You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Nurses' Health Study
The Nurses' Health Study is a series of prospective studies that examine epidemiology and the long-term effects of nutrition, hormones, environment, and nurses' work-life on health and disease development. The studies have been among the largest investigations into risk factors for major chronic diseases ever conducted. The Nurses' Health Studies have led to many insights on health and well-being, including cancer prevention, cardiovascular disease, and type 2 diabetes. They have included clinicians, epidemiologists, and statisticians at the Channing Laboratory (of Brigham and Women's Hospital), Harvard Medical School, Harvard School of Public Health, and several Harvard-affiliated hospitals, including Brigham and Women's Hospital, Dana–Farber Cancer Institute, Children's Hospital Boston, and Beth Israel Deaconess Medical Center.
  • 2.3K
  • 30 Oct 2022
Topic Review
Dream Chronicles
Dream Chronicles, originally titled Dream Chronicles: The Endless Slumber, is an adventure, hidden object, and puzzle casual game developed by KatGames and published by PlayFirst. It is the first installment in the series. Set in a mystical world where mortal and fairy realms collide, the game tells the story of a mortal woman named Faye who is the only being able to awaken from a powerful fairy's dream spell. She embarks on an adventure through a dream world to find her fairy husband and save her hometown. To solve the mystery, players must complete puzzles and search for clues leading to the whereabouts of Faye's husband. As the first part of the first trilogy, Dream Chronicles spawned two direct sequels, Dream Chronicles 2 and Dream Chronicles, which were released in 2008 and 2009 respectively.
  • 2.3K
  • 12 Oct 2022
Topic Review
Bit Manipulation Instruction Set
Bit manipulation instructions sets (BMI sets) are extensions to the x86 instruction set architecture for microprocessors from Intel and AMD. The purpose of these instruction sets is to improve the speed of bit manipulation. All the instructions in these sets are non-SIMD and operate only on general-purpose registers. There are two sets published by Intel: BMI (here referred to as BMI1) and BMI2; they were both introduced with the Haswell microarchitecture. Another two sets were published by AMD: ABM (Advanced Bit Manipulation, which is also a subset of SSE4a implemented by Intel as part of SSE4.2 and BMI1), and TBM (Trailing Bit Manipulation, an extension introduced with Piledriver-based processors as an extension to BMI1, but dropped again in Zen-based processors).
  • 2.3K
  • 17 Oct 2022
Topic Review
Forensic Geology
Forensic geology is the study of evidence relating to minerals, oil, petroleum, and other materials found in the Earth, used to answer questions raised by the legal system. In 1975, Ray Murray and fellow Rutgers University professor John Tedrow published Forensic Geology. The main use of forensic geology as it is applied today is regarding trace evidence. By examining the soil and sediment particules to be able to link a suspect to a particular crime or a particular scene. Other uses in this field of science can include theft, fraud, locating a gravesite etc. It requires the aid of many other disciplines of science such as medicine, biology, geography, engineering and many others. More recently, in 2008, Alastair Ruffell and Jennifer McKinley, both of Queen's University Belfast, published Geoforensics a book that focuses more on the use of geomorphology and geophysics for searches. In 2010, forensic soil scientist Lorna Dawson of the James Hutton Institute co-edited and contributed chapters to the textbook Criminal and Environmental Soil Forensics. In 2012, Elisa Bergslien, at SUNY Buffalo State, published a general textbook on the topic, An Introduction to Forensic Geoscience.
  • 2.3K
  • 16 Nov 2022
Topic Review
ArchiCAD
ARCHICAD is an architectural BIM CAD software for Macintosh and Windows developed by the Hungarian company Graphisoft. ARCHICAD offers computer aided solutions for handling all common aspects of aesthetics and engineering during the whole design process of the built environment — buildings, interiors, urban areas, etc. Development of ARCHICAD started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, ARCHICAD became regarded by some as the first implementation of BIM. ARCHICAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model. Today, it has over 120,000 users.
  • 2.3K
  • 11 Nov 2022
Topic Review
ICANN
The Internet Corporation for Assigned Names and Numbers (ICANN /ˈaɪkæn/ EYE-kan) is an American multistakeholder group and nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation. ICANN performs the actual technical maintenance work of the Central Internet Address pools and DNS root zone registries pursuant to the Internet Assigned Numbers Authority (IANA) function contract. The contract regarding the IANA stewardship functions between ICANN and the National Telecommunications and Information Administration (NTIA) of the United States Department of Commerce ended on October 1, 2016, formally transitioning the functions to the global multistakeholder community. Much of its work has concerned the Internet's global Domain Name System (DNS), including policy development for internationalization of the DNS system, introduction of new generic top-level domains (TLDs), and the operation of root name servers. The numbering facilities ICANN manages include the Internet Protocol address spaces for IPv4 and IPv6, and assignment of address blocks to regional Internet registries. ICANN also maintains registries of Internet Protocol identifiers. ICANN's primary principles of operation have been described as helping preserve the operational stability of the Internet; to promote competition; to achieve broad representation of the global Internet community; and to develop policies appropriate to its mission through bottom-up, consensus-based processes. ICANN's creation was announced publicly on September 17, 1998, and it formally came into being on September 30, 1998, incorporated in the U.S. state of California. Originally headquartered in Marina del Rey in the same building as the University of Southern California's Information Sciences Institute (ISI), its offices are now in the Playa Vista neighborhood of Los Angeles in Facebook's old office.
  • 2.3K
  • 10 Nov 2022
Topic Review
Camp Lazlo
Camp Lazlo (stylized as CAMP LAZLO!) is an American animated television series created by Joe Murray for Cartoon Network. It was produced by Cartoon Network Studios. The show revolves around Lazlo, a spider monkey who attends a Boy Scout-like summer camp with a cast of anthropomorphic animal characters. The series has a style of humor similar to the Nickelodeon series Rocko's Modern Life (which Murray also created and is most known for) SpongeBob SquarePants and The Powerpuff Girls. The series premiered on Cartoon Network on July 8, 2005 at 8:00 p.m. ET/PT with five seasons, 61 episodes, and an hour-long television special. During its run, the series won three Emmy Awards and three Pulcinella Awards, and was also nominated for another Emmy and an Annie Award.
  • 2.3K
  • 07 Nov 2022
Topic Review
Rosetta Stone
Rosetta Stone Language Learning is proprietary, computer-assisted language learning (CALL) software published by Rosetta Stone Inc, part of the IXL Learning family of products. The software uses images, text, and sound to teach words and grammar by spaced repetition, without translation. Rosetta Stone calls its approach Dynamic Immersion. The software's name and logo allude to the ancient stone slab of the same name on which the Decree of Memphis is inscribed in three writing systems. IXL Learning acquired Rosetta Stone in March 2021.
  • 2.3K
  • 24 Oct 2022
Topic Review
Gâteaux Derivative
In mathematics, the Gâteaux differential or Gâteaux derivative is a generalization of the concept of directional derivative in differential calculus. Named after René Gâteaux, a French mathematician who died young in World War I, it is defined for functions between locally convex topological vector spaces such as Banach spaces. Like the Fréchet derivative on a Banach space, the Gâteaux differential is often used to formalize the functional derivative commonly used in the calculus of variations and physics. Unlike other forms of derivatives, the Gâteaux differential of a function may be nonlinear. However, often the definition of the Gâteaux differential also requires that it be a continuous linear transformation. Some authors, such as (Tikhomirov 2001), draw a further distinction between the Gâteaux differential (which may be nonlinear) and the Gâteaux derivative (which they take to be linear). In most applications, continuous linearity follows from some more primitive condition which is natural to the particular setting, such as imposing complex differentiability in the context of infinite dimensional holomorphy or continuous differentiability in nonlinear analysis.
  • 2.3K
  • 25 Oct 2022
Topic Review
Differential Geometry of Curves
Differential geometry of curves is the branch of geometry that deals with smooth curves in the plane and in the Euclidean space by methods of differential and integral calculus. Starting in antiquity, many specific curves have been thoroughly investigated using the synthetic approach. Differential geometry takes another path: curves are represented in a parametrized form, and their geometric properties and various quantities associated with them, such as the curvature and the arc length, are expressed via derivatives and integrals using vector calculus. One of the most important tools used to analyze a curve is the Frenet frame, a moving frame that provides a coordinate system at each point of the curve that is "best adapted" to the curve near that point. The theory of curves is much simpler and narrower in scope than the theory of surfaces and its higher-dimensional generalizations, because a regular curve in a Euclidean space has no intrinsic geometry. Any regular curve may be parametrized by the arc length (the natural parametrization) and from the point of view of a theoretical point particle on the curve that does not know anything about the ambient space, all curves would appear the same. Different space curves are only distinguished by the way in which they bend and twist. Quantitatively, this is measured by the differential-geometric invariants called the curvature and the torsion of a curve. The fundamental theorem of curves asserts that the knowledge of these invariants completely determines the curve.
  • 2.3K
  • 17 Nov 2022
Topic Review
Domain Hack
A domain hack is a domain name that suggests a word, phrase, or name when concatenating two or more adjacent levels of that domain. For example, "bir.ds" and "examp.le", using the fictitious country-code domains .ds and .le, suggest the words birds and example respectively. In this context, the word hack denotes a clever trick (as in programming), not an exploit or break-in (as in security). Domain hacks offer the ability to produce short domain names. This makes them potentially valuable as redirectors, pastebins, base domains from which to delegate subdomains and URL shortening services.
  • 2.3K
  • 30 Sep 2022
Topic Review
Fault-tolerant Computer System
Fault-tolerant computer systems are systems designed around the concepts of fault tolerance. In essence, they must be able to continue working to a level of satisfaction in the presence of errors or breakdowns. Fault tolerance is not just a property of individual machines; it may also characterise the rules by which they interact. For example, the Transmission Control Protocol (TCP) is designed to allow reliable two-way communication in a packet-switched network, even in the presence of communications links which are imperfect or overloaded. It does this by requiring the endpoints of the communication to expect packet loss, duplication, reordering and corruption, so that these conditions do not damage data integrity, and only reduce throughput by a proportional amount. Recovery from errors in fault-tolerant systems can be characterised as either 'roll-forward' or 'roll-back'. When the system detects that it has made an error, roll-forward recovery takes the system state at that time and corrects it, to be able to move forward. Roll-back recovery reverts the system state back to some earlier, correct version, for example using checkpointing, and moves forward from there. Roll-back recovery requires that the operations between the checkpoint and the detected erroneous state can be made idempotent. Some systems make use of both roll-forward and roll-back recovery for different errors or different parts of one error.
  • 2.3K
  • 09 Nov 2022
Topic Review
Spacewalk
Spacewalk is open-source systems management software for system provisioning, patching and configuration licensed under the GNU GPLv2. The project was discontinued on 31 May 2020 with 2.10 being the last official release. SUSE forked the spacewalk code base in 2018 with uyuni-project.
  • 2.3K
  • 15 Nov 2022
Topic Review
Computer Emergency Response Team
A computer emergency response team (CERT) is an expert group that handles computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT).
  • 2.3K
  • 31 Oct 2022
Topic Review
Panjab Digital Library
The Panjab Digital Library is a voluntary organization digitizing and preserving the cultural heritage of Panjab since 2003. With over 45 million digitized pages, it is the biggest resource of digital material on Panjab. There are many historically significant documents stored and made available online. Its scope covers Sikh and Punjabi culture. The library funded by The Nanakshahi Trust was launched online in August 2009. Its base office is located at Chandigarh, India. The library's mission is to locate, digitize, preserve, collect and make accessible the accumulated wisdom of the Panjab region, without distinction as to script, language, religion, nationality, or other physical condition.
  • 2.3K
  • 03 Nov 2022
Topic Review
All-points Bulletin
An all-points bulletin (APB) is an electronic information broadcast sent from one sender to a group of recipients, to rapidly communicate an important message. The technology used to send this broadcast has varied throughout time, and includes Teletype, Radio, Computerised Bulletin Board Systems (CBBS), and Internet. The earliest known record of the all-points bulletin is when used by American police, which dates the term to 1947. Although, used in the field of policing at the time, the APB has had usage in fields such as politics, technology and science research. However, since the 21st Century, due to advances in technology, all-points bulletins have become significantly less common and are now only primarily used by police departments in countries such as America, Canada, Australia and the United Kingdom.
  • 2.2K
  • 17 Nov 2022
Topic Review
Fractional Poisson Process
In probability theory, a fractional Poisson process is a stochastic process to model the long-memory dynamics of a stream of counts. The time interval between each pair of consecutive counts follows the non-exponential power-law distribution with parameter [math]\displaystyle{ \nu }[/math], which has physical dimension [math]\displaystyle{ [\nu ]=\sec ^{-\mu } }[/math], where [math]\displaystyle{ 0\lt \mu \leq 1 }[/math]. In other words, fractional Poisson process is non-Markov counting stochastic process that exhibits non-exponential distribution of interarrival times. The fractional Poisson process is a continuous-time process that can be thought of as natural generalization of the well-known Poisson process. Fractional Poisson probability distribution is a new member of discrete probability distributions. The fractional Poisson process, Fractional compound Poisson process and fractional Poisson probability distribution function have been invented, developed and encouraged for applications by Nick Laskin (2003) who coined the terms fractional Poisson process, Fractional compound Poisson process and fractional Poisson probability distribution function.
  • 2.2K
  • 08 Jun 2025
Topic Review
Religion
This is a list of encyclopedias as well as encyclopedic and biographical dictionaries published on the subjects of religion and mythology in any language.
  • 2.2K
  • 13 Oct 2022
Topic Review
Speakwrite
Newspeak is the language of Oceania, a fictional totalitarian state and the setting of the dystopian novel Nineteen Eighty-Four (1949), by George Orwell. To meet the ideological requirements of English Socialism (Ingsoc) in Oceania, the ruling Party created Newspeak, a controlled language of restricted grammar and limited vocabulary, meant to limit the freedom of thought—personal identity, self-expression, free will—that threatens the ideology of the régime of Big Brother and the Party, who have criminalized such concepts into thoughtcrime, as contradictions of Ingsoc orthodoxy. In "The Principles of Newspeak", the appendix to the novel, George Orwell explains that Newspeak usage follows most of the English grammar, yet is a language characterised by a continually diminishing vocabulary; complete thoughts reduced to simple terms of simplistic meaning. Linguistically, the contractions of Newspeak—Ingsoc (English Socialism), Minitrue (Ministry of Truth), etc.—derive from the syllabic abbreviations of Russian, which identify the government and social institutions of the Soviet Union, such as politburo (Politburo of the Central Committee of the Communist Party of the Soviet Union), Comintern (Communist International), kolkhoz (collective farm), and Komsomol (Young Communists' League). The long-term political purpose of the new language is for every member of the Party and society, except the Proles—the working-class of Oceania—to exclusively communicate in Newspeak, by A.D. 2050; during that 66-year transition, the usage of Oldspeak (Standard English) shall remain interspersed among Newspeak conversations. Newspeak is also a constructed language, of planned phonology, grammar, and vocabulary, like Basic English, which Orwell promoted (1942–44) during the Second World War (1939–45), and later rejected in the essay "Politics and the English Language" (1946), wherein he criticizes the bad usage of English in his day: dying metaphors, pretentious diction, and high-flown rhetoric, which produce the meaningless words of doublespeak, the product of unclear reasoning. Orwell's conclusion thematically reiterates linguistic decline: "I said earlier that the decadence of our language is probably curable. Those who deny this may argue that language merely reflects existing social conditions, and that we cannot influence its development, by any direct tinkering with words or constructions."
  • 2.2K
  • 28 Sep 2022
Topic Review
Technical Support Scam
A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users. Such calls are mostly targeted at Microsoft Windows users, with the caller often claiming to represent a Microsoft technical support department. In English-speaking countries such as the United States , Canada , United Kingdom , Ireland, Australia and New Zealand, such cold call scams have occurred as early as 2008. and primarily originate from call centers in India . The scammer will typically attempt to get the victim to allow remote access to their computer. After remote access is gained, the scammer relies on confidence tricks, typically involving utilities built into Windows and other software, in order to gain the victim's trust to pay for the supposed "support" services. The scammer will often then steal the victim's credit card account information or persuade the victim to log in to their online banking account to receive a promised refund, only to steal more money, claiming that a secure server is connected and that the scammer cannot see the details. Many schemes involve convincing the victim to purchase expensive gift cards and then to divulge the card information to the scammer.
  • 2.2K
  • 21 Nov 2022
  • Page
  • of
  • 48
Academic Video Service