Topic Review
Lozenge
A lozenge ( /ˈlɒz.ɪndʒ/), ◊ – often referred to as a diamond – is a form of rhombus. The definition of lozenge is not strictly fixed, and it is sometimes used simply as a synonym (from the French: losange) for rhombus. Most often, though, lozenge refers to a thin rhombus—a rhombus with two acute and two obtuse angles, especially one with acute angles of 45°. The lozenge shape is often used in parquetry (with acute angles that are 360°/n with n being an integer higher than 4, because they can be used to form a set of tiles of the same shape and size, reusable to cover the plane in various geometric patterns as the result of a tiling process called tessellation in mathematics) and as decoration on ceramics, silverware and textiles. It also features in heraldry and playing cards.
  • 1.7K
  • 29 Nov 2022
Topic Review
Long and Short Scale
The long and short scales are two of several naming systems for integer powers of ten which use some of the same terms for different magnitudes. For whole numbers smaller than 1,000,000,000 (109), such as one thousand or one million, the two scales are identical. For larger numbers, starting with 109, the two systems differ. For identical names, the long scale proceeds by powers of one million, whereas the short scale proceeds by powers of one thousand. For example, "one billion" means one thousand millions in the short scale, while it means one million millions in the long scale. The long scale system uses additional terms for the intervening values, typically replacing the word ending -ion with -iard.
  • 1.7K
  • 24 Nov 2022
Topic Review
Differential Geometry of Curves
Differential geometry of curves is the branch of geometry that deals with smooth curves in the plane and in the Euclidean space by methods of differential and integral calculus. Starting in antiquity, many specific curves have been thoroughly investigated using the synthetic approach. Differential geometry takes another path: curves are represented in a parametrized form, and their geometric properties and various quantities associated with them, such as the curvature and the arc length, are expressed via derivatives and integrals using vector calculus. One of the most important tools used to analyze a curve is the Frenet frame, a moving frame that provides a coordinate system at each point of the curve that is "best adapted" to the curve near that point. The theory of curves is much simpler and narrower in scope than the theory of surfaces and its higher-dimensional generalizations, because a regular curve in a Euclidean space has no intrinsic geometry. Any regular curve may be parametrized by the arc length (the natural parametrization) and from the point of view of a theoretical point particle on the curve that does not know anything about the ambient space, all curves would appear the same. Different space curves are only distinguished by the way in which they bend and twist. Quantitatively, this is measured by the differential-geometric invariants called the curvature and the torsion of a curve. The fundamental theorem of curves asserts that the knowledge of these invariants completely determines the curve.
  • 1.7K
  • 17 Nov 2022
Topic Review
Cataloging
In library and information science, cataloging (US) or cataloguing (UK) is the process of creating metadata representing information resources, such as books, sound recordings, moving images, etc. Cataloging provides information such as creator names, titles, and subject terms that describe resources, typically through the creation of bibliographic records. The records serve as surrogates for the stored information resources. Since the 1970s these metadata are in machine-readable form and are indexed by information retrieval tools, such as bibliographic databases or search engines. While typically the cataloging process results in the production of library catalogs, it also produces other types of discovery tools for documents and collections. Bibliographic control provides the philosophical basis of cataloging, defining the rules for sufficiently describing information resources to enable users to find and select the most appropriate resource. A cataloger is an individual responsible for the processes of description, subject analysis, classification, and authority control of library materials. Catalogers serve as the "foundation of all library service, as they are the ones who organize information in such a way as to make it easily accessible".
  • 1.7K
  • 22 Nov 2022
Topic Review
IrfanView
IrfanView (/ˈɪərfænvjuː/) is an image viewer, editor, organiser and converter program for Microsoft Windows. It can also play video and audio files, and has some image creation and painting capabilities. IrfanView is free for non-commercial use; commercial use requires paid registration. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic file formats. It was first released in 1996. IrfanView is named after its creator, Irfan Škiljan, from Jajce, Bosnia and Herzegovina, living in Vienna. The current version of IrfanView, 4.58, works under all versions of Windows from Windows 2000 SP4 to Windows 10, while all older versions are compatible with Windows 95/98/ME and can also be run in Linux under Wine and in macOS using WineBottler.
  • 1.7K
  • 30 Oct 2022
Topic Review
Cortana
Cortana is a virtual assistant developed by Microsoft which uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user. Cortana is currently available in English, Portuguese, French, German, Italian, Spanish, Chinese, and Japanese language editions, depending on the software platform and region in which it is used. Microsoft began reducing the prevalence of Cortana and converting it from an assistant into different software integrations in 2019. It was split from Windows 10's search bar in April 2019. In January 2020, Cortana mobile app was removed from certain markets and in first half of 2021 Cortana mobile app was shut down globally.
  • 1.7K
  • 24 Oct 2022
Topic Review
Iperius Backup
Iperius Backup is a backup software for Windows PCs and Servers, databases and virtual machines. It allows to make automatic backups of files and folders on many devices: external USB hard drives, RDX drives, NAS, LTO tape drives, networked computers, Cloud storage, Amazon S3, Google Drive and FTP servers. Iperius Backup includes drive imaging capabilities, backup of SQL Server, MySQL, PostgreSQL, Oracle databases, backup of Microsoft Exchange servers, backup and replication of VMware ESXi, vCenter, ESXi Free and Hyper-V virtual machines.
  • 1.7K
  • 30 Oct 2022
Topic Review
Sound Card
A sound card (also known as an audio card) is an internal expansion card that provides input and output of audio signals to and from a computer under the control of computer programs. The term sound card is also applied to external audio interfaces used for professional audio applications. Sound functionality can also be integrated onto the motherboard, using components similar to those found on plug-in cards. The integrated sound system is often still referred to as a sound card. Sound processing hardware is also present on modern video cards with HDMI to output sound along with the video using that connector; previously they used a S/PDIF connection to the motherboard or sound card. Typical uses of sound cards or sound card functionality include providing the audio component for multimedia applications such as music composition, editing video or audio, presentation, education and entertainment (games) and video projection. Sound cards are also used for computer-based communication such as voice over IP and teleconferencing.
  • 1.7K
  • 04 Nov 2022
Topic Review
Modern Computing in Iran
Iran’s modern computing history can be divided into four distinct periods: (1) Computers were first introduced to Iran in 1962. As a result, the introduction of computers in Iran occurred approximately ten years after introducing computers in developed countries. (2) Computer development, Iran’s computer development era began in 1971 and lasted until 1981. This path was followed by a lot of competition to buy hardware, introduce massive software systems, recruit more manpower, and follow rigorous programs based on the country’s technological realities. (3) Computer revisit: As a result of the Islamic Revolution, improvements and innovations in computers occurred, and a series of general reviews were conducted until 1980. (4) Technological maturity and growth in Iran: Following the reopening of universities in 1983, the next stage of computer development began, with software and hardware becoming widely available. The Persian language and script processing is among this century’s most important works.
  • 1.7K
  • 29 Aug 2022
Topic Review
Microsoft OneDrive
Microsoft OneDrive (formerly SkyDrive) is a file hosting service and synchronization service operated by Microsoft as part of its web version of Office. First launched in August 2007, OneDrive allows users to store files and personal data like Windows settings or BitLocker recovery keys in the cloud, share files, and sync files across Android, Windows Phone, and iOS mobile devices, Windows and macOS computers, and the Xbox 360, Xbox One, and Xbox Series X and S consoles. Users can upload Microsoft Office documents to OneDrive. OneDrive offers 5 GB of storage space free of charge, with 100 GB, 1 TB, and 6 TB storage options available either separately or with Office 365 subscriptions.
  • 1.7K
  • 01 Nov 2022
Topic Review
Radix-16 Floating Point
IBM hexadecimal floating point is number representation. IBM System/360 computers, and subsequent machines based on that architecture (mainframes), support a hexadecimal floating-point format (HFP). In comparison to IEEE 754 floating-point, the IBM floating-point format has a longer significand, and a shorter exponent. All IBM floating-point formats have 7 bits of exponent with a bias of 64. The normalized range of representable numbers is from 16−65 to 1663 (approx. 5.39761 × 10−79 to 7.237005 × 1075). The number is represented as the following formula: (−1)sign × 0.significand × 16exponent−64.
  • 1.7K
  • 16 Nov 2022
Topic Review
Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act (CISA S. 2588 [113th Congress], S. 754 [114th Congress]) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police. The text of the bill was incorporated by amendment into a consolidated spending bill in the U.S. House on December 15, 2015, which was signed into law by President Barack Obama on December 18, 2015.
  • 1.7K
  • 07 Nov 2022
Topic Review
Edit Distance
In computational linguistics and computer science, edit distance is a way of quantifying how dissimilar two strings (e.g., words) are to one another by counting the minimum number of operations required to transform one string into the other. Edit distances find applications in natural language processing, where automatic spelling correction can determine candidate corrections for a misspelled word by selecting words from a dictionary that have a low distance to the word in question. In bioinformatics, it can be used to quantify the similarity of DNA sequences, which can be viewed as strings of the letters A, C, G and T. Different definitions of an edit distance use different sets of string operations. Levenshtein distance operations are the removal, insertion, or substitution of a character in the string. Being the most common metric, the term Levenshtein distance is often used interchangeably with edit distance.
  • 1.7K
  • 02 Dec 2022
Topic Review
FireEye
FireEye is a privately held cybersecurity company headquartered in Milpitas, California. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks. FireEye was founded in 2004. Initially, it focused on developing virtual machines that would download and test internet traffic before transferring it to a corporate or government network. The company diversified over time, in part through acquisitions. In 2014, it acquired Mandiant, which provides incident response services following the identification of a security breach. FireEye went public in 2013. USAToday says FireEye "has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem and others".
  • 1.7K
  • 18 Oct 2022
Topic Review
Extreme Learning Machine
In the learning paradigms of artificial neural networks, classical algorithms such as back-propagation aim to approach the theories of biological learning through an iterative adjustment of all the hyper-parameters of the hidden layers for each sequence of data. Therefore, without looking at relearning, in actual problems, the tuning process could take days or months under the use of the available ordinary computers for generalization of the neural network over all of the selected samples. But, the fact that a microprocessor is faster than a brain by about twelve million times, denies that these algorithms are capable of responding to the thought of the human brain which takes less seconds to classify or restore new images or sensations. In 2004, ELM gave birth to new learning rules for artificial neural networks. ELM learning rules remove barriers between human biological thought and artificial neural networks by addressing the fact that: "the parameters of the hidden layer do not need to be adjusted, and the only element responsible for the "universal approximation and generalization are the output weights ". Consequently, ELM has been studied through several applications and extends to a multitude of paradigms such as the ensemble, the hybrid and the deep learning and achieved an excellent reputation. Therefore, The aim of this review will be introducing basic theories of ELM.
  • 1.7K
  • 30 Sep 2021
Topic Review
Gâteaux Derivative
In mathematics, the Gâteaux differential or Gâteaux derivative is a generalization of the concept of directional derivative in differential calculus. Named after René Gâteaux, a French mathematician who died young in World War I, it is defined for functions between locally convex topological vector spaces such as Banach spaces. Like the Fréchet derivative on a Banach space, the Gâteaux differential is often used to formalize the functional derivative commonly used in the calculus of variations and physics. Unlike other forms of derivatives, the Gâteaux differential of a function may be nonlinear. However, often the definition of the Gâteaux differential also requires that it be a continuous linear transformation. Some authors, such as (Tikhomirov 2001), draw a further distinction between the Gâteaux differential (which may be nonlinear) and the Gâteaux derivative (which they take to be linear). In most applications, continuous linearity follows from some more primitive condition which is natural to the particular setting, such as imposing complex differentiability in the context of infinite dimensional holomorphy or continuous differentiability in nonlinear analysis.
  • 1.7K
  • 25 Oct 2022
Topic Review
Morley's Trisector Theorem
In plane geometry, Morley's trisector theorem states that in any triangle, the three points of intersection of the adjacent angle trisectors form an equilateral triangle, called the first Morley triangle or simply the Morley triangle. The theorem was discovered in 1899 by Anglo-American mathematician Frank Morley. It has various generalizations; in particular, if all of the trisectors are intersected, one obtains four other equilateral triangles.
  • 1.7K
  • 17 Nov 2022
Topic Review
Knowledge Graph
The Google Knowledge Graph is a knowledge base used by Google and its services to enhance its search engine's results with information gathered from a variety of sources. The information is presented to users in an infobox next to the search results. Knowledge Graph infoboxes were added to Google's search engine in May 2012, starting in the United States, with international expansion by the end of the year. The information covered by Google's Knowledge Graph grew quickly after launch, tripling its size within seven months (covering 570 million entities and 18 billion facts) and answering "roughly one-third" of the 100 billion monthly searches Google processed in May 2016. It has been criticized for providing answers without source attribution or citation. Information from the Knowledge Graph is presented as a box, which Google has referred to as the "knowledge panel", to the right (top on mobile) of search results. According to Google, this information is retrieved from many sources, including the CIA World Factbook, Wikidata, and Wikipedia. In October 2016, Google announced that the Knowledge Graph held over 70 billion facts; by May 2020, this had grown to 500 billion facts on 5 billion entities. There is no official documentation of how the Knowledge Graph is implemented. It is used to answer direct spoken questions in Google Assistant and Google Home voice queries.
  • 1.6K
  • 02 Dec 2022
Topic Review
Technology Tree
In strategy games, a technology, tech, or research tree is a hierarchical visual representation of the possible sequences of upgrades a player can take (most often through the act of research). Because these trees are technically directed and acyclic, they can more accurately be described as a technology directed acyclic graph. The diagram is tree-shaped in the sense that it branches between each 'level', allowing the player to choose one sequence or another. Each level is called a tier and is often used to describe the technological strength of a player. Typically, at the beginning of a session of a strategy game, a player will start at tier 1, and will only have a few options for technologies to research. Each technology that a player researches will open up one or more new options, but may or may not, depending on the computer game, close off the paths to other options. The tech tree is the representation of all possible paths of research a player can take, up to the culmination of said sequence. A player who is engaged in research activities is said to be "teching up", "going up the tech tree", or "moving up the tech tree". Analysis of a tech tree can lead players to memorize and use specific build orders.
  • 1.6K
  • 26 Oct 2022
Topic Review
Trinitrotoluene Underwater Explosion
The development of computational techniques and computer hardware has an impact the analysis of short-term (fast-changing) processes, such as the impact of a non-contact underwater explosion pressure waves. A theory of underwater explosions, gas bubble formation and pressure waves are presented. The course of the pressure wave in time, and its propagation in the acoustic medium are presented. Entry presents empirical descriptions of non-contact pressure explosion waves. 
  • 1.6K
  • 28 Oct 2020
  • Page
  • of
  • 47
ScholarVision Creations