You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
IoT Threats and Attacks
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide.
  • 1.7K
  • 13 Sep 2021
Topic Review
Modo
Modo (stylized as MODO, and originally modo) is a polygon and subdivision surface modeling, sculpting, 3D painting, animation and rendering package developed by Luxology, LLC, which is now merged with and known as Foundry. The program incorporates features such as n-gons and edge weighting, and runs on Microsoft Windows, Linux and macOS platforms.
  • 1.7K
  • 18 Oct 2022
Topic Review
IBM Integration Bus
IBM APP Connect Enterprise (abbreviated as IBM ACE, formerly known as IBM Integration Bus or WebSphere Message Broker) is IBM's integration broker from the WebSphere product family that allows business information to flow between disparate applications across multiple hardware and software platforms. Rules can be applied to the data flowing through the message broker to route and transform the information. The product is an Enterprise Service Bus supplying a communication channel between applications and services in a service-oriented architecture. IBM ACE provides capabilities to build solutions needed to support diverse integration requirements through a set of connectors to a range of data sources, including packaged applications, files, mobile devices, messaging systems, and databases. A benefit of using IBM ACE is that the tool enables existing applications for Web Services without costly legacy application rewrites. ACE avoids the point-to-point strain on development resources by connecting any application or service over multiple protocols, including SOAP, HTTP and JMS. Modern secure authentication mechanisms, including the ability to perform actions on behalf of masquerading or delegate users, through MQ, HTTP and SOAP nodes are supported such as LDAP, X-AUTH, O-AUTH, and two-way SSL. A major focus of IBM ACE in its latest release is the capability of the product's runtime to be fully hosted in a cloud. Hosting the runtime in the cloud provides certain advantages and potential cost savings compared to hosting the runtime on premises as it simplifies the maintenance and application of OS-level patches which can sometimes be disruptive to business continuity. Also, cloud hosting of IBM ACE runtime allows easy expansion of capacity by adding more horsepower to the CPU configuration of a cloud environment or by adding additional nodes in an Active-Active configuration. Another advantage of maintaining ACE runtimes in the cloud is the ability to configure access to your ACE functionality separate and apart from your internal network using DataPower or API Connect devices. This allows people or services on the public internet to access your Enterprise Service Bus without passing through your internal network, which can be a more secure configuration than if your ESB was deployed to your internal on premises network. IBM ACE embeds a Common Language Runtime to invoke any .NET logic as part of an integration. It also includes full support for the Visual Studio development environment, including the integrated debugger and code templates. IBM Integration Bus includes a comprehensive set of patterns and samples that demonstrate bi-directional connectivity with both Microsoft Dynamics CRM and MSMQ. Several improvements have been made to this current release, among them the ability to configure runtime parameters using a property file that is part of the deployed artifacts contained in the BAR ('broker archive') file. Previously, the only way to configure runtime parameters was to run an MQSI command on the command line. This new way of configuration is referred to as a policy document and can be created with the new Policy Editor. Policy documents can be stored in a source code control system and a different policy can exist for different environments (DEV, INT, QA, PROD). IBM ACE is compatible with several virtualization platforms right out-of-the-box, Docker being a prime example. With ACE, you can download from the global Docker repository a runtime of IBM ACE and run it locally. Because ACE has its administrative console built right into the runtime, once the Docker image is active on your local, you can do all the configuration and administration commands needed to fully activate any message flow or deploy any BAR file. In fact, you can construct message flows that are microservices and package these microservices into a Docker deployable object directly. Because message flows and BAR files can contain Policy files, this node configuration can be automatic and no or little human intervention is needed to complete the application deployment.
  • 1.7K
  • 07 Nov 2022
Topic Review
IBM Tivoli Storage Productivity Center
IBM Tivoli Storage Productivity Center (TPC) is a Storage Resource Management (SRM) software offering that provides a centralized point of control for managing large-scale, complex heterogeneous storage environments. IBM Tivoli Storage Productivity Center V5.2.x (5608-PC1) was renamed in V5.2.8 to IBM Spectrum Control Standard Edition V5.2.x (5608-PC1).
  • 1.6K
  • 20 Oct 2022
Topic Review
Logman
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 1.6K
  • 27 Oct 2022
Topic Review
Kissing Number Problem
In geometry, a kissing number is defined as the number of non-overlapping unit spheres that can be arranged such that they each touch a common unit sphere. For a lattice packing the kissing number is the same for every sphere, but for an arbitrary sphere packing the kissing number may vary from one sphere to another. Other names for kissing number that have been used are Newton number (after the originator of the problem), and contact number. In general, the kissing number problem seeks the maximum possible kissing number for n-dimensional spheres in (n + 1)-dimensional Euclidean space. Ordinary spheres correspond to two-dimensional closed surfaces in three-dimensional space. Finding the kissing number when centers of spheres are confined to a line (the one-dimensional case) or a plane (two-dimensional case) is trivial. Proving a solution to the three-dimensional case, despite being easy to conceptualise and model in the physical world, eluded mathematicians until the mid-20th century. Solutions in higher dimensions are considerably more challenging, and only a handful of cases have been solved exactly. For others investigations have determined upper and lower bounds, but not exact solutions.
  • 1.6K
  • 19 Oct 2022
Topic Review
Glossary of Graph Theory Terms
This is a glossary of graph theory terms. Graph theory is the study of graphs, systems of nodes or vertices connected in pairs by edges.
  • 1.6K
  • 16 Nov 2022
Topic Review
Delphi
Delphi is a general-purpose programming language and a software product that uses the Delphi dialect of the Object Pascal programming language and provides an integrated development environment (IDE) for rapid application development of desktop, mobile, web, and console software, currently developed and maintained by Embarcadero Technologies. Delphi's compilers generate native code for Microsoft Windows, macOS, iOS, Android and Linux (x64). Delphi includes a code editor, a visual designer, an integrated debugger, a source code control component, and support for third-party plugins. The code editor features Code Insight (code completion), Error Insight (real-time error-checking), and refactoring. The visual forms designer has the option of using either the Visual Component Library (VCL) for pure Windows development or the FireMonkey (FMX) framework for cross-platform development. Database support is a key feature and is provided by FireDAC (Database Access Components). Delphi is known for its fast compilation speed, native code, and developer productivity. Delphi was originally developed by Borland as a rapid application development tool for Windows as the successor of Turbo Pascal. Delphi added full object-oriented programming to the existing language, and the language has grown to support generics, anonymous methods, closures, and native Component Object Model (COM) support. Delphi and its C++ counterpart, C++Builder, are interoperable and jointly sold under the name RAD Studio. There are Professional, Enterprise, and Architect editions, with the higher editions having more features at a higher price. There is also a free-of-charge Community edition, with most of the features of Professional, but restricted to users and companies with low revenue.
  • 1.6K
  • 24 Oct 2022
Topic Review
Evolving Networks
Evolving Networks are networks that change as a function of time. They are a natural extension of network science since almost all real world networks evolve over time, either by adding or removing nodes or links over time. Often all of these processes occur simultaneously, such as in social networks where people make and lose friends over time, thereby creating and destroying edges, and some people become part of new social networks or leave their networks, changing the nodes in the network. Evolving network concepts build on established network theory and are now being introduced into studying networks in many diverse fields.
  • 1.6K
  • 21 Nov 2022
Topic Review
Applications of Multi-Connectivity in 5G Networks and Beyond
To manage a growing number of users and an ever-increasing demand for bandwidth, future 5th Generation (5G) cellular networks will combine different radio access technologies (cellular, satellite, and WiFi, among others) and different types of equipment (pico-cells, femto-cells, small-cells, macro-cells, etc.). Multi-connectivity is an emerging paradigm aiming to leverage this heterogeneous architecture. To achieve that, multi-connectivity proposes to enable each User Equipment to simultaneously use component carriers from different and heterogeneous network nodes: base stations, WiFi Access Points, etc. This could offer many benefits in terms of Quality of Service, energy efficiency, fairness, mobility, spectrum and interference management. That is why this survey aims to present an overview of multi-connectivity in 5G networks and Beyond. To do so, a comprehensive review of existing standards and enabling technologies is proposed. Then, a taxonomy is defined to classify the different elements characterizing multi-connectivity in 5G and future networks. Thereafter, existing research works using multi-connectivity to improve Quality of Service, energy efficiency, fairness, mobility management and spectrum and interference management are analyzed and compared. In addition, lessons common to these different contexts are presented. Finally, open challenges for multi-connectivity in 5G networks and Beyond are discussed.
  • 1.6K
  • 24 Oct 2022
Topic Review
Zermelo's Theorem (Game Theory)
In game theory, Zermelo's theorem is a theorem about finite two-person games of perfect information in which the players move alternately and in which chance does not affect the decision making process. It says that if the game cannot end in a draw, then one of the two players must have a winning strategy (i.e. can force a win). An alternate statement is that for a game meeting all of these conditions except the condition that a draw is now possible, then either the first-player can force a win, or the second-player can force a win, or both players can force a draw. The theorem is named after Ernst Zermelo, a German mathematician and logician, who proved the theorem for the example game of chess in 1913.
  • 1.6K
  • 15 Nov 2022
Topic Review
Computational Tools for Artificial Intelligence
This article discusses computational tools used in artificial intelligence.
  • 1.6K
  • 02 Nov 2022
Topic Review
CherryPlayer
CherryPlayer is a freeware closed-source media player of streaming media, audio and video files for the Microsoft Windows operating systems. It supports almost all popular audio and video file formats, streaming protocols, subtitle files and playlists. A distinctive feature of the player is the minimum number of settings (which initially gave rise to compare it in this regard with the browser Chrome) and the ability to play almost any streaming video and audio broadcasts, including live ones and radio.
  • 1.6K
  • 14 Nov 2022
Topic Review
Unique Games Conjecture
In computational complexity theory, the unique games conjecture (often referred to as UGC) is a conjecture made by Subhash Khot in 2002. The conjecture postulates that the problem of determining the approximate value of a certain type of game, known as a unique game, has NP-hard computational complexity. It has broad applications in the theory of hardness of approximation. If the unique games conjecture is true and P ≠ NP, then for many important problems it is not only impossible to get an exact solution in polynomial time (as postulated by the P versus NP problem), but also impossible to get a good polynomial-time approximation. The problems for which such an inapproximability result would hold include constraint satisfaction problems, which crop up in a wide variety of disciplines. The conjecture is unusual in that the academic world seems about evenly divided on whether it is true or not.
  • 1.6K
  • 26 Oct 2022
Topic Review
Quietism
Quietism in philosophy sees the role of philosophy as broadly therapeutic or remedial. Quietist philosophers believe that philosophy has no positive thesis to contribute, but rather that its value is in defusing confusions in the linguistic and conceptual frameworks of other subjects, including non-quietist philosophy. For quietists, advancing knowledge or settling debates (particularly those between realists and non-realists) is not the job of philosophy, rather philosophy should liberate the mind by diagnosing confusing concepts.
  • 1.6K
  • 17 Nov 2022
Topic Review
Data Storage and Retrieval Using IPFS and Blockchain
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic and technological issues. Namely, the blockchain usually stores only a fingerprint of data, such as the hash of data, while full, raw information is stored off-chain. This is generally enough to guarantee immutability and traceability, but misses to support another important property, that is, data availability. This is particularly true when a traditional, centralized database is chosen for off-chain storage. For this reason, many proposals try to properly combine blockchain with decentralized IPFS storage. However, the storage of data on IPFS could pose some privacy problems. This entry proposes a solution that properly combines blockchain, IPFS, and encryption techniques to guarantee immutability, traceability, availability, and data privacy.
  • 1.6K
  • 26 Mar 2024
Topic Review
IBM System I
The IBM System i is IBM's previous generation of midrange computer systems for IBM i users, and was subsequently replaced by the IBM Power Systems in April 2008. The platform was first introduced as the AS/400 (Application System/400) on June 21, 1988 and later renamed to the eServer iSeries in 2000. As part of IBM's Systems branding initiative in 2006, it was again renamed to System i. The codename of the AS/400 project was "Silver Lake", named for the lake in downtown Rochester, Minnesota, where development of the system took place. In April 2008, IBM announced its integration with the System p platform. The unified product line is called IBM Power Systems and features support for the IBM i (previously known as i5/OS or OS/400), AIX and GNU/Linux operating systems.
  • 1.6K
  • 24 Nov 2022
Topic Review
IBM Spectrum Control
IBM Spectrum Control formerly known as Tivoli Storage Productivity Center (TPC) is a Storage Resource Management (SRM) software offering that provides a centralized point of control for managing large-scale, complex heterogeneous storage environments. IBM Tivoli Storage Productivity Center V5.2.x (5608-PC1) was renamed in V5.2.8 to IBM Spectrum Control Standard Edition V5.2.x (5608-PC1).
  • 1.6K
  • 17 Oct 2022
Topic Review
Louvain Modularity
The Louvain Method for community detection is a method to extract communities from large networks created by Blondel et al. from the University of Louvain (affiliation of authors has given the method its name). The method is a greedy optimization method that appears to run in time [math]\displaystyle{ O(n \log n) }[/math].
  • 1.6K
  • 10 Nov 2022
Topic Review
Forensic Arts
Forensic art is any art used in law enforcement or legal proceedings. Forensic art is used to assist law enforcement with the visual aspects of a case, often using witness descriptions and video footage. It is a highly specialized field that covers a wide range of artistic skills, such as composite drawing, crime scene sketching, image modification and identification, courtroom drawings, demonstrative evidence, and postmortem and facial approximation aids. It is rare for a forensic artist to specialize in more than one of these skills. Many forensic artists do the job as a collateral duty to their "regular" job in law enforcement, such as police officer, crime scene tech, etc. Such forensic artists perform their work while on a fixed salary and are not additionally compensated for artistic duties. There are few full-time forensic artist jobs available. Most full-time artists work in large cities, or in state or federal agencies. "Freelancing" in forensic art is a difficult career path, as ties to law enforcement are a necessary part of the job, and agencies have limited budgets to pay outside contractors. The skill of facial approximation is closely associated and related to forensic anthropology in that an artist specializes in the reconstruction of the remains of a human body. Generally this discipline focuses on the human face for identification purposes. The forensic artist can create a facial approximation in a number of ways to include 2D (drawings), 3D (sculptures) and other methods using new computer technology. Forensic artists generally can add greater character and make their subjects come back to "life".
  • 1.6K
  • 25 Oct 2022
  • Page
  • of
  • 48
Academic Video Service