Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
Forscene
Forscene is an integrated internet video platform, video editing software, covering non linear editing and publishing for broadcast, web and mobile. Designed by Forbidden Technologies plc to allow collaborative editing of video, it is capable of video logging, reviewing, publishing and hosting to HD quality. The system is implemented as a mobile app for Android and IOS devices and as a web application with a Java applet as part of its user interface. The latter runs on platforms without application installation, codec installation, or machine configuration and has Web 2.0 features. Forscene won the Royal Television Society's award for Technology in the post-production process in December 2005, and is now used internationally. The underlying compression technology and the user interface are covered by separate patents.
1.5K
19 Oct 2022
Topic Review
Forensic Dentistry
Forensic dentistry or forensic odontology involves handling, examination and evaluation of dental evidence in criminal justice cases. Forensic dentists are involved in assisting investigative agencies to identify recovered human remains in addition to the identification of whole or fragmented bodies. Forensic dentists have also been known to use their investigative techniques to identify burn victims by using the victims previous dental records. Forensic dentists may also be asked to assist in determining age, race, occupation, previous dental history and socioeconomic status of unidentified human beings. The evidence that may be derived from teeth is the age (in children) and identification of the person to whom the teeth belong. This is done using dental records including radiographs, ante-mortem (prior to death) and post-mortem (after death) photographs and DNA. Another type of evidence is that of bite marks, left on either the victim (by the attacker), the perpetrator (from the victim of an attack), or on an object found at the crime scene. Bite mark analysis has been condemned by several scientific bodies, such as the National Academy of Sciences (NAS), the President's Council of Advisors on Science and Technology (PCAST), and the Texas Forensic Science Commission. No scientific studies or evidence substantiate that bite marks can demonstrate sufficient detail for positive identification. There are numerous instances where experts diverge widely in their evaluations of the same bite mark evidence.
1.5K
18 Nov 2022
Topic Review
Fault-tolerant Computer System
Fault-tolerant computer systems are systems designed around the concepts of fault tolerance. In essence, they must be able to continue working to a level of satisfaction in the presence of errors or breakdowns. Fault tolerance is not just a property of individual machines; it may also characterise the rules by which they interact. For example, the Transmission Control Protocol (TCP) is designed to allow reliable two-way communication in a packet-switched network, even in the presence of communications links which are imperfect or overloaded. It does this by requiring the endpoints of the communication to expect packet loss, duplication, reordering and corruption, so that these conditions do not damage data integrity, and only reduce throughput by a proportional amount. Recovery from errors in fault-tolerant systems can be characterised as either 'roll-forward' or 'roll-back'. When the system detects that it has made an error, roll-forward recovery takes the system state at that time and corrects it, to be able to move forward. Roll-back recovery reverts the system state back to some earlier, correct version, for example using checkpointing, and moves forward from there. Roll-back recovery requires that the operations between the checkpoint and the detected erroneous state can be made idempotent. Some systems make use of both roll-forward and roll-back recovery for different errors or different parts of one error.
1.5K
09 Nov 2022
Topic Review
Multimodal Affective Brain–Computer Interfaces
Multimodal affective brain-computer interfaces(aBCI) use techniques from psychological theories and methods (concepts and protocols), neuroscience (brain function and signal processing) and computer science (machine learning and human-computer interaction) to induce, measure and detect emotional states and apply the resulting information to improve interaction with machines (Mühl, C.; et al.).We assume that multimodal emotion recognition based on EEG should integrate not only EEG signals, an objective method of emotion measurement, but also a variety of peripheral physiological signals or behaviors. Compared to single patterns, multimodal emotion processing can achieve more reliable results by extracting additional information; consequently, it has attracted increasing attention. Li at el. (Li, Y.; et al.) proposed that in addition to combining different input signals, emotion recognition should include a variety of heterogeneous sensory stimuli (such as audio-visual stimulation) to induce emotions. Many studies (Huang, H.; et al.; Wang, F.; et al.) have shown that integrating heterogeneous sensory stimuli can enhance brain patterns and further improve brain–computer interface performance.
1.5K
01 Mar 2021
Topic Review
Eclipse
Eclipse is an integrated development environment (IDE) used in computer programming. It contains a base workspace and an extensible plug-in system for customizing the environment. It is the second-most-popular IDE for Java development, and, until 2016, was the most popular. Eclipse is written mostly in Java and its primary use is for developing Java applications, but it may also be used to develop applications in other programming languages via plug-ins, including Ada, ABAP, C, C++, C#, Clojure, COBOL, D, Erlang, Fortran, Groovy, Haskell, JavaScript, Julia, Lasso, Lua, NATURAL, Perl, PHP, Prolog, Python, R, Ruby (including Ruby on Rails framework), Rust, Scala, and Scheme. It can also be used to develop documents with LaTeX (via a TeXlipse plug-in) and packages for the software Mathematica. Development environments include the Eclipse Java development tools (JDT) for Java and Scala, Eclipse CDT for C/C++, and Eclipse PDT for PHP, among others. The initial codebase originated from IBM VisualAge. The Eclipse software development kit (SDK), which includes the Java development tools, is meant for Java developers. Users can extend its abilities by installing plug-ins written for the Eclipse Platform, such as development toolkits for other programming languages, and can write and contribute their own plug-in modules. Since the introduction of the OSGi implementation (Equinox) in version 3 of Eclipse, plug-ins can be plugged-stopped dynamically and are termed (OSGI) bundles. Eclipse software development kit (SDK) is free and open-source software, released under the terms of the Eclipse Public License, although it is incompatible with the GNU General Public License. It was one of the first IDEs to run under GNU Classpath and it runs without problems under IcedTea.
1.5K
08 Oct 2022
Topic Review
Samsung Knox
Samsung Knox is a proprietary security and management framework pre-installed on most Samsung mobile devices. Its primary purpose is to provide organizations with a toolset for managing work devices, such as employee mobile phones or interactive kiosks. Knox provides more granular control over the standard work profile to manage capabilities found only on Samsung devices. Knox's features fall within three categories: data security, device manageability, and VPN capability. Knox also provides web-based services for organizations to manage their devices. Organizations can customize their managed mobile devices by configuring various functions, including pre-loaded applications, settings, boot-up animations, home screens, and lock screens. As of December 2020, organizations can use specific Samsung mobile device cameras as barcode scanners, using Knox services to capture and analyze the data.
1.5K
17 Nov 2022
Topic Review
Binary Adder
An adder, or summer, is a digital circuit that performs addition of numbers. In many computers and other kinds of processors adders are used in the arithmetic logic units (ALUs). They are also used in other parts of the processor, where they are used to calculate addresses, table indices, increment and decrement operators and similar operations. Although adders can be constructed for many number representations, such as binary-coded decimal or excess-3, the most common adders operate on binary numbers. In cases where two's complement or ones' complement is being used to represent negative numbers, it is trivial to modify an adder into an adder–subtractor. Other signed number representations require more logic around the basic adder.
1.5K
30 Nov 2022
Topic Review
Horseshoe
A horseshoe is a fabricated product, normally made of metal, although sometimes made partially or wholly of modern synthetic materials, designed to protect a horse hoof from wear. Shoes are attached on the palmar surface (ground side) of the hooves, usually nailed through the insensitive hoof wall that is anatomically akin to the human toenail, although much larger and thicker. However, there are also cases where shoes are glued. The fitting of horseshoes is a professional occupation, conducted by a farrier, who specializes in the preparation of feet, assessing potential lameness issues, and fitting appropriate shoes, including remedial features where required. In some countries, such as the UK, horseshoeing is legally restricted to people with specific qualifications and experience. In others, such as the United States, where professional licensing is not legally required, professional organizations provide certification programs that publicly identify qualified individuals. Horseshoes are available in a wide variety of materials and styles, developed for different types of horse and for the work they do. The most common materials are steel and aluminium, but specialized shoes may include use of rubber, plastic, magnesium, titanium, or copper. Steel tends to be preferred in sports in which a strong, long-wearing shoe is needed, such as polo, eventing, show jumping, and western riding events. Aluminium shoes are lighter, making them common in horse racing where a lighter shoe is desired, and often facilitate certain types of movement; they are often favored in the discipline of dressage. Some horseshoes have "caulkins", "caulks", or "calks": protrusions at the toe or heels of the shoe, or both, to provide additional traction. When kept as a talisman, a horseshoe is said to bring good luck. A stylized variation of the horseshoe is used for a popular throwing game, horseshoes.
1.5K
28 Oct 2022
Topic Review
Windows 10 Version History (Version 1703)
Windows 10 Creators Update (also known as version 1703 and codenamed "Redstone 2") is the third major update to Windows 10 and the second in a series of updates under the Redstone codenames. It carries the build number 10.0.15063.
1.5K
28 Nov 2022
Topic Review
Byzantine Fault Tolerance
Byzantine fault tolerance (BFT) is the dependability of a fault-tolerant computer system, particularly distributed computing systems, where components may fail and there is imperfect information on whether a component has failed. In a "Byzantine failure", a component such as a server can inconsistently appear both failed and functioning to failure-detection systems, presenting different symptoms to different observers. It is difficult for the other components to declare it failed and shut it out of the network, because they need to first reach a consensus regarding which component has failed in the first place. The term is derived from the Byzantine Generals' Problem, where actors must agree on a concerted strategy to avoid catastrophic system failure, but some of the actors are unreliable. Byzantine fault tolerance has been also referred to with the phrases interactive consistency or source congruency, error avalanche, Byzantine agreement problem, Byzantine generals problem, and Byzantine failure.
1.5K
28 Nov 2022
Topic Review
Brick (Electronics)
The word "brick", when used in reference to consumer electronics, describes an electronic device such as a mobile device, game console, or router that, due to corrupted firmware, a hardware problem, or other damage, can no longer function, and thus is "bricked". The device becomes as technologically useful as a brick, hence the name.
1.5K
19 Oct 2022
Topic Review
Triangle Center
In geometry, a triangle center (or triangle centre) is a point in the plane that is in some sense a center of a triangle akin to the centers of squares and circles, that is, a point that is in the middle of the figure by some measure. For example the centroid, circumcenter, incenter and orthocenter were familiar to the ancient Greeks, and can be obtained by simple constructions. Each of these classical centers has the property that it is invariant (more precisely equivariant) under similarity transformations. In other words, for any triangle and any similarity transformation (such as a rotation, reflection, dilation, or translation), the center of the transformed triangle is the same point as the transformed center of the original triangle. This invariance is the defining property of a triangle center. It rules out other well-known points such as the Brocard points which are not invariant under reflection and so fail to qualify as triangle centers. All centers of an equilateral triangle coincide at its centroid, but they generally differ from each other on scalene triangles. The definitions and properties of thousands of triangle centers have been collected in the Encyclopedia of Triangle Centers.
1.5K
31 Oct 2022
Topic Review
Operating-System-Level Virtualization
Operating-system-level virtualization, also known as containerization, refers to an operating system feature in which the kernel allows the existence of multiple isolated user-space instances. Such instances, called containers, partitions, virtual environments (VEs) or jails (FreeBSD jail or chroot jail), may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside a container can only see the container's contents and devices assigned to the container. On Unix-like operating systems, this feature can be seen as an advanced implementation of the standard chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides resource-management features to limit the impact of one container's activities on other containers. System-level-virtualization is frequently implemented in remote access applications with dynamic cloud access, allowing for simultaneous two-way data streaming over closed networks.
1.5K
06 Dec 2022
Topic Review
History and Implementations of ZFS
The history and implementations of ZFS covers the development of the ZFS file system. ZFS began as part of the Sun Microsystems Solaris operating system in 2001. Large parts of Solaris - including ZFS - were published under an open source license as OpenSolaris for around 5 years from 2005, before being placed under a closed source license when Oracle Corporation acquired Sun in 2009/2010. During 2005 - 2010, the open source version of ZFS was ported to Linux, Mac OS X (continued as MacZFS) and FreeBSD. In 2010, the illumos project forked a recent version of OpenSolaris, to continue its development as an open source project, including ZFS. In 2013 the co-ordination of open source ZFS moved to an umbrella organization, OpenZFS, which allowed any person or organization that wished to use the open source version of ZFS, to collaborate in developing and maintaining a single common version of ZFS. illumos remains very closely involved with OpenZFS. As of 2018, there are two main implementations of ZFS, both quite similar: Oracle's implementation, which is closed source and part of Solaris, and OpenZFS, which is widely used to provide ZFS on many unix-like operating systems.
1.5K
23 Nov 2022
Topic Review
Advanced Machine Learning
This entry provides a comprehensive state-of-the-art investigation of the recent advances in data science in emerging economic applications. The analysis is performed on the novel data science methods in four individual classes of deep learning models, hybrid deep learning models, hybrid machine learning, and ensemble models. Application domains include a broad and diverse range of economics research from the stock market, marketing, and e-commerce to corporate banking and cryptocurrency. Prisma method, a systematic literature review methodology, is used to ensure the quality of the survey. The findings reveal that the trends follow the advancement of hybrid models, which outperform other learning algorithms. It is further expected that the trends will converge toward the evolution of sophisticated hybrid deep learning models.
1.5K
25 Dec 2021
Topic Review
Wannacry
The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated through EternalBlue, an exploit developed by the United States National Security Agency (NSA) for older Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches were imperative to organizations' cyber security but many were not implemented due to ignorance of their importance. Some have claimed a need for 24/7 operation, aversion to risking having formerly working applications breaking because of patch changes, lack of personnel or time to install them, or other reasons. The attack began at 07:44 UTC on 12 May 2017 and was halted a few hours later at 15:03 UTC by the registration of a kill switch discovered by Marcus Hutchins. The kill switch prevented already infected computers from being encrypted or further spreading WannaCry. The attack was estimated to have affected more than 200,000 computers across 150 countries, with total damages ranging from hundreds of millions to billions of United States dollar . Security experts believed from preliminary evaluation of the worm that the attack originated from North Korea or agencies working for the country. In December 2017, the United States and United Kingdom formally asserted that North Korea was behind the attack. A new variant of WannaCry forced Taiwan Semiconductor Manufacturing Company (TSMC) to temporarily shut down several of its chip-fabrication factories in August 2018. The virus spread to 10,000 machines in TSMC's most advanced facilities.
1.5K
23 Oct 2022
Topic Review
Literature
This is a list of encyclopedias as well as encyclopedic and biographical dictionaries published on the subject of literature in any language.
1.5K
28 Apr 2023
Topic Review
Wave Race 64
Wave Race 64 is a racing video game developed by Nintendo EAD and published by Nintendo. It was released for the Nintendo 64 in 1996 and is a follow-up to the 1992 Game Boy title Wave Race. Most of the game involves the player racing on a Jet Ski on a variety of courses while successfully manoeuvring the vehicle around various buoys. A multiplayer mode where two players can compete against each other on a chosen course is also included. The game supports the Controller Pak, which allows players to transfer saved data from one game cartridge to another. Originally referred to as "F-Zero on water", the game was intended to feature high-speed boats with transforming capabilities, but these were ultimately replaced with Jet Skis as producer Shigeru Miyamoto felt that the game would not be differentiated enough from other titles on other systems. Wave Race 64 received acclaim from critics, who praised the game's satisfying controls and dynamic watery environments. The game is credited for helping Nintendo effectively make its paradigmatic leap from the 16-bit 2D graphics of the Super Nintendo Entertainment System to the Nintendo 64's 3D capabilities. It was re-released for the Wii and Wii U's Virtual Console in 2007 and 2016, respectively. A sequel, Wave Race, was released in 2001.
1.5K
13 Oct 2022
Topic Review
Cooking Mama
Cooking Mama (クッキング ママ, Kukkingu Mama) is a cookery simulation-styled minigame compilation video game for the Nintendo Wii, Nintendo DS, and iOS platforms, developed by Office Create and published by Taito, Majesco Entertainment, and 505 Games. It was awarded IGN's "Best Of E3" award for 2006. It was followed by a sequel for the DS, Cooking Mama 2: Dinner with Friends. Two games have been made for the Wii: Cooking Mama and Cooking Mama.
1.5K
19 Oct 2022
Topic Review
Malfatti Circles
In geometry, the Malfatti circles are three circles inside a given triangle such that each circle is tangent to the other two and to two sides of the triangle. They are named after Gian Francesco Malfatti, who made early studies of the problem of constructing these circles in the mistaken belief that they would have the largest possible total area of any three disjoint circles within the triangle. Malfatti's problem has been used to refer both to the problem of constructing the Malfatti circles and to the problem of finding three area-maximizing circles within a triangle. A simple construction of the Malfatti circles was given by (Steiner 1826), and many mathematicians have since studied the problem. Malfatti himself supplied a formula for the radii of the three circles, and they may also be used to define two triangle centers, the Ajima–Malfatti points of a triangle. The problem of maximizing the total area of three circles in a triangle is never solved by the Malfatti circles. Instead, the optimal solution can always be found by a greedy algorithm that finds the largest circle within the given triangle, the largest circle within the three connected subsets of the triangle outside of the first circle, and the largest circle within the five connected subsets of the triangle outside of the first two circles. Although this procedure was first formulated in 1930, its correctness was not proven until 1994.
1.5K
09 Oct 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×