Articles on Trending Technologies

Technical articles with clear explanations and examples

What is Killware?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Feb-2022 260 Views

Killware is a software or code that is installed on computers with the sole purpose of causing harm to humans. This type of pain is not related to money or emotions; instead, it is related to physical damage. Killware, as the name implies, is a malware designed to kill people. Unlike ransomware, which infects your computer and locks it until you pay a ransom, killware is a virus spread by psychopaths who have nothing to do with money.The Dangers of KillwareKillware in general does not affect the computers or cellphones of normal people. Instead, their primary goal is to target ...

Read More

What is Dharma Ransomware?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Feb-2022 546 Views

With the ever-increasing rate of cyber threats, the number of Ransomware has also been on the rise, and one such Ransomware is the Dharma Ransomware. In this article, we will discuss more on Ransomware and how they work.What is Ransomware?Ransomware is a virus that encrypts a victim's data and holds it hostage. An organisation’s essential data is encrypted, making it impossible to access files, databases, or apps. After that, a ransom is demanded to acquire access.Ransomware is frequently designed to propagate over a network and target database and file servers, paralysing a whole enterprise in the process. It's a growing ...

Read More

What is Cloud Encryption?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Feb-2022 5K+ Views

In recent years, online data privacy has become one of the most talked-about issues in information technology. Due to the continuous data flow from analog to digital devices and applications, our data is more sensitive to threats and vulnerabilities. Without the risk of losing tangible, portable media devices, the cloud allows you to access your data from anywhere with an Internet connection. Although several cloud solutions are free, they don't always include advanced security features like data encryption. So, what is cloud encryption, exactly?What is Cloud Encryption?The technique of encoding and altering data before moving it to the cloud is ...

Read More

What is GPS spoofing?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Feb-2022 514 Views

GPS (Global Positioning System) is currently the conventional method for passengers to navigate from point A to point B quickly and effectively. While GPS provides businesses and people with unrivalled benefits, there are certain disadvantages in using this technology. Through GPS spoofing, GPS devices might be exposed to cyber assaults.Many developed nations have had global navigation satellite systems (GNSS) for years, and GPS is just one of them. When someone uses a radio transmitter to deliver a fake GPS signal to a receiver antenna to counter a valid GPS satellite signal, this is known as GPS spoofing. The strongest GPS ...

Read More

What is Bandwidth Throttling?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Feb-2022 470 Views

If you have "unlimited" data plans for your home Internet, you are probably aware of the phenomenon of bandwidth throttling. Yes, there is a word for it, and it is deliberate and entirely legal. You may not be aware of this, but you may also be unaware that it may be circumvented.What Exactly is Bandwidth Throttling?Your ISP is purposely slowing down your web speeds, to put it another way. They can effortlessly do so because they have complete control over your connections. After all, they go through their network.In addition, your ISP has access to the websites you visit. They ...

Read More

How are measures computed in data mining?

Ginni
Ginni
Updated on 16-Feb-2022 2K+ Views

Measures can be organized into three elements including distributive, algebraic, and holistic. It depends on the type of aggregate functions used.Distributive − An aggregate function is distributive if it can be calculated in a delivered manner as follows. Consider the data are independent into n sets. It can use the service to each partition, resulting in n aggregate values.If the result changed by using the function to the n aggregate values is the same as that derived by using the function to the whole data set (without partitioning), the function can be evaluated in a distributed way.For instance, count() can ...

Read More

What is Entropy-Based Discretization?

Ginni
Ginni
Updated on 16-Feb-2022 4K+ Views

Entropy-based discretization is a supervised, top-down splitting approach. It explores class distribution data in its computation and preservation of split-points (data values for separation an attribute range). It can discretize a statistical attribute, A, the method choose the value of A that has the minimum entropy as a split-point, and recursively divisions the resulting intervals to appear at a hierarchical discretization.Specific discretization forms a concept hierarchy for A. Let D includes data tuples described by a group of attributes and a class-label attribute. The class-label attribute supports the class data per tuple. The basic approach for the entropy-based discretization of ...

Read More

How can this technique be useful for data reduction if the wavelet transformed data are of the same length as the original data?

Ginni
Ginni
Updated on 16-Feb-2022 392 Views

The utility lies in the fact that the wavelet transformed data can be limited. A compressed approximation of the information can be retained by saving only a small fraction of the principal of the wavelet coefficients. For instance, all wavelet coefficients higher than some user-defined threshold can be maintained. Some other coefficients are set to 0.The resulting data description is very sparse so that services that can take benefit of data sparsity are computationally very quick if implemented in wavelet space. The method also works to eliminate noise without smoothing out the main characteristics of the data, creating it efficient ...

Read More

How can we find a good subset of the original attributes?

Ginni
Ginni
Updated on 16-Feb-2022 282 Views

Attribute subset selection reduces the data set size by removing irrelevant or redundant attributes (or dimensions). The objective of attribute subset selection is to discover a minimum set of attributes such that the subsequent probability distribution of the data classes is as close as feasible to the original distribution obtained using all attributes.For n attributes, there are 2n possible subsets. An exhaustive search for the optimal subset of attributes can be extremely costly, specifically as n and the number of data classes raise. Hence, heuristic approaches that explore a reduced search space are generally used for attribute subset selection.These approaches ...

Read More

What is trend analysis?

Ginni
Ginni
Updated on 16-Feb-2022 2K+ Views

Trend analysis defines the techniques for extracting a model of behavior in a time series that can be slightly or entirely hidden by noise. The methods of trend analysis have been generally used in detecting outbreaks and unexpected increases or decreases in disease appearances, monitoring the trends of diseases, evaluating the effectiveness of disease control programs and policies, and assessing the success of health care programs and policies, etc.Various techniques can be used to detect trends in item series. Smoothing is an approach that is used to remove the non-systematic behaviors found in time series. Smoothing usually takes the form ...

Read More
Showing 45921–45930 of 61,297 articles
Advertisements