Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
IBM POWER Instruction Set Architecture
The IBM POWER ISA is a reduced instruction set computer (RISC) instruction set architecture (ISA) developed by IBM. The name is an acronym for Performance Optimization With Enhanced RISC. The ISA is used as base for high end microprocessors from IBM during the 1990s and were used in many of IBM's servers, minicomputers, workstations, and supercomputers. These processors are called POWER1 (RIOS-1, RIOS.9, RSC, RAD6000) and POWER2 (POWER2, POWER2+ and P2SC). The ISA evolved into the PowerPC instruction set architecture and was deprecated in 1998 when IBM introduced the POWER3 processor that was mainly a 32/64-bit PowerPC processor but included the POWER ISA for backwards compatibility. The original POWER ISA was then abandoned. PowerPC evolved into the third Power ISA in 2006. IBM continues to develop PowerPC microprocessor cores for use in their application-specific integrated circuit (ASIC) offerings. Many high volume applications embed PowerPC cores.
1.5K
19 Oct 2022
Topic Review
Social Security Number
In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as 42 U.S.C. § 405(c)(2). The number is issued to an individual by the Social Security Administration, an independent agency of the United States government. Although the original purpose for the number was for the Social Security Administration to track individuals, the Social Security number has become a de facto national identification number for taxation and other purposes. A Social Security number may be obtained by applying on Form SS-5, Application for a Social Security Number Card.
1.5K
25 Oct 2022
Topic Review
Kangxi Radical
The 214 Kangxi radicals (Chinese: 康熙部首; pinyin: Kāngxī bùshǒu), also known as the Zihui radicals, form a system of radicals (部首) of Chinese characters. The radicals are numbered in stroke count order. They are the most popular system of radicals for dictionaries that order Traditional Chinese characters (hanzi, hanja, kanji, chữ hán) by radical and stroke count. They are officially part of the Unicode encoding system for CJKV characters, in their standard order, under the coding block "Kangxi radicals", while their graphic variants are contained in the "CJK Radicals Supplement". Thus, a reference to "radical 61", for example, without additional context, refers to the 61st radical of the Kangxi Dictionary, 心; xīn "heart". Originally introduced in the 1615 Zihui (字彙), they are more commonly named in relation to the Kangxi Dictionary of 1716 (Kāngxī 康熙 being the era name for 1662–1723). The 1915 encyclopedic word dictionary Ciyuan (辭源) also uses this system. In modern times, many dictionaries that list Traditional Chinese head characters continue to use this system. For example, the Wang Li Character Dictionary of Ancient Chinese (王力古漢語字典, 2000) adopted the Kangxi radicals system. The system of 214 Kangxi radicals is based on the older system of 540 radicals used in the Han-era Shuowen Jiezi. Since 2009, the PRC government has promoted a 201-radical system (Table of Han Character Radicals, 汉字部首表) as a national standard for Simplified Chinese (see list of Xinhua Zidian radicals).
1.5K
22 Nov 2022
Topic Review
BBM
BBM, also known by its full name BlackBerry Messenger, was a proprietary mobile instant messenger and videotelephony application included on BlackBerry devices that allows messaging and voice calls between BlackBerry OS, BlackBerry 10, iOS, Android, and Windows Mobile users. The consumer edition for iOS and Android, BBM Consumer, was developed by Indonesian company Emtek under licence from BlackBerry Limited (formerly known as Research In Motion). The consumer edition for BlackBerry OS and BlackBerry 10, as well as the paid enterprise edition, called BBM Enterprise (BBMe, formerly known as BBM Protected), were developed fully by BlackBerry Limited and continue to function. BBM Consumer for Android and iOS was shut down on 31 May 2019, however the paid enterprise version of the software, BBMe, is still supported on these platforms. Messages sent via BBM were sent over the Internet and used the BlackBerry PIN system. In the past, many service providers allowed sign-in to BBM using a dedicated BlackBerry data plan. Exchanging messages was possible to a single person or via dedicated discussion or chat groups, which allowed multiple BlackBerry devices to communicate in a single session. In addition to offering text-based instant messages, BBM also allowed users to send pictures, voicenotes (audio recordings), files (up to 16 MB), share real time location on a map, stickers and a wide selection of emojis. Communication was possible only among BlackBerry devices, until late 2013 when BBM was released on iOS and Android systems. Over 300 million Stickers were shared. Daily, approximately 150,000 BBM Voice Calls were placed. There were more than 190 million BBM users worldwide as of 2015, and BlackBerry infrastructure handled 30 petabytes of data traffic each month by early 2013. BBM was the original "mobile-first" messaging service, and was popular for a while before it started to lose out to rivals. As of April 2016, Indonesia was the only country where BBM was the most popular messaging app – installed on 87.5% of Android devices in the country.
1.5K
24 Nov 2022
Topic Review
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing. A 2 TBps attack was reported in mid-August 2020 directed towards critical infrastructure, such as finance, amidst the COVID-19 pandemic. It is estimated that these attacks will double, reaching over 15 million, in the next 2 years. A number of mitigation schemes have been designed and developed since its inception but the increasing complexity demands advanced solutions based on emerging technologies. Blockchain has emerged as a promising and viable technology for DDoS mitigation. The inherent and fundamental characteristics of blockchain such as decentralization, internal and external trustless attitude, immutability, integrity, anonymity and verifiability have proven to be strong candidates, in tackling this deadly cyber threat. This survey discusses different approaches for DDoS mitigation using blockchain in varied domains to date. The paper aims at providing a comprehensive review, highlighting all necessary details, strengths, challenges and limitations of different approaches. It is intended to serve as a single platform to understand the mechanics of current approaches to enhance research and development in the DDoS mitigation domain.
1.4K
07 Feb 2021
Topic Review
Caduceus as a Symbol of Medicine
The caduceus is the traditional symbol of Hermes and features two snakes winding around an often winged staff. It is often used as a symbol of medicine, especially in the United States, despite its ancient and consistent associations with trade, liars, thieves, eloquence, negotiation, alchemy, and wisdom. The modern use of the caduceus as a symbol of medicine became established in the United States in the late 19th and early 20th century as a result of well-documented mistakes, misunderstandings of symbology and classical culture. The correct symbol for medicine is the Rod of Asclepius, which has only one snake and no wings.
1.4K
02 Nov 2022
Topic Review
Effect of Surjection on Inheritance
Consider a biological evolutionary process. We assume some (non-empty) finite set of offspring. Assume each offspring is assigned as coming from a single set of parents in the previous generation. There may be more than one offspring from each of set of parents. This form of mathematical arrangement is called a surjection. We have briefly described the mechanics of genetics; but we have also described much of mathematical anthropology. The finding that a process is a surjection does not just describe the algebra, it also predicts important results. If we have found an inheritance process is a surjection, then each of the offspring is unique, but all of the acts of parental pairs must occur through identical (including isomorphic) means of reproduction; in fact here they require mathematical groups. We demonstrate from published surveys that all offspring are unique. Mathematical groups occur in both applications, determining the choices behind parental actions. The surjection requirements are met in genetics because the mathematics are determined by the mathematical groups determined by quantum mechanics. In culture theory, similar (and in some cases, isomorphic) groups occur. Quantum mechanics is usually discussed for very small objects with incredibly short process intervals. Here, the intervals of reproduction are observable within normal human perception, and for human cultural systems require decades of time for one generation system to be replaced by another. In genetics, counting of the number of offspring from each pair of “parents” is the actual number of offspring surviving from each pair to reproduce. Each human culture has its own means of assigning offspring to parental pairs, which may include their surviving genetic offspring, but also may use culturally designated devices such as adoption. Since surjection also requires that distributions might be forecasted using the Stirling Number of the Second Kind, that result allows culture theory to predict the numbers of offspring per assigned couple, and the percentage of adults engaging in that reproduction.
1.4K
23 Dec 2020
Topic Review
Spacewalk
Spacewalk is open-source systems management software for system provisioning, patching and configuration licensed under the GNU GPLv2. The project was discontinued on 31 May 2020 with 2.10 being the last official release. SUSE forked the spacewalk code base in 2018 with uyuni-project.
1.4K
15 Nov 2022
Topic Review
Graeco-Latin Square
In combinatorics, a Graeco-Latin square or Euler square or pair of orthogonal Latin squares of order n over two sets S and T, each consisting of n symbols, is an n×n arrangement of cells, each cell containing an ordered pair (s,t), where s is in S and t is in T, such that every row and every column contains each element of S and each element of T exactly once, and that no two cells contain the same ordered pair. The arrangement of the s-coordinates by themselves (which may be thought of as Latin characters) and of the t-coordinates (the Greek characters) each forms a Latin square. A Graeco-Latin square can therefore be decomposed into two "orthogonal" Latin squares. Orthogonality here means that every pair (s, t) from the Cartesian product S×T occurs exactly once.
1.4K
29 Sep 2022
Topic Review
Mode (Computer Interface)
In user interface design, a mode is a distinct setting within a computer program or any physical machine interface, in which the same user input will produce perceived results different to those that it would in other settings. The best-known modal interface components are probably the Caps lock and Insert keys on the standard computer keyboard, both of which put the user's typing into a different mode after being pressed, then return it to the regular mode after being re-pressed. An interface that uses no modes is known as a modeless interface. Modeless interfaces avoid mode errors by making it impossible for the user to commit them.
1.4K
16 Nov 2022
Topic Review
ArchiCAD
ARCHICAD is an architectural BIM CAD software for Macintosh and Windows developed by the Hungarian company Graphisoft. ARCHICAD offers computer aided solutions for handling all common aspects of aesthetics and engineering during the whole design process of the built environment — buildings, interiors, urban areas, etc. Development of ARCHICAD started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, ARCHICAD became regarded by some as the first implementation of BIM. ARCHICAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model. Today, it has over 120,000 users.
1.4K
11 Nov 2022
Topic Review
Kerberos (Protocol)
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos uses UDP port 88 by default. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades.
1.4K
25 Oct 2022
Topic Review
Video Toaster
The NewTek Video Toaster is a combination of hardware and software for the editing and production of NTSC standard-definition video. The plug-in expansion card initially worked with the Amiga 2000 computer and provides a number of BNC connectors on the exposed rear edge that provide connectivity to common analog video sources like VHS VCRs. The related software tools support video switching, chroma keying, character generation, animation, and image manipulation. Together, the hardware and software provided, for a few thousand U.S. dollars, a video editing suite that rivaled the output of contemporary (i.e. early 1990s) professional systems costing ten times as much. It allowed small studios to produce high-quality material and resulted in a cottage industry for video production not unlike the success of the Macintosh in the desktop publishing (DTP) market only a few years earlier. The Video Toaster won the Emmy Award for Technical Achievement in 1993. Other parts of the original software package were spun off as stand-alone products, notably LightWave 3D, and achieved success on their own. As the Amiga platform lost market share and Commodore International went bankrupt in 1994 as a result of declining sales, the Video Toaster was moved to the Microsoft Windows platform where it is still available. The company also produces what is essentially a portable pre-packaged version of the Video Toaster along with all the computer hardware needed, as the TriCaster. These became all-digital units in 2014, ending production of the analog Video Toaster line.
1.4K
11 Oct 2022
Topic Review
Blockchain Technology and Its Components
The Internet of Things (IoT) is a recent technology that uses smart connected systems to create a global network of physical devices that exchange and communicate data with each other. Blockchain is essentially a system for recording data that makes it much more difficult to change or hack. Blockchain uses a distributed networking system of machines that replicate and create a chain of data. This chain of data can be considered a ledger, with each of these becoming a block. This chain of data is turned into a block which is linked to the previous block creating a chain of blocks, hence the name blockchain.
1.4K
23 Jun 2022
Topic Review
Big Data
Big data has become a very frequent research topic, due to the increase in data availability. Here we make the linkage between the use of big data and Econophysics, a research field which uses a large amount of data and deals with complex systems.
1.4K
25 Dec 2021
Topic Review
Fragment Identifier
In computer hypertext, a fragment identifier is a string of characters that refers to a resource that is subordinate to another, primary resource. The primary resource is identified by a Uniform Resource Identifier (URI), and the fragment identifier points to the subordinate resource. The fragment identifier introduced by a hash mark # is the optional last part of a URL for a document. It is typically used to identify a portion of that document. The generic syntax is specified in RFC 3986. The hash-mark separator in URIs is not part of the fragment identifier.
1.4K
30 Nov 2022
Topic Review
Speakwrite
Newspeak is the language of Oceania, a fictional totalitarian state and the setting of the dystopian novel Nineteen Eighty-Four (1949), by George Orwell. To meet the ideological requirements of English Socialism (Ingsoc) in Oceania, the ruling Party created Newspeak, a controlled language of restricted grammar and limited vocabulary, meant to limit the freedom of thought—personal identity, self-expression, free will—that threatens the ideology of the régime of Big Brother and the Party, who have criminalized such concepts into thoughtcrime, as contradictions of Ingsoc orthodoxy. In "The Principles of Newspeak", the appendix to the novel, George Orwell explains that Newspeak usage follows most of the English grammar, yet is a language characterised by a continually diminishing vocabulary; complete thoughts reduced to simple terms of simplistic meaning. Linguistically, the contractions of Newspeak—Ingsoc (English Socialism), Minitrue (Ministry of Truth), etc.—derive from the syllabic abbreviations of Russian, which identify the government and social institutions of the Soviet Union, such as politburo (Politburo of the Central Committee of the Communist Party of the Soviet Union), Comintern (Communist International), kolkhoz (collective farm), and Komsomol (Young Communists' League). The long-term political purpose of the new language is for every member of the Party and society, except the Proles—the working-class of Oceania—to exclusively communicate in Newspeak, by A.D. 2050; during that 66-year transition, the usage of Oldspeak (Standard English) shall remain interspersed among Newspeak conversations. Newspeak is also a constructed language, of planned phonology, grammar, and vocabulary, like Basic English, which Orwell promoted (1942–44) during the Second World War (1939–45), and later rejected in the essay "Politics and the English Language" (1946), wherein he criticizes the bad usage of English in his day: dying metaphors, pretentious diction, and high-flown rhetoric, which produce the meaningless words of doublespeak, the product of unclear reasoning. Orwell's conclusion thematically reiterates linguistic decline: "I said earlier that the decadence of our language is probably curable. Those who deny this may argue that language merely reflects existing social conditions, and that we cannot influence its development, by any direct tinkering with words or constructions."
1.4K
28 Sep 2022
Topic Review
IBM Hexadecimal Floating Point
IBM System/360 computers, and subsequent machines based on that architecture (mainframes), support a hexadecimal floating-point format (HFP). In comparison to IEEE 754 floating-point, the IBM floating-point format has a longer significand, and a shorter exponent. All IBM floating-point formats have 7 bits of exponent with a bias of 64. The normalized range of representable numbers is from 16−65 to 1663 (approx. 5.39761 × 10−79 to 7.237005 × 1075). The number is represented as the following formula: (−1)sign × 0.significand × 16exponent−64.
1.4K
09 Oct 2022
Topic Review
Bitcoin Cash
Bitcoin Cash is a cryptocurrency that is a fork of Bitcoin. Bitcoin Cash is a spin-off or altcoin that was created in 2017. In November 2018, Bitcoin Cash split further into two cryptocurrencies: Bitcoin Cash and Bitcoin SV.
1.4K
21 Oct 2022
Topic Review
Coverage Path Planning Methods Focusing on Energy Efficient
The coverage path planning (CPP) algorithms aim to cover the total area of interest with minimum overlapping. The goal of the CPP algorithms is to minimize the total covering path and execution time. Significant research has been done in robotics, particularly for multi-unmanned unmanned aerial vehicles (UAVs) cooperation and energy efficiency in CPP problems.
1.4K
10 Feb 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×