Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Nurses' Health Study
The Nurses' Health Study is a series of prospective studies that examine epidemiology and the long-term effects of nutrition, hormones, environment, and nurses' work-life on health and disease development. The studies have been among the largest investigations into risk factors for major chronic diseases ever conducted. The Nurses' Health Studies have led to many insights on health and well-being, including cancer prevention, cardiovascular disease, and type 2 diabetes. They have included clinicians, epidemiologists, and statisticians at the Channing Laboratory (of Brigham and Women's Hospital), Harvard Medical School, Harvard School of Public Health, and several Harvard-affiliated hospitals, including Brigham and Women's Hospital, Dana–Farber Cancer Institute, Children's Hospital Boston, and Beth Israel Deaconess Medical Center.
  • 2.3K
  • 30 Oct 2022
Topic Review
Extreme Learning Machine
In the learning paradigms of artificial neural networks, classical algorithms such as back-propagation aim to approach the theories of biological learning through an iterative adjustment of all the hyper-parameters of the hidden layers for each sequence of data. Therefore, without looking at relearning, in actual problems, the tuning process could take days or months under the use of the available ordinary computers for generalization of the neural network over all of the selected samples. But, the fact that a microprocessor is faster than a brain by about twelve million times, denies that these algorithms are capable of responding to the thought of the human brain which takes less seconds to classify or restore new images or sensations. In 2004, ELM gave birth to new learning rules for artificial neural networks. ELM learning rules remove barriers between human biological thought and artificial neural networks by addressing the fact that: "the parameters of the hidden layer do not need to be adjusted, and the only element responsible for the "universal approximation and generalization are the output weights ". Consequently, ELM has been studied through several applications and extends to a multitude of paradigms such as the ensemble, the hybrid and the deep learning and achieved an excellent reputation. Therefore, The aim of this review will be introducing basic theories of ELM.
  • 2.3K
  • 30 Sep 2021
Topic Review
Ceph
Ceph (pronounced /ˈsɛf/) is an open-source software-defined storage platform that implements object storage on a single distributed computer cluster and provides 3-in-1 interfaces for object-, block- and file-level storage. Ceph aims primarily for completely distributed operation without a single point of failure, scalability to the exabyte level, and to be freely available. Since version 12, Ceph does not rely on other filesystems and can directly manage HDDs and SSDs with its own storage backend BlueStore and can completely self reliantly expose a POSIX filesystem. Ceph replicates data and makes it fault-tolerant, using commodity hardware and Ethernet IP and requiring no specific hardware support. The Ceph’s system offers disaster recovery and data redundancy through techniques such as replication, erasure coding, snapshots and storage cloning. As a result of its design, the system is both self-healing and self-managing, aiming to minimize administration time and other costs. In this way, administrators have a single, consolidated system that avoids silos and collects the storage within a common management framework. Ceph consolidates several storage use cases and improves resource utilization. It also lets an organization deploy servers where needed.
  • 2.3K
  • 14 Oct 2022
Topic Review
Forensic Geology
Forensic geology is the study of evidence relating to minerals, oil, petroleum, and other materials found in the Earth, used to answer questions raised by the legal system. In 1975, Ray Murray and fellow Rutgers University professor John Tedrow published Forensic Geology. The main use of forensic geology as it is applied today is regarding trace evidence. By examining the soil and sediment particules to be able to link a suspect to a particular crime or a particular scene. Other uses in this field of science can include theft, fraud, locating a gravesite etc. It requires the aid of many other disciplines of science such as medicine, biology, geography, engineering and many others. More recently, in 2008, Alastair Ruffell and Jennifer McKinley, both of Queen's University Belfast, published Geoforensics a book that focuses more on the use of geomorphology and geophysics for searches. In 2010, forensic soil scientist Lorna Dawson of the James Hutton Institute co-edited and contributed chapters to the textbook Criminal and Environmental Soil Forensics. In 2012, Elisa Bergslien, at SUNY Buffalo State, published a general textbook on the topic, An Introduction to Forensic Geoscience.
  • 2.3K
  • 16 Nov 2022
Topic Review
ArchiCAD
ARCHICAD is an architectural BIM CAD software for Macintosh and Windows developed by the Hungarian company Graphisoft. ARCHICAD offers computer aided solutions for handling all common aspects of aesthetics and engineering during the whole design process of the built environment — buildings, interiors, urban areas, etc. Development of ARCHICAD started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, ARCHICAD became regarded by some as the first implementation of BIM. ARCHICAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model. Today, it has over 120,000 users.
  • 2.3K
  • 11 Nov 2022
Topic Review
Rosetta Stone
Rosetta Stone Language Learning is proprietary, computer-assisted language learning (CALL) software published by Rosetta Stone Inc, part of the IXL Learning family of products. The software uses images, text, and sound to teach words and grammar by spaced repetition, without translation. Rosetta Stone calls its approach Dynamic Immersion. The software's name and logo allude to the ancient stone slab of the same name on which the Decree of Memphis is inscribed in three writing systems. IXL Learning acquired Rosetta Stone in March 2021.
  • 2.3K
  • 24 Oct 2022
Topic Review
ICANN
The Internet Corporation for Assigned Names and Numbers (ICANN /ˈaɪkæn/ EYE-kan) is an American multistakeholder group and nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation. ICANN performs the actual technical maintenance work of the Central Internet Address pools and DNS root zone registries pursuant to the Internet Assigned Numbers Authority (IANA) function contract. The contract regarding the IANA stewardship functions between ICANN and the National Telecommunications and Information Administration (NTIA) of the United States Department of Commerce ended on October 1, 2016, formally transitioning the functions to the global multistakeholder community. Much of its work has concerned the Internet's global Domain Name System (DNS), including policy development for internationalization of the DNS system, introduction of new generic top-level domains (TLDs), and the operation of root name servers. The numbering facilities ICANN manages include the Internet Protocol address spaces for IPv4 and IPv6, and assignment of address blocks to regional Internet registries. ICANN also maintains registries of Internet Protocol identifiers. ICANN's primary principles of operation have been described as helping preserve the operational stability of the Internet; to promote competition; to achieve broad representation of the global Internet community; and to develop policies appropriate to its mission through bottom-up, consensus-based processes. ICANN's creation was announced publicly on September 17, 1998, and it formally came into being on September 30, 1998, incorporated in the U.S. state of California. Originally headquartered in Marina del Rey in the same building as the University of Southern California's Information Sciences Institute (ISI), its offices are now in the Playa Vista neighborhood of Los Angeles in Facebook's old office.
  • 2.3K
  • 10 Nov 2022
Topic Review
Religion
This is a list of encyclopedias as well as encyclopedic and biographical dictionaries published on the subjects of religion and mythology in any language.
  • 2.3K
  • 13 Oct 2022
Topic Review
Differential Geometry of Curves
Differential geometry of curves is the branch of geometry that deals with smooth curves in the plane and in the Euclidean space by methods of differential and integral calculus. Starting in antiquity, many specific curves have been thoroughly investigated using the synthetic approach. Differential geometry takes another path: curves are represented in a parametrized form, and their geometric properties and various quantities associated with them, such as the curvature and the arc length, are expressed via derivatives and integrals using vector calculus. One of the most important tools used to analyze a curve is the Frenet frame, a moving frame that provides a coordinate system at each point of the curve that is "best adapted" to the curve near that point. The theory of curves is much simpler and narrower in scope than the theory of surfaces and its higher-dimensional generalizations, because a regular curve in a Euclidean space has no intrinsic geometry. Any regular curve may be parametrized by the arc length (the natural parametrization) and from the point of view of a theoretical point particle on the curve that does not know anything about the ambient space, all curves would appear the same. Different space curves are only distinguished by the way in which they bend and twist. Quantitatively, this is measured by the differential-geometric invariants called the curvature and the torsion of a curve. The fundamental theorem of curves asserts that the knowledge of these invariants completely determines the curve.
  • 2.3K
  • 17 Nov 2022
Topic Review
Gâteaux Derivative
In mathematics, the Gâteaux differential or Gâteaux derivative is a generalization of the concept of directional derivative in differential calculus. Named after René Gâteaux, a French mathematician who died young in World War I, it is defined for functions between locally convex topological vector spaces such as Banach spaces. Like the Fréchet derivative on a Banach space, the Gâteaux differential is often used to formalize the functional derivative commonly used in the calculus of variations and physics. Unlike other forms of derivatives, the Gâteaux differential of a function may be nonlinear. However, often the definition of the Gâteaux differential also requires that it be a continuous linear transformation. Some authors, such as (Tikhomirov 2001), draw a further distinction between the Gâteaux differential (which may be nonlinear) and the Gâteaux derivative (which they take to be linear). In most applications, continuous linearity follows from some more primitive condition which is natural to the particular setting, such as imposing complex differentiability in the context of infinite dimensional holomorphy or continuous differentiability in nonlinear analysis.
  • 2.3K
  • 25 Oct 2022
Topic Review
Camp Lazlo
Camp Lazlo (stylized as CAMP LAZLO!) is an American animated television series created by Joe Murray for Cartoon Network. It was produced by Cartoon Network Studios. The show revolves around Lazlo, a spider monkey who attends a Boy Scout-like summer camp with a cast of anthropomorphic animal characters. The series has a style of humor similar to the Nickelodeon series Rocko's Modern Life (which Murray also created and is most known for) SpongeBob SquarePants and The Powerpuff Girls. The series premiered on Cartoon Network on July 8, 2005 at 8:00 p.m. ET/PT with five seasons, 61 episodes, and an hour-long television special. During its run, the series won three Emmy Awards and three Pulcinella Awards, and was also nominated for another Emmy and an Annie Award.
  • 2.3K
  • 07 Nov 2022
Topic Review
Fault-tolerant Computer System
Fault-tolerant computer systems are systems designed around the concepts of fault tolerance. In essence, they must be able to continue working to a level of satisfaction in the presence of errors or breakdowns. Fault tolerance is not just a property of individual machines; it may also characterise the rules by which they interact. For example, the Transmission Control Protocol (TCP) is designed to allow reliable two-way communication in a packet-switched network, even in the presence of communications links which are imperfect or overloaded. It does this by requiring the endpoints of the communication to expect packet loss, duplication, reordering and corruption, so that these conditions do not damage data integrity, and only reduce throughput by a proportional amount. Recovery from errors in fault-tolerant systems can be characterised as either 'roll-forward' or 'roll-back'. When the system detects that it has made an error, roll-forward recovery takes the system state at that time and corrects it, to be able to move forward. Roll-back recovery reverts the system state back to some earlier, correct version, for example using checkpointing, and moves forward from there. Roll-back recovery requires that the operations between the checkpoint and the detected erroneous state can be made idempotent. Some systems make use of both roll-forward and roll-back recovery for different errors or different parts of one error.
  • 2.3K
  • 09 Nov 2022
Topic Review
Domain Hack
A domain hack is a domain name that suggests a word, phrase, or name when concatenating two or more adjacent levels of that domain. For example, "bir.ds" and "examp.le", using the fictitious country-code domains .ds and .le, suggest the words birds and example respectively. In this context, the word hack denotes a clever trick (as in programming), not an exploit or break-in (as in security). Domain hacks offer the ability to produce short domain names. This makes them potentially valuable as redirectors, pastebins, base domains from which to delegate subdomains and URL shortening services.
  • 2.3K
  • 30 Sep 2022
Topic Review
Panjab Digital Library
The Panjab Digital Library is a voluntary organization digitizing and preserving the cultural heritage of Panjab since 2003. With over 45 million digitized pages, it is the biggest resource of digital material on Panjab. There are many historically significant documents stored and made available online. Its scope covers Sikh and Punjabi culture. The library funded by The Nanakshahi Trust was launched online in August 2009. Its base office is located at Chandigarh, India. The library's mission is to locate, digitize, preserve, collect and make accessible the accumulated wisdom of the Panjab region, without distinction as to script, language, religion, nationality, or other physical condition.
  • 2.3K
  • 03 Nov 2022
Topic Review
Spacewalk
Spacewalk is open-source systems management software for system provisioning, patching and configuration licensed under the GNU GPLv2. The project was discontinued on 31 May 2020 with 2.10 being the last official release. SUSE forked the spacewalk code base in 2018 with uyuni-project.
  • 2.3K
  • 15 Nov 2022
Topic Review
Computer Emergency Response Team
A computer emergency response team (CERT) is an expert group that handles computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT).
  • 2.3K
  • 31 Oct 2022
Topic Review
All-points Bulletin
An all-points bulletin (APB) is an electronic information broadcast sent from one sender to a group of recipients, to rapidly communicate an important message. The technology used to send this broadcast has varied throughout time, and includes Teletype, Radio, Computerised Bulletin Board Systems (CBBS), and Internet. The earliest known record of the all-points bulletin is when used by American police, which dates the term to 1947. Although, used in the field of policing at the time, the APB has had usage in fields such as politics, technology and science research. However, since the 21st Century, due to advances in technology, all-points bulletins have become significantly less common and are now only primarily used by police departments in countries such as America, Canada, Australia and the United Kingdom.
  • 2.3K
  • 17 Nov 2022
Topic Review
Fractional Poisson Process
In probability theory, a fractional Poisson process is a stochastic process to model the long-memory dynamics of a stream of counts. The time interval between each pair of consecutive counts follows the non-exponential power-law distribution with parameter [math]\displaystyle{ \nu }[/math], which has physical dimension [math]\displaystyle{ [\nu ]=\sec ^{-\mu } }[/math], where [math]\displaystyle{ 0\lt \mu \leq 1 }[/math]. In other words, fractional Poisson process is non-Markov counting stochastic process that exhibits non-exponential distribution of interarrival times. The fractional Poisson process is a continuous-time process that can be thought of as natural generalization of the well-known Poisson process. Fractional Poisson probability distribution is a new member of discrete probability distributions. The fractional Poisson process, Fractional compound Poisson process and fractional Poisson probability distribution function have been invented, developed and encouraged for applications by Nick Laskin (2003) who coined the terms fractional Poisson process, Fractional compound Poisson process and fractional Poisson probability distribution function.
  • 2.3K
  • 08 Jun 2025
Topic Review
Speakwrite
Newspeak is the language of Oceania, a fictional totalitarian state and the setting of the dystopian novel Nineteen Eighty-Four (1949), by George Orwell. To meet the ideological requirements of English Socialism (Ingsoc) in Oceania, the ruling Party created Newspeak, a controlled language of restricted grammar and limited vocabulary, meant to limit the freedom of thought—personal identity, self-expression, free will—that threatens the ideology of the régime of Big Brother and the Party, who have criminalized such concepts into thoughtcrime, as contradictions of Ingsoc orthodoxy. In "The Principles of Newspeak", the appendix to the novel, George Orwell explains that Newspeak usage follows most of the English grammar, yet is a language characterised by a continually diminishing vocabulary; complete thoughts reduced to simple terms of simplistic meaning. Linguistically, the contractions of Newspeak—Ingsoc (English Socialism), Minitrue (Ministry of Truth), etc.—derive from the syllabic abbreviations of Russian, which identify the government and social institutions of the Soviet Union, such as politburo (Politburo of the Central Committee of the Communist Party of the Soviet Union), Comintern (Communist International), kolkhoz (collective farm), and Komsomol (Young Communists' League). The long-term political purpose of the new language is for every member of the Party and society, except the Proles—the working-class of Oceania—to exclusively communicate in Newspeak, by A.D. 2050; during that 66-year transition, the usage of Oldspeak (Standard English) shall remain interspersed among Newspeak conversations. Newspeak is also a constructed language, of planned phonology, grammar, and vocabulary, like Basic English, which Orwell promoted (1942–44) during the Second World War (1939–45), and later rejected in the essay "Politics and the English Language" (1946), wherein he criticizes the bad usage of English in his day: dying metaphors, pretentious diction, and high-flown rhetoric, which produce the meaningless words of doublespeak, the product of unclear reasoning. Orwell's conclusion thematically reiterates linguistic decline: "I said earlier that the decadence of our language is probably curable. Those who deny this may argue that language merely reflects existing social conditions, and that we cannot influence its development, by any direct tinkering with words or constructions."
  • 2.2K
  • 28 Sep 2022
Topic Review
Technical Support Scam
A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users. Such calls are mostly targeted at Microsoft Windows users, with the caller often claiming to represent a Microsoft technical support department. In English-speaking countries such as the United States , Canada , United Kingdom , Ireland, Australia and New Zealand, such cold call scams have occurred as early as 2008. and primarily originate from call centers in India . The scammer will typically attempt to get the victim to allow remote access to their computer. After remote access is gained, the scammer relies on confidence tricks, typically involving utilities built into Windows and other software, in order to gain the victim's trust to pay for the supposed "support" services. The scammer will often then steal the victim's credit card account information or persuade the victim to log in to their online banking account to receive a promised refund, only to steal more money, claiming that a secure server is connected and that the scammer cannot see the details. Many schemes involve convincing the victim to purchase expensive gift cards and then to divulge the card information to the scammer.
  • 2.2K
  • 21 Nov 2022
  • Page
  • of
  • 48
Academic Video Service