Topic Review
Iterared Skew Polynomial Rings
Skew polynomial rings used to be, especially during the 1970’s and 1980’s, a popular topic of the modern abstract Algebra with great theoretical interest. The researchers’ attention about them has renewed recently, due to the important applications that they have found to the study of Quantum Groups and to Cryptography. The present work studies a special class of iterated skew polynomial rings over a ring R, defined with respect to a finite set of pairwise commuting derivations of R.
  • 841
  • 17 Dec 2020
Topic Review
Information Assurance
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest . IA is best thought of as a superset of information security (i.e. umbrella term), and as the business outcome of information risk management.
  • 841
  • 21 Nov 2022
Topic Review
Background of Network Function Virtualization
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform.
  • 839
  • 14 Jul 2022
Topic Review
Face Recognition in Preschool Children
Most face datasets target adults who can make their own decisions. In the case of children, consent from parents or guardians is necessary to collect biometric information, thus making it very difficult. As a result, the amount of data on children is quite small and inevitably private. 
  • 839
  • 29 Aug 2022
Topic Review
IoT and Machine Learning
Machine learning (ML) is a powerful tool that delivers insights hidden in Internet of Things (IoT) data. These hybrid technologies work smartly to improve the decision-making process in different areas such as education, security, business, and the healthcare industry. ML empowers the IoT to demystify hidden patterns in bulk data for optimal prediction and recommendation systems. Healthcare has embraced IoT and ML so that automated machines make medical records, predict disease diagnoses, and, most importantly, conduct real-time monitoring of patients. Individual ML algorithms perform differently on different datasets. Due to the predictive results varying, this might impact the overall results. The variation in prediction results looms large in the clinical decision-making process. Therefore, it is essential to understand the different ML algorithms used to handle IoT data in the healthcare sector.
  • 838
  • 16 Jun 2021
Topic Review
Nouveau
nouveau (/nuːˈvoʊ/) is a free and open-source graphics device driver for Nvidia video cards and the Tegra family of SoCs written by independent software engineers, with minor help from Nvidia employees. The project's goal is to create an open source driver by reverse engineering Nvidia's proprietary Linux drivers. It is managed by the X.Org Foundation, hosted by freedesktop.org, and is distributed as part of Mesa 3D. The project was initially based on the 2D-only free and open-source "nv" driver, which Red Hat developer Matthew Garrett and others claim had been obfuscated. nouveau is licensed under the MIT License. The name of the project comes from the French word nouveau, meaning new. It was suggested by the original author, Stéphane Marchesin, after his IRC client's French-language autocorrect system offered the word "nouveau" as a correction for the letters "nv".
  • 838
  • 15 Nov 2022
Topic Review
OS-Level Virtualisation
OS-level virtualization refers to an operating system paradigm in which the kernel allows the existence of multiple isolated user-space instances. Such instances, called containers (Solaris, Docker), Zones (Solaris), virtual private servers (OpenVZ), partitions, virtual environments (VEs), virtual kernel (DragonFly BSD) or jails (FreeBSD jail or chroot jail), may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside of a container can only see the container's contents and devices assigned to the container. On Unix-like operating systems, this feature can be seen as an advanced implementation of the standard chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides resource-management features to limit the impact of one container's activities on other containers. The term "container," while most popularly referring to OS-level virtualization systems, is sometimes ambiguously used to refer to fuller virtual machine environments operating in varying degrees of concert with the host OS, e.g. Microsoft's "Hyper-V Containers."
  • 836
  • 20 Oct 2022
Topic Review
MLT (Hacktivist)
MLT, real name Matt Telfer, is a former grey hat computer hacker and member of TeaMp0isoN. MLT was arrested in May 2012 in relation to his activities within TeaMp0isoN, a computer-hacking group which claimed responsibility for many high-profile attacks, including website defacements of the United Nations , Facebook, NATO, BlackBerry, T-Mobile USA and several other large sites in addition to high-profile denial-of-service attacks and leaks of confidential data.
  • 836
  • 18 Nov 2022
Topic Review
Impression
Impression is a desktop publishing application for RISC OS systems. It was developed by Computer Concepts and initially made available in pre-release form during 1989, having been demonstrated in February 1989 at the Which? Computer Show and subsequently announced as being available from June 1989. The "completed" version was eventually delivered on 18th January 1990. Originally, the application appears to have been developed for Acorn's then-current operating system, Arthur, as a ROM-based product, but due to dissatisfaction with the state of Arthur during early development of the application, it was then meant to use Computer Concepts' own operating system, Impulse, instead. (Publicity images for the software depict a different operating environment to RISC OS.)
  • 835
  • 20 Oct 2022
Topic Review
Quietism
Quietism in philosophy sees the role of philosophy as broadly therapeutic or remedial. Quietist philosophers believe that philosophy has no positive thesis to contribute, but rather that its value is in defusing confusions in the linguistic and conceptual frameworks of other subjects, including non-quietist philosophy. For quietists, advancing knowledge or settling debates (particularly those between realists and non-realists) is not the job of philosophy, rather philosophy should liberate the mind by diagnosing confusing concepts.
  • 832
  • 17 Nov 2022
Topic Review
Simulation of Sunspot Cycles
Numerous systems in nature exhibit oscillatory dynamics suggesting common underlying processes. Without knowing an exact interacting mechanism, predictive modelling applied to known count data of a system can provide a non-statistical solution defining its evolution. A recursive difference equation is used to describe the evolution of sunspots and solar cycles in the discrete time domain. Sunspot count for solar cycle 21 is pulse-like over an 11-year period, definable by the product of a pair of growth and decay logistic difference equations. Oscillatory behaviour of multiple solar cycles 22 to 24 up to 2010 are modelled by stabilizing a delayed logistic difference equation.
  • 830
  • 28 Sep 2021
Topic Review
Turbo
Turbo (formerly Spoon and Xenocode) is a set of software products and services developed by the Code Systems Corporation for application virtualization, portable application creation, and digital distribution. Code Systems Corporation is an American corporation headquartered in Seattle, Washington (state) , and is best known for its Turbo products that include Browser Sandbox, Turbo Studio, TurboServer, and Turbo. Kenji Obata founded Code Systems Corporation in 2006 and introduced Turbo’s precursor, Xenocode. Xenocode was an early application virtualization engine for the Windows platform. Obata serves as the CEO of the corporation, which had become commonly known as Spoon since a rebranding in 2010. Turbo’s tools package conventional software applications for Microsoft Windows in a portable application format that can be delivered via a single executable or streamed over the web. Files and settings automatically synchronize across devices via Turbo’s patented virtualization technology which allows access to local files and printers from web-based applications.
  • 830
  • 09 Nov 2022
Topic Review
GNU Build System
The GNU Build System, also known as the Autotools, is a suite of programming tools designed to assist in making source code packages portable to many Unix-like systems. It can be difficult to make a software program portable: the C compiler differs from system to system; certain library functions are missing on some systems; header files may have different names. One way to handle this is to write conditional code, with code blocks selected by means of preprocessor directives (#ifdef); but because of the wide variety of build environments this approach quickly becomes unmanageable. Autotools is designed to address this problem more manageably. Autotools is part of the GNU toolchain and is widely used in many free software and open source packages. Its component tools are free software-licensed under the GNU General Public License with special license exceptions permitting its use with proprietary software. The GNU Build System makes it possible to build many programs using a two-step process: configure followed by make.
  • 829
  • 20 Oct 2022
Topic Review
Transport Layer Security Security
This article discusses the security of the Transport Layer Security (TLS) internet protocol.
  • 829
  • 27 Oct 2022
Topic Review
Health Risk Assessment
A health risk assessment (also referred to as a health risk appraisal and health & well-being assessment) is a questionnaire about a person's medical history, demographic characteristics and lifestyle. It is one of the most widely used screening tools in the field of health promotion and is often the first step in multi-component health promotion programs.
  • 828
  • 07 Nov 2022
Topic Review
Mojikyō
Conceptualized in 1996, the first version of the CD-ROM was released in July 1997. For a time, the Mojikyō Institute also offered a web subscription, termed "Mojikyō WEB" (文字鏡WEB), which had more up-to-date characters. (As of September 2006), Mojikyō encoded 174,975 characters. Among those, 150,366 characters ([math]\displaystyle{ \approx }[/math]86%) then belonged to the extended Chinese–Japanese–Korean–Vietnamese (CJKV)[note 2] family. Many of Mojikyō's characters are considered obsolete or obscure, and are not encoded by any other character set, including the most widely used international text encoding standard, Unicode. Originally a paid proprietary software product, as of 2015, the Mojikyō Institute began to upload its latest releases to Internet Archive as freeware, as a memorial to honor one of its developers, Tokio Furuya (古家時雄), who died that year. On December 15, 2018, version 4.0 was released. The next day, Ishikawa announced that without Furuya this would be the final release of Mojikyō.
  • 822
  • 09 Oct 2022
Topic Review
Hybrid Blockchains
A hybrid blockchain is often advocated where multiple parties, trust, data access management and sharing, friction, regulations and a combination of centralization and decentralization is involved. A hybrid blockchain is also used by entities that need the benefits of both the public and private characteristics, which can be achieved using Interchain, bridges or other interoperability solutions between legacy systems and blockchains, both public or private. Private, public, consortium and permissioned blockchains all have their own setbacks and benefits. Entities that do not want to expose sensitive business data to the internet are limited to private blockchains. Entities looking for no access restrictions at all can leverage public blockchains like Bitcoin or Ethereum. The hybrid blockchain ensures sensitive business data stays private on business nodes unless permitted. It also validates the hash of the private transactions through consensus algorithms and even public checkpoints such as Bitcoin and Ethereum. Through Interchain, the hash of a private transaction can be placed on the Bitcoin network or any other public blockchain such as Ethereum, making an immutable record of the event with the benefit of a public blockchain’s hash power.
  • 822
  • 11 Oct 2022
Topic Review
Acute and Obtuse Triangles
An acute triangle (or acute-angled triangle) is a triangle with three acute angles (less than 90°). An obtuse triangle (or obtuse-angled triangle) is a triangle with one obtuse angle (greater than 90°) and two acute angles. Since a triangle's angles must sum to 180° in Euclidean geometry, no Euclidean triangle can have more than one obtuse angle. Acute and obtuse triangles are the two different types of oblique triangles — triangles that are not right triangles because they have no 90° angle.
  • 822
  • 24 Oct 2022
Topic Review
Windows 10 Version History (Version 2004)
The Windows 10 May 2020 Update (also known as version 2004 and codenamed "20H1") is the ninth major update to Windows 10. It carries the build number 10.0.19041.
  • 820
  • 17 Oct 2022
Topic Review
Conceptual Interoperability
Conceptual interoperability is a concept in simulation theory. However, it is broadly applicable for other model-based information technology domains. From the early ideas of Harkrider and Lunceford, simulation composability has been studied in more detail. Petty and Weisel formulated the current working definition: "Composability is the capability to select and assemble simulation components in various combinations into simulation systems to satisfy specific user requirements. The defining characteristic of composability is the ability to combine and recombine components into different simulation systems for different purposes." A recent RAND study provided a coherent overview of the state of composability for military simulation systems within the U.S. Department of Defense; many of its findings have much broader applicability.
  • 816
  • 25 Oct 2022
  • Page
  • of
  • 47
ScholarVision Creations