Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer. Exploiting domain name system (DNS) vulnerabilities have resulted in a range of high profile disruptions and outages for major internet sites around the world. DNS attack is an exploit in which an attacker takes advantage of vulnerabilities is the (DNS). This paper will present the vulnerabilities and the weak points of the DNS server and how attackers (black hat hakcer) can exploit those vulnerabilities to attack and gain access to the server machine. In conclusion, presenting and implementing this project make users understand the hazard of hackers. Then, will lead to build secure and protected systems and applications.
Establishing a new site for mining operation is required to find and develop a new source of minerals with precise characteristics such as location, depth, quality and thickness. Mineral exploration is a sequential process of informationgathering that assesses the mineral potential of given area. It starts with an idea of geologic model that identifies lands worthy of further exploration, and it’s the one of risky and costly investments for companies. In this paper, a new method for choosing a scientific map of exploration using neural network was introduced rather than an arbitrary map. The goal of this paper is to demonstrate the effectiveness of Self Organization Map (SOM) algorithm in visual exploration of physical geographic data. The SOM is one of the most popular neural network models, which provides a data visualizationtechnique which helps to understand high dimensional data by reducing the dimensions of data to maps. In the present paper, the algorithm is based on unsupervised learning, and Java programming codes is used to simulate the SOM algorithm.
The mobile applications have become one of the important applications in human life, and it was widely used during the last ten years. Mobile devices can be used to do various tasks, such as browsing the internet, sending or receiving emails, and performing other tasks. Bluetooth technology is considered as one of the important specifications that were added to mobile phones during the current century where the user can use it for data and image transmission and others. One of the important applications of Bluetooth, which appeared in the last years, is the conversation via Bluetooth where users can hold short conversations using this technique. One of the most important benefits of Bluetooth technology is that it's free to send and receive messages. While the disadvantages of this application is that it is short-term, since users must be within the scope of the Bluetooth service which is (7-9 meters) to be able to send messages and use it. In this paper, we will design and implement a private conversation via Bluetooth software which has the ability to work within biggest scopeby taking advantage of the properties of the (Scatternet). Each user of the application can be a crossroads for the other users. In other words, if there is, for example, users (a) and (b) 7 meters away from each other, and a third user (c) appeared within 12 meters of the first user (a). In this case, the third user (c) can be connected to the first user through the user (b). In other words, the second user (b) would be an intermediary between the first user (a) and the third user (c). So, we have been solved the distance limit problem for using the Bluetooth application. In addition, the users
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.