You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Latin Letters Used in Mathematics
Many letters of the Latin alphabet, both capital and small, are used in mathematics, science, and engineering to denote by convention specific or abstracted constants, variables of a certain type, units, multipliers, or physical entities. Certain letters, when combined with special formatting, take on special meaning. Below is an alphabetical list of the letters of the alphabet with some of their uses. The field in which the convention applies is mathematics unless otherwise noted.
  • 1.9K
  • 15 Nov 2022
Topic Review
Multimodal Affective Brain–Computer Interfaces
Multimodal affective brain-computer interfaces(aBCI) use techniques from psychological theories and methods (concepts and protocols), neuroscience (brain function and signal processing) and computer science (machine learning and human-computer interaction) to induce, measure and detect emotional states and apply the resulting information to improve interaction with machines (Mühl, C.; et al.).We assume that multimodal emotion recognition based on EEG should integrate not only EEG signals, an objective method of emotion measurement, but also a variety of peripheral physiological signals or behaviors. Compared to single patterns, multimodal emotion processing can achieve more reliable results by extracting additional information; consequently, it has attracted increasing attention. Li at el. (Li, Y.; et al.) proposed that in addition to combining different input signals, emotion recognition should include a variety of heterogeneous sensory stimuli (such as audio-visual stimulation) to induce emotions. Many studies (Huang, H.; et al.; Wang, F.; et al.) have shown that integrating heterogeneous sensory stimuli can enhance brain patterns and further improve brain–computer interface performance.
  • 1.9K
  • 01 Mar 2021
Topic Review
Deep Packet Inspection
Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used to baseline application behavior, analyze network usage, troubleshoot network performance, ensure that data is in the correct format, check for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these (the IP header) for normal operation, but use of the second header (such as TCP or UDP) is normally considered to be shallow packet inspection (usually called stateful packet inspection) despite this definition. There are multiple ways to acquire packets for deep packet inspection. Using port mirroring (sometimes called Span Port) is a very common way, as well physically inserting a network tap which duplicates and sends the data stream to an analyzer tool for inspection. Deep Packet Inspection (and filtering) enables advanced network management, user service, and security functions as well as internet data mining, eavesdropping, and internet censorship. Although DPI has been used for Internet management for many years, some advocates of net neutrality fear that the technique may be used anticompetitively or to reduce the openness of the Internet. DPI is used in a wide range of applications, at the so-called "enterprise" level (corporations and larger institutions), in telecommunications service providers, and in governments.
  • 1.9K
  • 09 Nov 2022
Topic Review
Cooking Mama
Cooking Mama (クッキング ママ, Kukkingu Mama) is a cookery simulation-styled minigame compilation video game for the Nintendo Wii, Nintendo DS, and iOS platforms, developed by Office Create and published by Taito, Majesco Entertainment, and 505 Games. It was awarded IGN's "Best Of E3" award for 2006. It was followed by a sequel for the DS, Cooking Mama 2: Dinner with Friends. Two games have been made for the Wii: Cooking Mama and Cooking Mama.
  • 1.9K
  • 19 Oct 2022
Topic Review
Fault-tolerant Computer System
Fault-tolerant computer systems are systems designed around the concepts of fault tolerance. In essence, they must be able to continue working to a level of satisfaction in the presence of errors or breakdowns. Fault tolerance is not just a property of individual machines; it may also characterise the rules by which they interact. For example, the Transmission Control Protocol (TCP) is designed to allow reliable two-way communication in a packet-switched network, even in the presence of communications links which are imperfect or overloaded. It does this by requiring the endpoints of the communication to expect packet loss, duplication, reordering and corruption, so that these conditions do not damage data integrity, and only reduce throughput by a proportional amount. Recovery from errors in fault-tolerant systems can be characterised as either 'roll-forward' or 'roll-back'. When the system detects that it has made an error, roll-forward recovery takes the system state at that time and corrects it, to be able to move forward. Roll-back recovery reverts the system state back to some earlier, correct version, for example using checkpointing, and moves forward from there. Roll-back recovery requires that the operations between the checkpoint and the detected erroneous state can be made idempotent. Some systems make use of both roll-forward and roll-back recovery for different errors or different parts of one error.
  • 1.9K
  • 09 Nov 2022
Topic Review
ArchiCAD
ARCHICAD is an architectural BIM CAD software for Macintosh and Windows developed by the Hungarian company Graphisoft. ARCHICAD offers computer aided solutions for handling all common aspects of aesthetics and engineering during the whole design process of the built environment — buildings, interiors, urban areas, etc. Development of ARCHICAD started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, ARCHICAD became regarded by some as the first implementation of BIM. ARCHICAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model. Today, it has over 120,000 users.
  • 1.9K
  • 11 Nov 2022
Topic Review
All-points Bulletin
An all-points bulletin (APB) is an electronic information broadcast sent from one sender to a group of recipients, to rapidly communicate an important message. The technology used to send this broadcast has varied throughout time, and includes Teletype, Radio, Computerised Bulletin Board Systems (CBBS), and Internet. The earliest known record of the all-points bulletin is when used by American police, which dates the term to 1947. Although, used in the field of policing at the time, the APB has had usage in fields such as politics, technology and science research. However, since the 21st Century, due to advances in technology, all-points bulletins have become significantly less common and are now only primarily used by police departments in countries such as America, Canada, Australia and the United Kingdom.
  • 1.9K
  • 17 Nov 2022
Topic Review
FAO Country Profiles
The FAO Country Profiles are a multilingual web portal which repackages the Food and Agriculture Organization of the United Nations (FAO) information archive on its global activities in agriculture and food security in a single area and catalogues it exclusively by country and thematic areas. The organization aims to offer decision-makers, researchers and project formulators around the world a fast and reliable way to access country-specific information on national food security situations without the need to search individual databases and systems. It aids FAO's database by providing a simple interface containing interactive maps and charts.
  • 1.9K
  • 09 Nov 2022
Topic Review
Windows 10 Version History (Version 1703)
Windows 10 Creators Update (also known as version 1703 and codenamed "Redstone 2") is the third major update to Windows 10 and the second in a series of updates under the Redstone codenames. It carries the build number 10.0.15063.
  • 1.8K
  • 28 Nov 2022
Topic Review
IBM Hexadecimal Floating Point
IBM System/360 computers, and subsequent machines based on that architecture (mainframes), support a hexadecimal floating-point format (HFP). In comparison to IEEE 754 floating-point, the IBM floating-point format has a longer significand, and a shorter exponent. All IBM floating-point formats have 7 bits of exponent with a bias of 64. The normalized range of representable numbers is from 16−65 to 1663 (approx. 5.39761 × 10−79 to 7.237005 × 1075). The number is represented as the following formula: (−1)sign × 0.significand × 16exponent−64.
  • 1.8K
  • 09 Oct 2022
Topic Review
Trinitrotoluene Underwater Explosion
The development of computational techniques and computer hardware has an impact the analysis of short-term (fast-changing) processes, such as the impact of a non-contact underwater explosion pressure waves. A theory of underwater explosions, gas bubble formation and pressure waves are presented. The course of the pressure wave in time, and its propagation in the acoustic medium are presented. Entry presents empirical descriptions of non-contact pressure explosion waves. 
  • 1.8K
  • 28 Oct 2020
Topic Review
Public Interest Registry
Public Interest Registry is a Reston, Virginia-based not-for-profit created by the Internet Society in 2002 to manage the .ORG top-level domain. It took over operation of .ORG in January 2003 and launched the .NGO and .ONG top-level domains in March 2015. In November 2019, it was announced the Public Interest Registry would be sold by the Internet Society to private equity investment firm Ethos Capital for 1.135 billion USD, but in April 2020, ICANN decided to reject the sale.
  • 1.8K
  • 05 Dec 2022
Topic Review
Video Toaster
The NewTek Video Toaster is a combination of hardware and software for the editing and production of NTSC standard-definition video. The plug-in expansion card initially worked with the Amiga 2000 computer and provides a number of BNC connectors on the exposed rear edge that provide connectivity to common analog video sources like VHS VCRs. The related software tools support video switching, chroma keying, character generation, animation, and image manipulation. Together, the hardware and software provided, for a few thousand U.S. dollars, a video editing suite that rivaled the output of contemporary (i.e. early 1990s) professional systems costing ten times as much. It allowed small studios to produce high-quality material and resulted in a cottage industry for video production not unlike the success of the Macintosh in the desktop publishing (DTP) market only a few years earlier. The Video Toaster won the Emmy Award for Technical Achievement in 1993. Other parts of the original software package were spun off as stand-alone products, notably LightWave 3D, and achieved success on their own. As the Amiga platform lost market share and Commodore International went bankrupt in 1994 as a result of declining sales, the Video Toaster was moved to the Microsoft Windows platform where it is still available. The company also produces what is essentially a portable pre-packaged version of the Video Toaster along with all the computer hardware needed, as the TriCaster. These became all-digital units in 2014, ending production of the analog Video Toaster line.
  • 1.8K
  • 11 Oct 2022
Topic Review
Comparison of Mail Servers
This is a comparison of mail servers: mail transfer agents, mail delivery agents, and other computer software that provide e-mail services. Unix based mail servers are built using a number of components because a Unix style environment is, by default, a toolbox operating system. A stock Unix-like server already has internal mail, more traditional ones also come with a full MTA already part of the standard installation. To allow the server to send external emails, an MTA such as Sendmail, Postfix, or Exim is required. Mail is read either through direct access (shell login) or mailbox protocols like POP and IMAP. Unix based MTA software largely acts as enhancement or replacement of the respective system's "native" MTA. Windows servers do not natively implement email. Windows based MTAs therefore have to cover the whole set of email related functionality.
  • 1.8K
  • 11 Nov 2022
Topic Review
Graphics Environment Manager
GEM (for Graphics Environment Manager) was an operating environment created by Digital Research (DRI) for use with the DOS operating system on Intel 8088 and Motorola 68000 microprocessors. GEM is known primarily as the graphical user interface (GUI) for the Atari ST series of computers, and was also supplied with a series of IBM PC-compatible computers from Amstrad. It also was available for standard IBM PC, at the time when the 6 MHz IBM PC AT (and the very concept of a GUI) was brand new. It was the core for a small number of DOS programs, the most notable being Ventura Publisher. It was ported to a number of other computers that previously lacked graphical interfaces, but never gained popularity on those platforms. DRI also produced X/GEM for their FlexOS real-time operating system with adaptations for OS/2 Presentation Manager and the X Window System under preparation as well.
  • 1.8K
  • 20 Oct 2022
Topic Review
Intel Active Management Technology
Intel Active Management Technology (AMT) is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a microprocessor subsystem not exposed to the user, in order to monitor, maintain, update, upgrade and repair them. Out-of-band (OOB) or hardware-based management is different from software-based (or in-band) management and software management agents. Hardware-based management works at a different level from software applications, and uses a communication channel (through the TCP/IP stack) that is different from software-based communication (which is through the software stack in the operating system). Hardware-based management does not depend on the presence of an OS or locally installed management agent. Hardware-based management has been available on Intel/AMD based computers in the past, but it has largely been limited to auto-configuration using DHCP or BOOTP for dynamic IP address allocation and diskless workstations, as well as wake-on-LAN (WOL) for remotely powering on systems. AMT is not intended to be used by itself; it is intended to be used with a software management application. It gives a management application (and thus, the system administrator who uses it) access to the PC down the wire, in order to remotely do tasks that are difficult or sometimes impossible when working on a PC that does not have remote functionalities built into it. AMT is designed into a service processor located on the motherboard, and uses TLS-secured communication and strong encryption to provide additional security. AMT is built into PCs with Intel vPro technology and is based on the Intel Management Engine (ME). AMT has moved towards increasing support for DMTF Desktop and mobile Architecture for System Hardware (DASH) standards and AMT Release 5.1 and later releases are an implementation of DASH version 1.0/1.1 standards for out-of-band management. AMT provides similar functionality to IPMI, although AMT is designed for client computing systems as compared with the typically server-based IPMI. Currently, AMT is available in desktops, servers, ultrabooks, tablets, and laptops with Intel Core vPro processor family, including Intel Core i5, Core i7, Core i9 and Intel Xeon E3-1000, Xeon E, Xeon W-1000 product family. Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017. Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. Some manufacturers, like Purism and System76 are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).
  • 1.8K
  • 31 Oct 2022
Topic Review
Catholic Encyclopedia
File:Catholic Encyclopedia, volume 1.djvu The Catholic Encyclopedia: An International Work of Reference on the Constitution, Doctrine, Discipline, and History of the Catholic Church, also referred to as the Old Catholic Encyclopedia and the Original Catholic Encyclopedia, is an English-language encyclopedia published in the United States and designed to serve the Roman Catholic Church. The first volume appeared in March 1907 and the last three volumes appeared in 1912, followed by a master index volume in 1914 and later supplementary volumes. It was designed "to give its readers full and authoritative information on the entire cycle of Catholic interests, action and doctrine". The Catholic Encyclopedia was published by the Robert Appleton Company (RAC), a publishing company incorporated at New York in February 1905 for the express purpose of publishing the encyclopedia. The five members of the encyclopedia's Editorial Board also served as the directors of the company. In 1912 the company's name was changed to The Encyclopedia Press. Publication of the encyclopedia's volumes was the sole business conducted by the company during the project's lifetime.
  • 1.8K
  • 28 Nov 2022
Topic Review
Social Engineering (Security)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests." An example of social engineering is the use of the "forgot password" function on most websites which require login. An improperly-secured password-recovery system can be used to grant a malicious attacker full access to a user's account, while the original user will lose access to the account.
  • 1.8K
  • 08 Nov 2022
Topic Review
Persona Q: Shadow of the Labyrinth
Persona Q: Shadow of the Labyrinth is a role-playing video game developed by Atlus for the Nintendo 3DS . It is part of the Persona series, itself part of the larger Megami Tensei franchise. It was published across all territories in 2014: released in June in Japan, November in North America and Europe, and December in Australia. Atlus published the game in Japan and North America, while NIS America published it in the PAL region. The story of Persona Q is a crossover between Persona 3 and Persona 4, whose characters are drawn from their respective time periods by an unknown force and sent into a replica of Persona 4's Yasogami High School in another world. Meeting with Zen and Rei, two people whose memories were taken, the groups must unite and explore four labyrinths in the school to recover treasures hidden within. These treasures can restore Zen and Rei's memories which might help them find a way to escape. The gameplay fuses elements of the Persona and Etrian Odyssey series, and focuses on first-person dungeon crawling through labyrinths and combat using the characters' "Persona" abilities against hostiles known as Shadows. Development on the game began after Atlus's success with collaborating with an external developer on the 2012 fighting game Persona 4 Arena. It was based on the wish to create a collaborative spin-off with the Etrian Odyssey development team and fan demands for a Persona game on the 3DS. The Persona Q development team was made up of staff from both Etrian Odyssey IV and the main Persona series. Series character designer Shigenori Soejima created the cast's new deformed "chibi" appearances, while the music was composed by Atsushi Kitajoh and Toshiki Konishi with supervision by series composer Shoji Meguro. First announced in 2013 alongside the console port of Persona 4 Arena Ultimax, Persona 4 and Persona 5, it was the first Persona game to be developed for a Nintendo platform. It released to strong sales and positive reviews from critics, with several enjoying the game's comedic writing, presentation, and blend between Persona and Etrian Odyssey's gameplay styles. A sequel, Persona Q2, was released for the 3DS in Japan in November 2018 and worldwide in June 2019.
  • 1.8K
  • 24 Oct 2022
Topic Review
Argument Technology
Argument technology is a sub-field of artificial intelligence that focuses on applying computational techniques to the creation, identification, analysis, navigation, evaluation and visualisation of arguments and debates. In the 1980s and 1990s, philosophical theories of arguments in general, and argumentation theory in particular, were leveraged to handle key computational challenges, such as modeling non-monotonic and defeasible reasoning and designing robust coordination protocols for multi-agent systems. At the same time, mechanisms for computing semantics of Argumentation frameworks were introduced as a way of providing a calculus of opposition for computing what it is reasonable to believe in the context of conflicting arguments. With these foundations in place, the area was kick-started by a workshop held in the Scottish Highlands in 2000, the result of which was a book coauthored by philosophers of argument, rhetoricians, legal scholars and AI researchers. Since then, the area has been supported by various dedicated events such as the International Workshop on Computational Models of Natural Argument (CMNA) which has run annually since 2001; the International Workshop on Argument in Multi Agent Systems (ArgMAS) annually since 2004; the Workshop on Argument Mining, annually since 2014, and the Conference on Computational Models of Argument (COMMA), biennially since 2006. Since 2010, the field has also had its own journal, Argument & Computation, which was published by Taylor & Francis until 2016 and since then by IOS Press. One of the challenges that argument technology faced was a lack of standardisation in the representation and underlying conception of argument in machine readable terms. Many different software tools for manual argument analysis, in particular, developed idiosyncratic and ad hoc ways of representing arguments which reflected differing underlying ways of conceiving of argumentative structure. This lack of standardisation also meant that there was no interchange between tools or between research projects, and little re-use of data resources that were often expensive to create. To tackle this problem, the Argument Interchange Format set out to establish a common standard that captured the minimal common features of argumentation which could then be extended in different settings. Since about 2018, argument technology has been growing rapidly, with, for example, IBM's Grand Challenge, Project Debater, results for which were published in Nature in March 2021; German research funder, DFG's nationwide research programme on Robust Argumentation Machines, RATIO, begun in 2019; and UK nationwide deployment of The Evidence Toolkit by the BBC in 2019. A 2021 video narrated by Stephen Fry provides a summary of the societal motivations for work in argument technology. Argument technology has applications in a variety of domains, including education, healthcare, policy making, political science, intelligence analysis and risk management and has a variety of sub-fields, methodologies and technologies.
  • 1.8K
  • 08 Oct 2022
  • Page
  • of
  • 47
Academic Video Service