Working of Meltdown and Spectre Exploits
VerifiedAdded on 2021/06/16
|9
|4028
|491
AI Summary
Title and Reference: Working of Meltdown Exploit, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. Title and Reference: Working of Meltdown Exploit, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard,
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Week 1
The text discusses how modern CPUs function. Recently a critical flaw in
microprocessor design has been discovered that allows two extremely serious
security exploits: Spectre and Meltdown. Find and summarise ONE resource that
describes how either of these exploits work. The resource (and your summary)
should focus on what is occurring in the CPU that allows these exploits to occur.
Title and Reference:
Working of Meltdown Exploit
Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P.,
Genkin, D., Yarom, Y. and Hamburg, M. (2018). Meltdown. [online]
Meltdownattack.com. Available at: https://meltdownattack.com/meltdown.pdf
[Accessed 10 May 2018].
Summary:
Research paper on the Meltdown Exploit has been chosen has the resource for the
week. It has been selected since a detailed description of the attack and the
associated mechanism is covered in the research paper. The computer architecture
and the associated principles have been defined since a long time. The exploit
attacks and attempts to bring changes in this architecture. The impact or the
consequences of the attack depend upon the data sets and values that are affected
by the attack. For instance, if the confidential data sets are modified then the
resulting impact would be huge and vice versa. The security boundaries that are
associated with the computer architecture are targeted and melted down as a result
of the impact and that is the source of origin of the attack. The mechanism behind
the exploit is based upon varied instruction sets. For example, getByte and
probeArray instructions are used to extract the data values from the kernel memory.
There is mix speculative execution process that is involved in this exploit through
which an element of probeArray is extracted and is stored in the cache memory. The
access time involved with the element provides the information on the extraction
process. Such a process may also provide a value of the element in return which
leads to the compromise of the security. The data sets captured can therefore be of
sensitive nature while they may also be public or less sensitive as compared to the
rest of the data elements and values.
Week 2
Prior to 1985, there were very few Operating Systems (OSes) that used Graphical
User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of
these GUI operating systems. The OS must have been release prior to 1985 so
cannot be Microsoft Windows.
Title and Reference:
Lisa OS
Machistory (2018). Apple Lisa - Mac History. [online] Mac History. Available at:
http://www.mac-history.net/apple-history-2/apple-lisa/2007-10-12/apple-lisa
[Accessed 10 May 2018].
Summary:
The website is used as a resource that provides the detail of one of the operating
systems that were launched before 1985. Apple came up with Local Integrated
Software Architecture (LISA) with the release of LISA personal computer. The
computer had the LISA operating system that acted as an interface between the
system and its users. The OS was released in the early 1980s and the primary
motive behind its release was to offer the users a document processing platform. The
layout and the options presented on the operating system were evenly spread out
1
The text discusses how modern CPUs function. Recently a critical flaw in
microprocessor design has been discovered that allows two extremely serious
security exploits: Spectre and Meltdown. Find and summarise ONE resource that
describes how either of these exploits work. The resource (and your summary)
should focus on what is occurring in the CPU that allows these exploits to occur.
Title and Reference:
Working of Meltdown Exploit
Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P.,
Genkin, D., Yarom, Y. and Hamburg, M. (2018). Meltdown. [online]
Meltdownattack.com. Available at: https://meltdownattack.com/meltdown.pdf
[Accessed 10 May 2018].
Summary:
Research paper on the Meltdown Exploit has been chosen has the resource for the
week. It has been selected since a detailed description of the attack and the
associated mechanism is covered in the research paper. The computer architecture
and the associated principles have been defined since a long time. The exploit
attacks and attempts to bring changes in this architecture. The impact or the
consequences of the attack depend upon the data sets and values that are affected
by the attack. For instance, if the confidential data sets are modified then the
resulting impact would be huge and vice versa. The security boundaries that are
associated with the computer architecture are targeted and melted down as a result
of the impact and that is the source of origin of the attack. The mechanism behind
the exploit is based upon varied instruction sets. For example, getByte and
probeArray instructions are used to extract the data values from the kernel memory.
There is mix speculative execution process that is involved in this exploit through
which an element of probeArray is extracted and is stored in the cache memory. The
access time involved with the element provides the information on the extraction
process. Such a process may also provide a value of the element in return which
leads to the compromise of the security. The data sets captured can therefore be of
sensitive nature while they may also be public or less sensitive as compared to the
rest of the data elements and values.
Week 2
Prior to 1985, there were very few Operating Systems (OSes) that used Graphical
User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of
these GUI operating systems. The OS must have been release prior to 1985 so
cannot be Microsoft Windows.
Title and Reference:
Lisa OS
Machistory (2018). Apple Lisa - Mac History. [online] Mac History. Available at:
http://www.mac-history.net/apple-history-2/apple-lisa/2007-10-12/apple-lisa
[Accessed 10 May 2018].
Summary:
The website is used as a resource that provides the detail of one of the operating
systems that were launched before 1985. Apple came up with Local Integrated
Software Architecture (LISA) with the release of LISA personal computer. The
computer had the LISA operating system that acted as an interface between the
system and its users. The OS was released in the early 1980s and the primary
motive behind its release was to offer the users a document processing platform. The
layout and the options presented on the operating system were evenly spread out
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
and there was a menu that was kept on the top. The menu comprised of several
options similar to the present day operating systems and applications, such as File,
Edit, Print, etc. The deleted files went to the wastebasket and it was present on the
desktop. The users were also provided with the calculator utility and there were
options as clipboard, profile, preferences, etc. The main focus was kept on the ease
of usage and therefore, the operating system provided all of the options and icons
right on the desktop. The users could also save their respective files using the folder
architecture which was followed for better organization of the files. The operating
system was also upgraded a couple of times; however, it failed to make its mark
among the end-users and in the technical world. It was later discontinued after the
release of Windows OS in the market. Macintosh also came up after a few years.
Week 3
Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks
that are characterised by linking devices over large distances. Devices (including
simple sensors) typically can only communicate at very low bit rates, however, the
communication and associated electronics consume very little power. As such,
LPWAN devices can be battery powered and operate independently for many
months or even years. Find and summarise ONE resource that describes ONE
platform or technology that implements a LPWAN.
Title and Reference:
Narrow-Band IoT
Gsma (2018). Narrowband – Internet of Things (NB-IoT) | Internet of Things. [online]
Internet of Things. Available at: https://www.gsma.com/iot/narrow-band-internet-of-
things-nb-iot/ [Accessed 10 May 2018].
Summary:
Low Power Wide Area Networks, also known as LPWAN is the technology that
allows and support long range communication at lower bit rate. There are various
technologies that have been developed to support LPWAN and one of such
technologies is NarrowBand Internet of Things. It is also referred as NB-IoT and it
ensures that the power consumption of the devices in connected systems and
applications is brought down. With the lowering down of the power consumption, the
system efficiency and its capacity is also improved. With the advent of technology,
the technocrats have now come up with physical layer channels that allow and
support extended coverage. In such cases, extremely low device complexity and
rural connectivity is made possible. It is expected that the cost of the technology will
be currently equivalent to GSM/GPRS. However, it will further drop with the increase
in demand. There are also a number of compatibility tests and analysis procedures
that have been executed so that the compatibility of the technology may be verified
and validated in advance. It has provided the results that NB-IoT is compatible with
most of the leading devices, sensors, operating systems, and platforms that are
popular in the market. For the security point of view, the technology makes sure that
the information properties and the privacy of the data sets is always protected and
kept secured. Another benefit that comes along with the technology is that it is fairly
simple and easy to understand and the complexity levels are low.
Week 4
Voice over IP (VoIP) is a group of hardware and software technologies that allow
users to communicate via voice and video over the Internet. VoIP uses a number of
2
options similar to the present day operating systems and applications, such as File,
Edit, Print, etc. The deleted files went to the wastebasket and it was present on the
desktop. The users were also provided with the calculator utility and there were
options as clipboard, profile, preferences, etc. The main focus was kept on the ease
of usage and therefore, the operating system provided all of the options and icons
right on the desktop. The users could also save their respective files using the folder
architecture which was followed for better organization of the files. The operating
system was also upgraded a couple of times; however, it failed to make its mark
among the end-users and in the technical world. It was later discontinued after the
release of Windows OS in the market. Macintosh also came up after a few years.
Week 3
Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks
that are characterised by linking devices over large distances. Devices (including
simple sensors) typically can only communicate at very low bit rates, however, the
communication and associated electronics consume very little power. As such,
LPWAN devices can be battery powered and operate independently for many
months or even years. Find and summarise ONE resource that describes ONE
platform or technology that implements a LPWAN.
Title and Reference:
Narrow-Band IoT
Gsma (2018). Narrowband – Internet of Things (NB-IoT) | Internet of Things. [online]
Internet of Things. Available at: https://www.gsma.com/iot/narrow-band-internet-of-
things-nb-iot/ [Accessed 10 May 2018].
Summary:
Low Power Wide Area Networks, also known as LPWAN is the technology that
allows and support long range communication at lower bit rate. There are various
technologies that have been developed to support LPWAN and one of such
technologies is NarrowBand Internet of Things. It is also referred as NB-IoT and it
ensures that the power consumption of the devices in connected systems and
applications is brought down. With the lowering down of the power consumption, the
system efficiency and its capacity is also improved. With the advent of technology,
the technocrats have now come up with physical layer channels that allow and
support extended coverage. In such cases, extremely low device complexity and
rural connectivity is made possible. It is expected that the cost of the technology will
be currently equivalent to GSM/GPRS. However, it will further drop with the increase
in demand. There are also a number of compatibility tests and analysis procedures
that have been executed so that the compatibility of the technology may be verified
and validated in advance. It has provided the results that NB-IoT is compatible with
most of the leading devices, sensors, operating systems, and platforms that are
popular in the market. For the security point of view, the technology makes sure that
the information properties and the privacy of the data sets is always protected and
kept secured. Another benefit that comes along with the technology is that it is fairly
simple and easy to understand and the complexity levels are low.
Week 4
Voice over IP (VoIP) is a group of hardware and software technologies that allow
users to communicate via voice and video over the Internet. VoIP uses a number of
2
different software protocols, depending on the application. Find and summarise ONE
resource that describes ONE of these VoIP protocols.
Title and Reference:
Media Gateway Control Protocol
Cisco (2018). Understanding MGCP Interactions with Cisco CallManager. [online]
Cisco.com. Available at: https://www.cisco.com/c/en/us/support/docs/voice/media-
gateway-control-protocol-mgcp/44130-understanding-mgcp.pdf [Accessed 10 May
2018].
Summary:
The transmission of voice and multimedia content on the Internet Protocol (IP) is
made possible with the aid of Voice over Internet Protocol (VoIP). There are a lot of
protocols that have been listed and are defined under VoIP and one of the significant
and useful one out of the list is the Media Gateway Control Protocol (MGCP). The
multimedia transmissions and exchanges that are carried out require efficient
session management and its handling. Also, the quality of the transmissions can be
maintained when the signals are adequately managed and handled. All of these
tasks are given shape by MGCP. There are a lot of data packets that are transmitted
on the networking and communication channels. MGCP handles these sets between
the media gateways and also performs the task of conversion of the data formats.
There are changes that are taking place in the field of technology. These changes
are reflected in the MGCP as well as there have been updates released in the
market in association with the same. The updated protocols are known by the names
of H.248 and Megaco. There are no issues with the standardization of the protocol as
the governing and regulatory bodies have signed off the protocol and all of its
associated components. There is a master/slave model used in the application layer
of the protocol. In this case, the master is termed as the media gateway controller
and the associated rights are also provided to the master. Time division multiplexing
is also supported by the protocol.
Week 5
One of the many uses of cryptography has been the development of the blockchain.
Blockchains are commonly used as the basis for maintaining the data integrity of
crypto currencies, though have many, many more applications. Find and summarise
ONE resource that describes how blockchains work. Note that the resource should
focus on the blockchain mechanism, NOT crypto currencies.
Title and Reference:
Working of Blockchain
Cheng, S., Zeng, B. and Huang, Y. (2017). Research on application model of
blockchain technology in distributed electricity market. IOP Conference Series: Earth
and Environmental Science, 93, p.012065.
Summary:
Blockchain is characterized as a type of disseminated record that monitors the
computerized records based on prerequisites and proprietorship. It is circulated
record that does not have a brought together database like a large portion of the
other conventional databases. It incorporates a substantial chain of database
reproductions which are synchronized utilizing Internet and can be seen by any of
the element introduced in the system. The Blockchain systems can be private or
open in nature according to the prerequisites of the elements included. The working
of the Blockchain innovation can be clarified through any of the computerized
3
resource that describes ONE of these VoIP protocols.
Title and Reference:
Media Gateway Control Protocol
Cisco (2018). Understanding MGCP Interactions with Cisco CallManager. [online]
Cisco.com. Available at: https://www.cisco.com/c/en/us/support/docs/voice/media-
gateway-control-protocol-mgcp/44130-understanding-mgcp.pdf [Accessed 10 May
2018].
Summary:
The transmission of voice and multimedia content on the Internet Protocol (IP) is
made possible with the aid of Voice over Internet Protocol (VoIP). There are a lot of
protocols that have been listed and are defined under VoIP and one of the significant
and useful one out of the list is the Media Gateway Control Protocol (MGCP). The
multimedia transmissions and exchanges that are carried out require efficient
session management and its handling. Also, the quality of the transmissions can be
maintained when the signals are adequately managed and handled. All of these
tasks are given shape by MGCP. There are a lot of data packets that are transmitted
on the networking and communication channels. MGCP handles these sets between
the media gateways and also performs the task of conversion of the data formats.
There are changes that are taking place in the field of technology. These changes
are reflected in the MGCP as well as there have been updates released in the
market in association with the same. The updated protocols are known by the names
of H.248 and Megaco. There are no issues with the standardization of the protocol as
the governing and regulatory bodies have signed off the protocol and all of its
associated components. There is a master/slave model used in the application layer
of the protocol. In this case, the master is termed as the media gateway controller
and the associated rights are also provided to the master. Time division multiplexing
is also supported by the protocol.
Week 5
One of the many uses of cryptography has been the development of the blockchain.
Blockchains are commonly used as the basis for maintaining the data integrity of
crypto currencies, though have many, many more applications. Find and summarise
ONE resource that describes how blockchains work. Note that the resource should
focus on the blockchain mechanism, NOT crypto currencies.
Title and Reference:
Working of Blockchain
Cheng, S., Zeng, B. and Huang, Y. (2017). Research on application model of
blockchain technology in distributed electricity market. IOP Conference Series: Earth
and Environmental Science, 93, p.012065.
Summary:
Blockchain is characterized as a type of disseminated record that monitors the
computerized records based on prerequisites and proprietorship. It is circulated
record that does not have a brought together database like a large portion of the
other conventional databases. It incorporates a substantial chain of database
reproductions which are synchronized utilizing Internet and can be seen by any of
the element introduced in the system. The Blockchain systems can be private or
open in nature according to the prerequisites of the elements included. The working
of the Blockchain innovation can be clarified through any of the computerized
3
exchanges. At the point when any of the computerized exchanges are brought out
through Blockchain, they are joined together in a piece that is cryptographically
secured. The gathering is done based on the event of alternate exchanges and the
square is shared on the whole system. The end of the exchange is completed by the
excavators with the execution of complex codes. The blocks that are approved are
then timestamped and are then added to a chain in a direct request. The new ones in
the request are then associated with the more seasoned ones so the historical
backdrop of Blockchain is additionally kept up. This chain is persistently refreshed
based on the advanced records so the individuals are constantly mindful of the
adjustments that are finished. The decentralized and open nature of Blockchain
improves the trust of the clients and there are expanded security benefits that are
additionally given as well.
Week 6
One controversial practical application of network traffic management is in the
contravention of the principle of “net neutrality”. Find and summarise ONE resource
that describes what net neutrality is and how its contravention could impact on
individual and business users of the Internet.
Title and Reference:
Net Neutrality & its Impact
Bbc (2017). Explainer: What is net neutrality?. [online] BBC News. Available at:
http://www.bbc.com/news/av/42341736/what-is-net-neutrality-and-how-could-it-
affect-you [Accessed 10 May 2018].
Summary:
Net Neutrality gives the Internet clients the privilege to get to the web on a boundless
premise without the variety of charges or speed-based webpage area or its
utilization. The first guidelines were laid out in 2015 and an administrative
arrangement was set up to deal with the changing needs of the Internet. As per the
principles that were set up, the acts of blocking, throttling, and paid prioritization were
restricted. The web access suppliers were not given the capacity to obstruct any of
the locales or applications. Notwithstanding, the rejecting of these guidelines is
contended and wrangled by many. The clients trust that the cost of getting to the web
will run up with the rejection of these guidelines. The web suppliers will charge higher
and the openness to the locales will likewise turn into an issue. There are sure
nations in which web packaging and part has just started. The accessor fulfilment
rate and the commitment levels will endure as a result. The compensation to-pay
arrangements may not be gainful for the customers. The enormous players in the
market will use paid prioritization and alternate units will be deserted. There will be
restraining infrastructure of the market mammoths that will be watched and the
coveted substance could conceivably be accessible. There is additionally a moral
infringement and issue that is seen with the rejecting of the new neutrality rules. The
clients have the privilege to get to whatever substance they want at a similar speed
and rates.
4
through Blockchain, they are joined together in a piece that is cryptographically
secured. The gathering is done based on the event of alternate exchanges and the
square is shared on the whole system. The end of the exchange is completed by the
excavators with the execution of complex codes. The blocks that are approved are
then timestamped and are then added to a chain in a direct request. The new ones in
the request are then associated with the more seasoned ones so the historical
backdrop of Blockchain is additionally kept up. This chain is persistently refreshed
based on the advanced records so the individuals are constantly mindful of the
adjustments that are finished. The decentralized and open nature of Blockchain
improves the trust of the clients and there are expanded security benefits that are
additionally given as well.
Week 6
One controversial practical application of network traffic management is in the
contravention of the principle of “net neutrality”. Find and summarise ONE resource
that describes what net neutrality is and how its contravention could impact on
individual and business users of the Internet.
Title and Reference:
Net Neutrality & its Impact
Bbc (2017). Explainer: What is net neutrality?. [online] BBC News. Available at:
http://www.bbc.com/news/av/42341736/what-is-net-neutrality-and-how-could-it-
affect-you [Accessed 10 May 2018].
Summary:
Net Neutrality gives the Internet clients the privilege to get to the web on a boundless
premise without the variety of charges or speed-based webpage area or its
utilization. The first guidelines were laid out in 2015 and an administrative
arrangement was set up to deal with the changing needs of the Internet. As per the
principles that were set up, the acts of blocking, throttling, and paid prioritization were
restricted. The web access suppliers were not given the capacity to obstruct any of
the locales or applications. Notwithstanding, the rejecting of these guidelines is
contended and wrangled by many. The clients trust that the cost of getting to the web
will run up with the rejection of these guidelines. The web suppliers will charge higher
and the openness to the locales will likewise turn into an issue. There are sure
nations in which web packaging and part has just started. The accessor fulfilment
rate and the commitment levels will endure as a result. The compensation to-pay
arrangements may not be gainful for the customers. The enormous players in the
market will use paid prioritization and alternate units will be deserted. There will be
restraining infrastructure of the market mammoths that will be watched and the
coveted substance could conceivably be accessible. There is additionally a moral
infringement and issue that is seen with the rejecting of the new neutrality rules. The
clients have the privilege to get to whatever substance they want at a similar speed
and rates.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 7
Information Systems have led to greater and greater degrees of automation in the
workplace. There is currently extensive speculation on which jobs will cease to be
performed by humans in the near future. Find and summarise ONE resource that
discusses jobs that are likely to not exist in the future due to ICT based automation.
Note that the resource must clearly link the loss of the job(s) to advances in ICT.
Title and Reference:
Driverless Trucks & Vehicles
Reynolds, E. (2016). The jobs killer is coming. [online] NewsComAu. Available at:
http://www.news.com.au/finance/business/travel/the-jobs-killer-is-coming-how-
driverless-trucks-could-change-australia/news-story/
4f5b8a42b0452703d62e00f3e7644d7b [Accessed 10 May 2018].
Summary:
The resource that has been chosen for the week is a published article on the current
and future state of the driverless trucks in Australia. The resulting impacts are
discussed in the article. The advancements in the field of data and correspondence
innovation are being done in almost every field. Vehicle industry has additionally
seen various advancements with the execution and utilization of most recent
innovations, for example, Artificial Intelligence, Machine Learning, and Internet of
Things. The organizations like Tesla and Volvo are currently working in the zone of
self-governing vehicles and there are semi-self-sufficient vehicles that have just been
propelled. The subsequent stage is to discharge the driverless vehicles in the
market. This will give a few advantages to the clients as the most recent highlights
will be incorporated into these vehicles and the mishaps and impacts on the streets
will likewise be maintained a strategic distance from as it were. Nonetheless, there
will likewise be a few downsides that will come about out of this progression. It will
prompt the loss of occupations for the drivers and overseers of these vehicles as the
machines created will be insightful and brilliant. This is the reason that the arrival of
such vehicles isn't being valued by all. Additionally, the discernment of these vehicles
is being contrasted and human levelheadedness that may not be coordinated up. Be
that as it may, the loss of employments might be remunerated with the production of
different occupations, for example, framework screens, designers, and similarly.
Week 8
With the advent of mass data collection and storage has come the use of these
datasets for machine learning. Find and summarise ONE resource that describes
what machine learning is and how it is being used.
Title and Reference:
Machine Leaning Processes & Algorithms
Salaken, S., Khosravi, A., Nguyen, T. and Nahavandi, S. (2017). Extreme learning
machine based transfer learning algorithms: A survey. Neurocomputing, 267, pp.516-
524.
Summary:
The resource selected for the week is a journal article that is published on the topic
of Machine Learning and the resulting applications and services. The concept of
Machine Learning is an innovation that enables the technocrats and specialists to
create insightful machines that may not require human help to play out any of the
business tasks. The innovation is utilized alongside Artificial Intelligence and
5
Information Systems have led to greater and greater degrees of automation in the
workplace. There is currently extensive speculation on which jobs will cease to be
performed by humans in the near future. Find and summarise ONE resource that
discusses jobs that are likely to not exist in the future due to ICT based automation.
Note that the resource must clearly link the loss of the job(s) to advances in ICT.
Title and Reference:
Driverless Trucks & Vehicles
Reynolds, E. (2016). The jobs killer is coming. [online] NewsComAu. Available at:
http://www.news.com.au/finance/business/travel/the-jobs-killer-is-coming-how-
driverless-trucks-could-change-australia/news-story/
4f5b8a42b0452703d62e00f3e7644d7b [Accessed 10 May 2018].
Summary:
The resource that has been chosen for the week is a published article on the current
and future state of the driverless trucks in Australia. The resulting impacts are
discussed in the article. The advancements in the field of data and correspondence
innovation are being done in almost every field. Vehicle industry has additionally
seen various advancements with the execution and utilization of most recent
innovations, for example, Artificial Intelligence, Machine Learning, and Internet of
Things. The organizations like Tesla and Volvo are currently working in the zone of
self-governing vehicles and there are semi-self-sufficient vehicles that have just been
propelled. The subsequent stage is to discharge the driverless vehicles in the
market. This will give a few advantages to the clients as the most recent highlights
will be incorporated into these vehicles and the mishaps and impacts on the streets
will likewise be maintained a strategic distance from as it were. Nonetheless, there
will likewise be a few downsides that will come about out of this progression. It will
prompt the loss of occupations for the drivers and overseers of these vehicles as the
machines created will be insightful and brilliant. This is the reason that the arrival of
such vehicles isn't being valued by all. Additionally, the discernment of these vehicles
is being contrasted and human levelheadedness that may not be coordinated up. Be
that as it may, the loss of employments might be remunerated with the production of
different occupations, for example, framework screens, designers, and similarly.
Week 8
With the advent of mass data collection and storage has come the use of these
datasets for machine learning. Find and summarise ONE resource that describes
what machine learning is and how it is being used.
Title and Reference:
Machine Leaning Processes & Algorithms
Salaken, S., Khosravi, A., Nguyen, T. and Nahavandi, S. (2017). Extreme learning
machine based transfer learning algorithms: A survey. Neurocomputing, 267, pp.516-
524.
Summary:
The resource selected for the week is a journal article that is published on the topic
of Machine Learning and the resulting applications and services. The concept of
Machine Learning is an innovation that enables the technocrats and specialists to
create insightful machines that may not require human help to play out any of the
business tasks. The innovation is utilized alongside Artificial Intelligence and
5
Robotics to build up the brilliant machines and hardware. It is as of now being utilized
as a part of the areas, for example, fabricating, retail, medicinal services, cars, and
numerous others. There are a few calculations that are included to create gear
utilizing machine learning. Coordinated calculations are the ones in which data lists
are used to offer shape to the codes. These have improved adaptability as they may
change according to the wellspring of data that is utilized. The calculations in which
the wellsprings of data are not set apart ahead of time are named as unsupervised
learning calculations. The estimations and forecasts in such cases are specially
appointed and are not known ahead of time. There are likewise semi-regulated
calculations that have been created that are a blend of the two. Choice trees,
calculated relapses, bolster vector machines, and so on are the cases of coordinated
or managed calculations. Autonomous segment investigation, bunching calculations,
and solitary esteem disintegration are the cases of unsupervised learning
calculations. These calculations are by and large broadly utilized and connected to
create more up to date codes.
Week 9
Critical to application development are the languages used to implement the
specifications. Find and summarise ONE resource that describes ONE programming
language that has been developed since 2008. The resource (and your summary)
should include information on the principle uses and features of the language.
Title and Reference:
Perl 6 programming language
Perl6 (2018). Perl 6 Programming Language. [online] Perl6.org. Available at:
https://perl6.org/ [Accessed 10 May 2018].
Summary:
Perl 6 is a programing dialect that has been propelled a few years back and has
picked up a considerable measure of ubiquity and acknowledgment in the
programming scenario. The forerunners of the language incorporate Perl, Ruby,
Python, and Haskell. It was first discharged in 2015. It is a broadly useful and
dynamic programming dialect. Rakudo Perl 6 usage is currently dynamic
advancement. A portion of the real changes that have been done in this
programming language when contrasted with Perl 5 incorporate changes in
determinations, formal sub-routine parameters rundown, squares and terminations,
parts, and protest arranged programming ideal models. There are a portion of the
more current highlights that have now been added to the dialect. There is a Tweak
strategy that has been characterized that might be used with each class. This would
enable the items to be changed at the season of their creation. Simultaneousness
enhancements should likewise be possible alongside the utilization of Unicode treats.
The dialect likewise furnishes the instrument to skip esteems with the utilization of
skip and supply strategies. The software engineers may avoid the qualities that are
being produced by a specific code. Perl 6 also incorporates the highlights and
strategies joining the recorded and current processes. There are sure highlights that
have been obtained from other languages, for example, C, AWK, sed, and shell
content. Every one of the factors that are characterized in the codes composed
utilizing Perl 6 as the programming language is set apart with sigils.
6
as a part of the areas, for example, fabricating, retail, medicinal services, cars, and
numerous others. There are a few calculations that are included to create gear
utilizing machine learning. Coordinated calculations are the ones in which data lists
are used to offer shape to the codes. These have improved adaptability as they may
change according to the wellspring of data that is utilized. The calculations in which
the wellsprings of data are not set apart ahead of time are named as unsupervised
learning calculations. The estimations and forecasts in such cases are specially
appointed and are not known ahead of time. There are likewise semi-regulated
calculations that have been created that are a blend of the two. Choice trees,
calculated relapses, bolster vector machines, and so on are the cases of coordinated
or managed calculations. Autonomous segment investigation, bunching calculations,
and solitary esteem disintegration are the cases of unsupervised learning
calculations. These calculations are by and large broadly utilized and connected to
create more up to date codes.
Week 9
Critical to application development are the languages used to implement the
specifications. Find and summarise ONE resource that describes ONE programming
language that has been developed since 2008. The resource (and your summary)
should include information on the principle uses and features of the language.
Title and Reference:
Perl 6 programming language
Perl6 (2018). Perl 6 Programming Language. [online] Perl6.org. Available at:
https://perl6.org/ [Accessed 10 May 2018].
Summary:
Perl 6 is a programing dialect that has been propelled a few years back and has
picked up a considerable measure of ubiquity and acknowledgment in the
programming scenario. The forerunners of the language incorporate Perl, Ruby,
Python, and Haskell. It was first discharged in 2015. It is a broadly useful and
dynamic programming dialect. Rakudo Perl 6 usage is currently dynamic
advancement. A portion of the real changes that have been done in this
programming language when contrasted with Perl 5 incorporate changes in
determinations, formal sub-routine parameters rundown, squares and terminations,
parts, and protest arranged programming ideal models. There are a portion of the
more current highlights that have now been added to the dialect. There is a Tweak
strategy that has been characterized that might be used with each class. This would
enable the items to be changed at the season of their creation. Simultaneousness
enhancements should likewise be possible alongside the utilization of Unicode treats.
The dialect likewise furnishes the instrument to skip esteems with the utilization of
skip and supply strategies. The software engineers may avoid the qualities that are
being produced by a specific code. Perl 6 also incorporates the highlights and
strategies joining the recorded and current processes. There are sure highlights that
have been obtained from other languages, for example, C, AWK, sed, and shell
content. Every one of the factors that are characterized in the codes composed
utilizing Perl 6 as the programming language is set apart with sigils.
6
Week 10
While information systems and technology deliver many benefits to society, they can
also result in negative effects and outcomes. One recent controversy, the
propagation of fake news and its influence on elections, has been linked to a type of
software called a “bot”. Find and summarise ONE resource that describes what bots
are and how they can be used for disseminating misinformation and affecting human
behaviour.
Title and Reference:
Bots & their Use
Norton (2018). What Are Bots?. [online] Us.norton.com. Available at:
https://us.norton.com/internetsecurity-malware-what-are-bots.html [Accessed 10 May
2018].
Summary:
A bot is an automated conversational code that comprehends the inquiries that are
put by the clients and gives them the reaction to the same as a reply. These are
otherwise called Internet robots that perform redundant operations. Malware bots are
created by the vindictive substances that may take up the control of the whole
framework. Malware bots are the self-proliferating malware that contaminate the
hosts and interface back to the focal server or gathering of servers. These pernicious
codes may duplicate alone and might be utilized to offer shape to the security
assaults, for example, propelling of disavowal of administration assaults, getting
passwords, abuse of secondary passages, gathering passwords, and logging
keystrokes. The answers that are given by the bots are in common dialect. The great
bots may have a ton of use in the businesses and in individual and expert exercises,
for example, planning of the gathering at the work environment, giving reaction to the
general inquiries by the clients, basic leadership and critical thinking exercises. The
dispersal of data may likewise be given shape by the bots. It is on the grounds that
the bots have the capacity to go unnoticed. They might be available in the framework
without the information of the framework proprietor and clients and may gradually
catch and control the whole framework alongside the greater part of its informational
indexes. The download strategy might be used to offer shape to the bot that may
affect the PC framework. The download might be done from online networking or
different channels.
7
While information systems and technology deliver many benefits to society, they can
also result in negative effects and outcomes. One recent controversy, the
propagation of fake news and its influence on elections, has been linked to a type of
software called a “bot”. Find and summarise ONE resource that describes what bots
are and how they can be used for disseminating misinformation and affecting human
behaviour.
Title and Reference:
Bots & their Use
Norton (2018). What Are Bots?. [online] Us.norton.com. Available at:
https://us.norton.com/internetsecurity-malware-what-are-bots.html [Accessed 10 May
2018].
Summary:
A bot is an automated conversational code that comprehends the inquiries that are
put by the clients and gives them the reaction to the same as a reply. These are
otherwise called Internet robots that perform redundant operations. Malware bots are
created by the vindictive substances that may take up the control of the whole
framework. Malware bots are the self-proliferating malware that contaminate the
hosts and interface back to the focal server or gathering of servers. These pernicious
codes may duplicate alone and might be utilized to offer shape to the security
assaults, for example, propelling of disavowal of administration assaults, getting
passwords, abuse of secondary passages, gathering passwords, and logging
keystrokes. The answers that are given by the bots are in common dialect. The great
bots may have a ton of use in the businesses and in individual and expert exercises,
for example, planning of the gathering at the work environment, giving reaction to the
general inquiries by the clients, basic leadership and critical thinking exercises. The
dispersal of data may likewise be given shape by the bots. It is on the grounds that
the bots have the capacity to go unnoticed. They might be available in the framework
without the information of the framework proprietor and clients and may gradually
catch and control the whole framework alongside the greater part of its informational
indexes. The download strategy might be used to offer shape to the bot that may
affect the PC framework. The download might be done from online networking or
different channels.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
8
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
8
9
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.