources, and aiding security by filtering traffic. Although primarily used for HTTP and FTP, Squid includes limited support for several other protocols including Internet Gopher, SSL, TLS and HTTPS. Squid does not support the SOCKS protocol, unlike Privoxy, with which Squid can be used in order to provide SOCKS support. Squid was originally designed to run as a daemon on Unix-like systems. A Windows port was maintained up to version 2.7. New versions available on Windows use the Cygwin environment. Squid is free software released under the GNU General Public License.
  • 911
  • 18 Nov 2022
Topic Review
Operad Theory
Operad theory is a field of mathematics concerned with prototypical algebras that model properties such as commutativity or anticommutativity as well as various amounts of associativity. Operads generalize the various associativity properties already observed in algebras and coalgebras such as Lie algebras or Poisson algebras by modeling computational trees within the algebra. Algebras are to operads as group representations are to groups. An operad can be seen as a set of operations, each one having a fixed finite number of inputs (arguments) and one output, which can be composed one with others. They form a category-theoretic analog of universal algebra. Operads originate in algebraic topology from the study of iterated loop spaces by J. Michael Boardman and Rainer M. Vogt, and J. Peter May. The word "operad" was created by May as a portmanteau of "operations" and "monad" (and also because his mother was an opera singer). Interest in operads was considerably renewed in the early 90s when, based on early insights of Maxim Kontsevich, Victor Ginzburg and Mikhail Kapranov discovered that some duality phenomena in rational homotopy theory could be explained using Koszul duality of operads. Operads have since found many applications, such as in deformation quantization of Poisson manifolds, the Deligne conjecture, or graph homology in the work of Maxim Kontsevich and Thomas Willwacher.
  • 909
  • 09 Oct 2022
Topic Review
External Human–Machine Interface of AVs
In future urban traffic, it is more likely that automated vehicles (AVs) will operate not in separated traffic spaces but in so-called mixed traffic environments where different types of traffic participants interact. Therefore, AVs must be able to communicate with other traffic participants, e.g., pedestrians as vulnerable road users (VRUs), to solve ambiguous traffic situations. Taking current traffic communication patterns into account, a combination of implicit communication via the driving behavior (e.g., deceleration, position in lane) and explicit communication via an external Human–Machine Interface (eHMI) seems to be a promising approach. The eHMI consists of an external interface connected to the vehicle, which can transmit explicit signals enabling interaction between AVs and other TPs.
  • 908
  • 15 Aug 2021
Topic Review
Current Threat Landscape of Botnets
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure. They have become one of the more-preferred options in the toolkit of hackers and cybercriminals; particularly due to their ability to subvert and overrun secure infrastructures within a relatively short time. Research has greatly advanced in trying to keep up with the rapid evolution of the botnet threat. At this time, it is important to review the status of the threat, vis-á-vis the extent of research that has emerged in relation to the threat. This is crucial for understanding the future prospects of the threat, in terms of where it is headed next; as well as what research areas require more work. This exploratory research serves this purpose. It introduces the botnet threat from its early origins; then it traverses the current status of botnets, and summarizes research efforts so far (highlighting some limitations of modern countermeasures). It further goes on to discuss the future trends of botnets and botnet research, before bringing it together to present the current threat landscape.
  • 908
  • 28 Oct 2020
Topic Review
Cyc
Cyc (pronounced /ˈsaɪk/ SYKE) is a long-term artificial intelligence project that aims to assemble a comprehensive ontology and knowledge base that spans the basic concepts and rules about how the world works. Hoping to capture common sense knowledge, Cyc focuses on implicit knowledge that other AI platforms may take for granted. This is contrasted with facts one might find somewhere on the internet or retrieve via a search engine or Wikipedia. Cyc enables semantic reasoners to perform human-like reasoning and be less "brittle" when confronted with novel situations. Douglas Lenat began the project in July 1984 at MCC, where he was Principal Scientist 1984–1994, and then, since January 1995, has been under active development by the Cycorp company, where he is the CEO.
  • 908
  • 19 Oct 2022
  • Page
  • of
  • 371
Video Production Service