Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
Diaspora
Diaspora is a free personal web server that implements a distributed social networking service. Installations of the software form nodes (termed "pods") which make up the distributed Diaspora social network. The project was founded by Dan Grippi, Maxwell Salzberg, Raphael Sofaer and Ilya Zhitomirskiy, students at New York University's Courant Institute of Mathematical Sciences. The group received crowdfunding in excess of $200,000 via Kickstarter. A consumer alpha version was released on 23 November 2010. Konrad Lawson, blogging for the Chronicle of Higher Education, suggested Diaspora in July 2011 as an alternative to corporately produced software.
875
09 Nov 2022
Topic Review
2D Filters
Two dimensional filters have seen substantial development effort due to their importance and high applicability across several domains. In the 2-D case the situation is quite different from the 1-D case, because the multi-dimensional polynomials cannot in general be factored. This means that an arbitrary transfer function cannot generally be manipulated into a form required by a particular implementation. The input-output relationship of a 2-D IIR filter obeys a constant-coefficient linear partial difference equation from which the value of an output sample can be computed using the input samples and previously computed output samples. Because the values of the output samples are fed back, the 2-D filter, like its 1-D counterpart, can be unstable.
873
26 Oct 2022
Topic Review
Nominet UK
Nominet UK is the .uk domain name registry in the United Kingdom , which was founded by Dr Willie Black and five others on 14 May 1996 when its predecessor, the "Naming Committee" was unable to deal with the volume of registrations then being sought under the .uk domain. Nominet is a non-profit company limited by guarantee. It has members who act as shareholders, but without the right to participate in the profits of the company. Anyone can become a member, but most members are internet service providers who are also registrars. As one of the first professional ccTLD operators, Nominet became the model for many other operators worldwide. Customers wishing to register a domain do not approach Nominet directly but register the domain via a domain registrar – a business entity authorised by Nominet to register and manage .uk domains on behalf of customers. Registrars for .uk domains were formerly known as "tagholders". As of 2019, the .uk register held over 12,000,000 .uk domain names, making it the fourth largest ccTLD in the world. Nominet also deals with disputes about registrations of .uk domain names, via its Dispute Resolution Service (DRS) which is similar to the UDRP system used for generic Top Level Domain Names, but with certain innovations such as a free mediation service. Nominet, which operates the .uk domain, has launched a charitable foundation, the Nominet Trust, funded with Nominet grants.
872
23 Nov 2022
Biography
Carole Goble
Carole Anne Goble, CBE FREng (born 10 April 1961) is a British academic who is Professor of Computer Science at the University of Manchester.[1] She is Principal Investigator (PI) of the myGrid,[2] BioCatalogue[3] and myExperiment[4] projects and co-leads the Information Management Group (IMG) with Norman Paton.[5] Goble was educated at Maidstone Grammar School for Girls.[6] Her academic care
870
23 Nov 2022
Topic Review
Technology Roadmap
A technology roadmap is a flexible planning schedule to support strategic and long-range planning, by matching short-term and long-term goals with specific technology solutions. It is a plan that applies to a new product or process and may include using technology forecasting or technology scouting to identify suitable emerging technologies. It is a known technique to help manage the fuzzy front-end of innovation. It is also expected that roadmapping techniques may help companies to survive in turbulent environments and help them to plan in a more holistic way to include non-financial goals and drive towards a more sustainable development. Here roadmaps can be combined with other corporate foresight methods to facilitate systemic change. Developing a roadmap has three major uses. It helps reach a consensus about a set of needs and the technologies required to satisfy those needs, it provides a mechanism to help forecast technology developments, and it provides a framework to help plan and coordinate technology developments. It may also be used as an analysis tool to map the development and emergence from new industries.
869
29 Nov 2022
Topic Review
Discipline (Academia)
An academic discipline or academic field is a subdivision of knowledge that is taught and researched at the college or university level. Disciplines are defined (in part), and recognized by the academic journals in which research is published, and the learned societies and academic departments or faculties within colleges and universities to which their practitioners belong. It includes language, art and cultural studies and other scientific disciplines. It incorporates expertise, people, projects, communities, challenges, studies, inquiry, research areas, and facilities that are strongly associated with a given scholastic subject area or college department. For example, the branches of science are commonly referred to as the scientific disciplines, e.g. physics, chemistry, and biology. Individuals associated with academic disciplines are commonly referred to as experts or specialists. Others, who may have studied liberal arts or systems theory rather than concentrating in a specific academic discipline, are classified as generalists. While academic disciplines in and of themselves are more or less focused practices, scholarly approaches such as multidisciplinarity/interdisciplinarity, transdisciplinarity, and cross-disciplinarity integrate aspects from multiple academic disciplines, therefore addressing any problems that may arise from narrow concentration within specialized fields of study. For example, professionals may encounter trouble communicating across academic disciplines because of differences in language, specified concepts or methodology. Some researchers believe that academic disciplines may, in the future, be replaced by what is known as Mode 2 or "post-academic science", which involves the acquisition of cross-disciplinary knowledge through collaboration of specialists from various academic disciplines.
869
24 Nov 2022
Topic Review
Delphi
Delphi is a general-purpose programming language and a software product that uses the Delphi dialect of the Object Pascal programming language and provides an integrated development environment (IDE) for rapid application development of desktop, mobile, web, and console software, currently developed and maintained by Embarcadero Technologies. Delphi's compilers generate native code for Microsoft Windows, macOS, iOS, Android and Linux (x64). Delphi includes a code editor, a visual designer, an integrated debugger, a source code control component, and support for third-party plugins. The code editor features Code Insight (code completion), Error Insight (real-time error-checking), and refactoring. The visual forms designer has the option of using either the Visual Component Library (VCL) for pure Windows development or the FireMonkey (FMX) framework for cross-platform development. Database support is a key feature and is provided by FireDAC (Database Access Components). Delphi is known for its fast compilation speed, native code, and developer productivity. Delphi was originally developed by Borland as a rapid application development tool for Windows as the successor of Turbo Pascal. Delphi added full object-oriented programming to the existing language, and the language has grown to support generics, anonymous methods, closures, and native Component Object Model (COM) support. Delphi and its C++ counterpart, C++Builder, are interoperable and jointly sold under the name RAD Studio. There are Professional, Enterprise, and Architect editions, with the higher editions having more features at a higher price. There is also a free-of-charge Community edition, with most of the features of Professional, but restricted to users and companies with low revenue.
867
24 Oct 2022
Topic Review
Panjab Digital Library
The Panjab Digital Library is a voluntary organization digitizing and preserving the cultural heritage of Panjab since 2003. With over 45 million digitized pages, it is the biggest resource of digital material on Panjab. There are many historically significant documents stored and made available online. Its scope covers Sikh and Punjabi culture. The library funded by The Nanakshahi Trust was launched online in August 2009. Its base office is located at Chandigarh, India. The library's mission is to locate, digitize, preserve, collect and make accessible the accumulated wisdom of the Panjab region, without distinction as to script, language, religion, nationality, or other physical condition.
866
03 Nov 2022
Topic Review
Getmac
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
864
26 Oct 2022
Topic Review
XCore Architecture
The XCore Architecture is a 32-bit RISC microprocessor architecture designed by XMOS. The architecture is designed to be used in multi-core processors for embedded systems. Each XCore executes up to eight concurrent threads, each thread having its own register set, and the architecture directly supports inter-thread and inter-core communication and various forms of thread scheduling. Two versions of the XCore architecture exist: the XS1 architecture and the XS2 architecture. Processors with the XS1 architecture include the XCore XS1-G4 and XCore XS1-L1. Processors with the XS2 architecture include xCORE-200. The architecture encodes instructions compactly, using 16 bits for frequently used instructions (with up to three operands) and 32 bits for less frequently used instructions (with up to 6 operands). Almost all instructions execute in a single cycle, and the architecture is event-driven in order to decouple the timings that a program needs to make from the execution speed of the program. A program will normally perform its computations and then wait for an event (e.g. a message, time, or external I/O event) before continuing.
858
24 Nov 2022
Topic Review
Local Zeta-Function
In number theory, the local zeta function Z(V, s) (sometimes called the congruent zeta function) is defined as where Nm is the number of points of V defined over the mth cyclotomic field extension Fqm of Fq, and V is a non-singular n-dimensional projective algebraic variety over the field Fq with q elements. By the variable transformation u = q−s, then it is defined by as the formal power series of the variable [math]\displaystyle{ u }[/math]. Equivalently, the local zeta function sometimes is defined as follows: In other word, the local zeta function Z(V, u) with coefficients in the finite field Fq is defined as a function whose logarithmic derivative generates the numbers Nm of the solutions of equation, defining V, in the m degree extension Fqm.
857
21 Oct 2022
Topic Review
Operational Technology
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. The term has become established to demonstrate the technological and functional differences between traditional information technology (IT) systems and industrial control systems environment, the so-called "IT in the non-carpeted areas".
854
09 Nov 2022
Topic Review
Personally Identifiable Information
Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. The abbreviation PII is widely accepted in the U.S. context, but the phrase it abbreviates has four common variants based on personal / personally, and identifiable / identifying. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used. (In other countries with privacy protection laws derived from the OECD privacy principles, the term used is more often "personal information", which may be somewhat broader: in Australia's Privacy Act 1988 (Cth) "personal information" also includes information from which the person's identity is "reasonably ascertainable", potentially covering some information not covered by PII.) Under European and other data protection regimes, which centre primarily around the General Data Protection Regulation, the term "personal data" is significantly broader, and determines the scope of the regulatory regime. NIST Special Publication 800-122 defines PII as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." So, for example, a user's IP address is not classed as PII on its own, but is classified as linked PII. The concept of PII has become prevalent as information technology and the Internet have made it easier to collect PII leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts. As a response to these threats, many website privacy policies specifically address the gathering of PII, and lawmakers have enacted a series of legislation to limit the distribution and accessibility of PII. However, PII is a legal concept, not a technical concept, and as noted, it is not utilised in all jurisdictions. Because of the versatility and power of modern re-identification algorithms, the absence of PII data does not mean that the remaining data does not identify individuals. While some attributes may not be uniquely identifying on their own, any attribute can be potentially identifying in combination with others. These attributes have been referred to as quasi-identifiers or pseudo-identifiers. While such data may not constitute PII in the United States, it is highly likely to remain personal data under European data protection law.
853
03 Nov 2022
Topic Review
Network Function Virtualization
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen.
851
30 May 2022
Topic Review
Yuktibhāṣā
Yuktibhāṣā (Malayalam: യുക്തിഭാഷ, lit. 'Rationale'), also known as Gaṇita-yukti-bhāṣā:xxi and Gaṇitanyāyasaṅgraha (Compendium of Astronomical Rationale), is a major treatise on mathematics and astronomy, written by the India n astronomer Jyesthadeva of the Kerala school of mathematics around 1530. The treatise, written in Malayalam, is a consolidation of the discoveries by Madhava of Sangamagrama, Nilakantha Somayaji, Parameshvara, Jyeshtadeva, Achyuta Pisharati, and other astronomer-mathematicians of the Kerala school. It also exists in a Sanskrit version, with unclear author and date, composed as a rough translation of the Malayalam original. The work contains proofs and derivations of the theorems that it presents. Modern historians used to assert, based on the works of Indian mathematics that first became available, that early Indian scholars in astronomy and computation lacked in proofs, but Yuktibhāṣā demonstrates otherwise. Some of its important topics include the infinite series expansions of functions; power series, including of π and π/4; trigonometric series of sine, cosine, and arctangent; Taylor series, including second and third order approximations of sine and cosine; radii, diameters and circumferences; and tests of convergence. Yuktibhāṣā mainly gives rationale for the results in Nilakantha's Tantra Samgraha. It is considered an early text on the ideas of calculus, predating Newton and Leibniz by centuries. The treatise was largely unnoticed outside India, as it was written in the local language of Malayalam. In modern times, due to wider international cooperation in mathematics, the wider world has taken notice of the work. For example, both Oxford University and the Royal Society of Great Britain have given attribution to pioneering mathematical theorems of Indian origin that predate their Western counterparts.
851
21 Nov 2022
Topic Review
Inventory (Library)
Inventories are the one method that libraries use to determine whether some items in their collection are in need of preservation or conservation activities. A modern inventory might involve examining item by item with a barcode scanner and a laptop, with the objective of adjusting bibliographic and item records in theirs and OCLC's WorldCat databases. Using a laptop and handheld bar code reader will “reduce human error and inconsistencies, while helping to maintain staff concentration and enthusiasm for the project”. Print materials in the digital age, though dramatically decreased in size compared to e-print materials, are still valuable components of a library's collection. Increasing print material's accessibility, and reducing user frustration, make the inventory process an effective tool in improving library service quality. “When library users are unable to find materials in the expected locations, they lose confidence in the library catalog as well as in the library itself”. Missing or mislabeled books have a direct impact on the quality of library services. Maintaining the stacks through inventories and shelf reading can mitigate staff time lost searching for missing or mislabeled items. Libraries have thousands of books; large academic libraries may have millions of books;. Doing an annual (or less frequent) physical inventory with the laying on of hands on each individual item may not be practical for several reasons. It may not be financially feasible, employees required may not have extra time to devote to such an inventory, and there are no financial rewards for the Library for completing an inventory. Problems that are discovered (books in need of repurchase, rebinding, repair, or digitization) may require solutions that are expensive and labor-intensive. Because of these restraints, inventories may not take place for decades, if ever, at large academic institutions. By contrast, complete inventories are often a regular part of the school library media specialist's job at K-12 institutions, where inventory may be a legal requirement that shows that the libraries are accountable for the money they have spent throughout the year. Checking for lost books and materials can be similarly compared to auditing. However, there are alternative options to performing a complete inventory, such as performing a selective inventory. Selective inventory can be performed by circumstance or by data prediction. Physical space is a premium in libraries. Inventorying mini collections before relocating them to their new location presents the library with an opportunity to perform a selective inventory project. An alternative to opportunistic selective inventory projects is Kohl's (1982) assertion that circulation statistics, book search statistics, and ILL statistics can be useful tools in identifying areas as possible selective inventory areas. He writes, “areas in need of an inventory can be identified through the use of predictive data”. Once the objectives for accuracy and methods of measuring have been established “the criteria need to be quantified. An overall measure of the inventory accuracy should be maintained as a management key performance indicator”.
850
01 Nov 2022
Topic Review
Forensic Serology
Forensic serology is the detection, identification, classification, and study of various bodily fluids such as blood, semen, saliva, and urine, and their relationship to a crime scene. A forensic serologist may also be involved in DNA analysis and bloodstain pattern analysis. Serology testing begins with presumptive tests which gives the analyst an indication that a specific bodily fluid may be present, but cannot completely confirm its presence. Following the presumptive tests, confirmatory tests are done on the same sample to confirm what the unknown substance actually is.
849
25 Oct 2022
Topic Review
Zermelo's Theorem (Game Theory)
In game theory, Zermelo's theorem is a theorem about finite two-person games of perfect information in which the players move alternately and in which chance does not affect the decision making process. It says that if the game cannot end in a draw, then one of the two players must have a winning strategy (i.e. can force a win). An alternate statement is that for a game meeting all of these conditions except the condition that a draw is now possible, then either the first-player can force a win, or the second-player can force a win, or both players can force a draw. The theorem is named after Ernst Zermelo, a German mathematician and logician, who proved the theorem for the example game of chess in 1913.
846
15 Nov 2022
Topic Review
Heterogeneous Relation
In mathematics, a heterogeneous relation is a binary relation, a subset of a Cartesian product A × B, where A and B are distinct sets. The prefix hetero is from the Greek ἕτερος (heteros, "other, another, different"). A heterogeneous relation has been called a rectangular relation, suggesting that it does not have the square-symmetry of a homogeneous relation on a set where A = B. Commenting on the development of binary relations beyond homogeneous relations, researchers wrote, "...a variant of the theory has evolved that treats relations from the very beginning as heterogeneous or rectangular, i.e. as relations where the normal case is that they are relations between different sets." Developments in algebraic logic have facilitated usage of binary relations. The calculus of relations includes the algebra of sets, extended by composition of relations and the use of converse relations. The inclusion R ⊆ S, meaning that aRb implies aSb, sets the scene in a lattice of relations. But since [math]\displaystyle{ P \subseteq Q \equiv (P \cap \bar{Q} = \varnothing ) \equiv (P \cap Q = P), }[/math] the inclusion symbol is superfluous. Nevertheless, composition of relations and manipulation of the operators according to Schröder rules, provides a calculus to work in the power set of A × B. In contrast to homogeneous relations, the composition of relations operation is only a partial function. The necessity of matching range to domain of composed relations has led to the suggestion that the study of heterogeneous relations is a chapter of category theory as in the category of sets, except that the morphisms of this category are relations. The objects of the category Rel are sets, and the relation-morphisms compose as required in a category.
846
21 Nov 2022
Topic Review
Windows 2.0
Windows 2.0 is an obsoleted 16-bit Microsoft Windows GUI-based operating environment that was released on December 9, 1987, and the successor to Windows 1.0. This product's family includes Windows 2.0, a base edition for 8086 real mode, and Windows/386 2.0, an enhanced edition for i386 protected mode.
844
08 Oct 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×