You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Topic Review
MLT (Hacktivist)
MLT, real name Matt Telfer, is a former grey hat computer hacker and member of TeaMp0isoN. MLT was arrested in May 2012 in relation to his activities within TeaMp0isoN, a computer-hacking group which claimed responsibility for many high-profile attacks, including website defacements of the United Nations , Facebook, NATO, BlackBerry, T-Mobile USA and several other large sites in addition to high-profile denial-of-service attacks and leaks of confidential data.
  • 1.0K
  • 18 Nov 2022
Topic Review
Heterogeneous Relation
In mathematics, a heterogeneous relation is a binary relation, a subset of a Cartesian product A × B, where A and B are distinct sets. The prefix hetero is from the Greek ἕτερος (heteros, "other, another, different"). A heterogeneous relation has been called a rectangular relation, suggesting that it does not have the square-symmetry of a homogeneous relation on a set where A = B. Commenting on the development of binary relations beyond homogeneous relations, researchers wrote, "...a variant of the theory has evolved that treats relations from the very beginning as heterogeneous or rectangular, i.e. as relations where the normal case is that they are relations between different sets." Developments in algebraic logic have facilitated usage of binary relations. The calculus of relations includes the algebra of sets, extended by composition of relations and the use of converse relations. The inclusion R ⊆ S, meaning that aRb implies aSb, sets the scene in a lattice of relations. But since [math]\displaystyle{ P \subseteq Q \equiv (P \cap \bar{Q} = \varnothing ) \equiv (P \cap Q = P), }[/math] the inclusion symbol is superfluous. Nevertheless, composition of relations and manipulation of the operators according to Schröder rules, provides a calculus to work in the power set of A × B. In contrast to homogeneous relations, the composition of relations operation is only a partial function. The necessity of matching range to domain of composed relations has led to the suggestion that the study of heterogeneous relations is a chapter of category theory as in the category of sets, except that the morphisms of this category are relations. The objects of the category Rel are sets, and the relation-morphisms compose as required in a category.
  • 1.0K
  • 21 Nov 2022
Topic Review
OpenCog
OpenCog is a project that aims to build an open source artificial intelligence framework. OpenCog Prime is an architecture for robot and virtual embodied cognition that defines a set of interacting components designed to give rise to human-equivalent artificial general intelligence (AGI) as an emergent phenomenon of the whole system. OpenCog Prime's design is primarily the work of Ben Goertzel while the OpenCog framework is intended as a generic framework for broad-based AGI research. Research utilizing OpenCog has been published in journals and presented at conferences and workshops including the annual Conference on Artificial General Intelligence. OpenCog is released under the terms of the GNU Affero General Public License. OpenCog is in use by more than 50 companies, including Huawei and Cisco.
  • 1.0K
  • 28 Oct 2022
Topic Review
Local Zeta-Function
In number theory, the local zeta function Z(V, s) (sometimes called the congruent zeta function) is defined as where Nm is the number of points of V defined over the mth cyclotomic field extension Fqm of Fq, and V is a non-singular n-dimensional projective algebraic variety over the field Fq with q elements. By the variable transformation u = q−s, then it is defined by as the formal power series of the variable [math]\displaystyle{ u }[/math]. Equivalently, the local zeta function sometimes is defined as follows: In other word, the local zeta function Z(V, u) with coefficients in the finite field Fq is defined as a function whose logarithmic derivative generates the numbers Nm of the solutions of equation, defining V, in the m degree extension Fqm.
  • 1.0K
  • 21 Oct 2022
Topic Review
2D Filters
Two dimensional filters have seen substantial development effort due to their importance and high applicability across several domains. In the 2-D case the situation is quite different from the 1-D case, because the multi-dimensional polynomials cannot in general be factored. This means that an arbitrary transfer function cannot generally be manipulated into a form required by a particular implementation. The input-output relationship of a 2-D IIR filter obeys a constant-coefficient linear partial difference equation from which the value of an output sample can be computed using the input samples and previously computed output samples. Because the values of the output samples are fed back, the 2-D filter, like its 1-D counterpart, can be unstable.
  • 1.0K
  • 26 Oct 2022
Topic Review
Personally Identifiable Information
Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. The abbreviation PII is widely accepted in the U.S. context, but the phrase it abbreviates has four common variants based on personal / personally, and identifiable / identifying. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used. (In other countries with privacy protection laws derived from the OECD privacy principles, the term used is more often "personal information", which may be somewhat broader: in Australia's Privacy Act 1988 (Cth) "personal information" also includes information from which the person's identity is "reasonably ascertainable", potentially covering some information not covered by PII.) Under European and other data protection regimes, which centre primarily around the General Data Protection Regulation, the term "personal data" is significantly broader, and determines the scope of the regulatory regime. NIST Special Publication 800-122 defines PII as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." So, for example, a user's IP address is not classed as PII on its own, but is classified as linked PII. The concept of PII has become prevalent as information technology and the Internet have made it easier to collect PII leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts. As a response to these threats, many website privacy policies specifically address the gathering of PII, and lawmakers have enacted a series of legislation to limit the distribution and accessibility of PII. However, PII is a legal concept, not a technical concept, and as noted, it is not utilised in all jurisdictions. Because of the versatility and power of modern re-identification algorithms, the absence of PII data does not mean that the remaining data does not identify individuals. While some attributes may not be uniquely identifying on their own, any attribute can be potentially identifying in combination with others. These attributes have been referred to as quasi-identifiers or pseudo-identifiers. While such data may not constitute PII in the United States, it is highly likely to remain personal data under European data protection law.
  • 1.0K
  • 03 Nov 2022
Topic Review
Yuktibhāṣā
Yuktibhāṣā (Malayalam: യുക്തിഭാഷ, lit. 'Rationale'), also known as Gaṇita-yukti-bhāṣā:xxi and Gaṇitanyāyasaṅgraha (Compendium of Astronomical Rationale), is a major treatise on mathematics and astronomy, written by the India n astronomer Jyesthadeva of the Kerala school of mathematics around 1530. The treatise, written in Malayalam, is a consolidation of the discoveries by Madhava of Sangamagrama, Nilakantha Somayaji, Parameshvara, Jyeshtadeva, Achyuta Pisharati, and other astronomer-mathematicians of the Kerala school. It also exists in a Sanskrit version, with unclear author and date, composed as a rough translation of the Malayalam original. The work contains proofs and derivations of the theorems that it presents. Modern historians used to assert, based on the works of Indian mathematics that first became available, that early Indian scholars in astronomy and computation lacked in proofs, but Yuktibhāṣā demonstrates otherwise. Some of its important topics include the infinite series expansions of functions; power series, including of π and π/4; trigonometric series of sine, cosine, and arctangent; Taylor series, including second and third order approximations of sine and cosine; radii, diameters and circumferences; and tests of convergence. Yuktibhāṣā mainly gives rationale for the results in Nilakantha's Tantra Samgraha. It is considered an early text on the ideas of calculus, predating Newton and Leibniz by centuries. The treatise was largely unnoticed outside India, as it was written in the local language of Malayalam. In modern times, due to wider international cooperation in mathematics, the wider world has taken notice of the work. For example, both Oxford University and the Royal Society of Great Britain have given attribution to pioneering mathematical theorems of Indian origin that predate their Western counterparts.
  • 1.0K
  • 21 Nov 2022
Topic Review
Conceptual Interoperability
Conceptual interoperability is a concept in simulation theory. However, it is broadly applicable for other model-based information technology domains. From the early ideas of Harkrider and Lunceford, simulation composability has been studied in more detail. Petty and Weisel formulated the current working definition: "Composability is the capability to select and assemble simulation components in various combinations into simulation systems to satisfy specific user requirements. The defining characteristic of composability is the ability to combine and recombine components into different simulation systems for different purposes." A recent RAND study provided a coherent overview of the state of composability for military simulation systems within the U.S. Department of Defense; many of its findings have much broader applicability.
  • 995
  • 25 Oct 2022
Topic Review
Comparison of Metadata Editors
This article presents a comparison of digital image metadata viewers and metadata editors. A metadata editor is a computer program that allows users to view and edit metadata tags interactively on the computer screen and save them in the graphics file. Usually a metadata viewer is preferred over a metadata editor for viewing tags. A number of metadata editors for various platforms exist. Users choose among them based on factors such as the availability for the user's platform, the feature set and usability of the user interface (UI). The Metadata Working Group (MWG) is a consortium of leading companies in the digital media industry. The MWG publishes technical specifications that describe how to effectively store metadata into digital media files. These royalty-free specifications are made available to software developers, manufacturers and service providers so that they may create products that use metadata in a consistent way, and that allow consumers to better describe, organize and find their media. Where possible, these specifications rely on existing standards, and aim to create a unified and cohesive approach to applying these standards.
  • 995
  • 20 Oct 2022
Topic Review
GNU Build System
The GNU Build System, also known as the Autotools, is a suite of programming tools designed to assist in making source code packages portable to many Unix-like systems. It can be difficult to make a software program portable: the C compiler differs from system to system; certain library functions are missing on some systems; header files may have different names. One way to handle this is to write conditional code, with code blocks selected by means of preprocessor directives (#ifdef); but because of the wide variety of build environments this approach quickly becomes unmanageable. Autotools is designed to address this problem more manageably. Autotools is part of the GNU toolchain and is widely used in many free software and open source packages. Its component tools are free software-licensed under the GNU General Public License with special license exceptions permitting its use with proprietary software. The GNU Build System makes it possible to build many programs using a two-step process: configure followed by make.
  • 991
  • 20 Oct 2022
Topic Review
MEMMAKER
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 984
  • 30 Oct 2022
Topic Review
Retraction
A retraction is a public statement made about an earlier statement that withdraws, cancels, refutes, or reverses the original statement or ceases and desists from publishing the original statement.
  • 983
  • 18 Oct 2022
Topic Review
Quality Assurance Agency for Higher Education
The Quality Assurance Agency for Higher Education (QAA) is the independent body that checks on standards and quality in UK higher education. It conducts quality assessment reviews, develops reference points and guidance for providers, and conducts or commissions research on relevant issues. QAA checks how universities, colleges and alternative providers of UK higher education maintain their academic standards and quality. It does this through external peer review. Reviewers check that the 19 expectations of the Quality Code, agreed and recognised by the UK higher education sector, are met. It also provides advice to the Privy Council of the United Kingdom, on institutions' requests for degree awarding powers and the right to be called a university. In addition to its role in sustaining the reputation of UK higher education, QAA also regulates the Access to Higher Education Diploma, a qualification that enables individuals without A Levels or the usual equivalent to enter higher education. QAA works closely with other organisations that have an interest in the reputation of UK higher education, including the Higher Education Academy, Universities UK and GuildHE.
  • 983
  • 19 Oct 2022
Topic Review
Nehru Memorial Museum & Library
The Nehru Memorial Museum & Library (NMML) is a museum and library in New Delhi, India , which aims to preserve and reconstruct the history of the Indian independence movement. Housed within the Teen Murti House complex, it is an autonomous institution under the Indian Ministry of Culture, and was founded in 1964 after the death of India's first prime minister, Jawaharlal Nehru. It aims to foster academic research on modern and contemporary history. Today, the Nehru Memorial Library is the world’s leading resource centre on India’s first prime minister. Its archives contain the bulk of Mahatma Gandhi's writings, as well as private papers of C. Rajagopalachari, B. C. Roy, Jayaprakash Narayan, Charan Singh, Sarojini Naidu and Rajkumari Amrit Kaur. In March 2010 it launched a digitization project of its archives, and by June 2011, 867,000 pages of manuscripts and 29,807 photographs had been scanned and 500,000 pages had been uploaded on the digital library website. Amongst noted publications of the NMML are Selected Works of Jawaharlal Nehru, Man of Destiny by Ruskin Bond, Nehru Anthology (1980) and Nehru Anthology. Nehru Memorial Museum & Library has over the years supported scholars and historians across India. Through its fellowship programme, the Nehru Memorial Fellowship, it has funded some of India’s best academics such as Chief Information Commissioner OP Kejriwal. It is also one of the best libraries in Delhi for the social sciences as it has a huge collection on labour related issues in the form of PhD dissertations, reports, books, journals and news papers. On 26 April 2016 a dagger gifted to former prime minister Jawaharlal Nehru by Saudi Arabia was stolen from the Nehru Memorial Museum and Library.
  • 980
  • 11 Nov 2022
Topic Review
Inventory (Library)
Inventories are the one method that libraries use to determine whether some items in their collection are in need of preservation or conservation activities. A modern inventory might involve examining item by item with a barcode scanner and a laptop, with the objective of adjusting bibliographic and item records in theirs and OCLC's WorldCat databases. Using a laptop and handheld bar code reader will “reduce human error and inconsistencies, while helping to maintain staff concentration and enthusiasm for the project”. Print materials in the digital age, though dramatically decreased in size compared to e-print materials, are still valuable components of a library's collection. Increasing print material's accessibility, and reducing user frustration, make the inventory process an effective tool in improving library service quality. “When library users are unable to find materials in the expected locations, they lose confidence in the library catalog as well as in the library itself”. Missing or mislabeled books have a direct impact on the quality of library services. Maintaining the stacks through inventories and shelf reading can mitigate staff time lost searching for missing or mislabeled items. Libraries have thousands of books; large academic libraries may have millions of books;. Doing an annual (or less frequent) physical inventory with the laying on of hands on each individual item may not be practical for several reasons. It may not be financially feasible, employees required may not have extra time to devote to such an inventory, and there are no financial rewards for the Library for completing an inventory. Problems that are discovered (books in need of repurchase, rebinding, repair, or digitization) may require solutions that are expensive and labor-intensive. Because of these restraints, inventories may not take place for decades, if ever, at large academic institutions. By contrast, complete inventories are often a regular part of the school library media specialist's job at K-12 institutions, where inventory may be a legal requirement that shows that the libraries are accountable for the money they have spent throughout the year. Checking for lost books and materials can be similarly compared to auditing. However, there are alternative options to performing a complete inventory, such as performing a selective inventory. Selective inventory can be performed by circumstance or by data prediction. Physical space is a premium in libraries. Inventorying mini collections before relocating them to their new location presents the library with an opportunity to perform a selective inventory project. An alternative to opportunistic selective inventory projects is Kohl's (1982) assertion that circulation statistics, book search statistics, and ILL statistics can be useful tools in identifying areas as possible selective inventory areas. He writes, “areas in need of an inventory can be identified through the use of predictive data”. Once the objectives for accuracy and methods of measuring have been established “the criteria need to be quantified. An overall measure of the inventory accuracy should be maintained as a management key performance indicator”.
  • 977
  • 01 Nov 2022
Topic Review
Java Transaction API
The Java Transaction API (JTA), one of the Java Enterprise Edition (Java EE) APIs, enables distributed transactions to be done across multiple X/Open XA resources in a Java environment. JTA is a specification developed under the Java Community Process as JSR 907. JTA provides for:
  • 976
  • 05 Dec 2022
Topic Review
ID-Based Encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can encrypt a message using e.g. the text-value of the receiver's name or email address as a key. The receiver obtains its decryption key from a central authority, which needs to be trusted as it generates secret keys for every user. ID-based encryption was proposed by Adi Shamir in 1984. He was however only able to give an instantiation of identity-based signatures. Identity-based encryption remained an open problem for many years. The pairing-based Boneh–Franklin scheme and Cocks's encryption scheme based on quadratic residues both solved the IBE problem in 2001.
  • 973
  • 25 Oct 2022
Topic Review
Human-Computer Interaction Institute
The Human-Computer Interaction Institute (HCII) is a department within the School of Computer Science at Carnegie Mellon University (CMU) in Pittsburgh, Pennsylvania. It is considered one of the leading centers of human-computer interaction research, and was named one of the top ten most innovative schools in information technology by Computer World in 2008. For the past three decades, the institute has been the predominant publishing force at leading HCI venues, most notably ACM CHI, where it regularly contributes more than 10% of the papers. Research at the institute aims to understand and create technology that harmonizes with and improves human capabilities by integrating aspects of computer science, design, social science, and learning science. Depending on the selected coursework that the student decides to take (in addition to some core classes), they are able to form a schedule specific to the field they are interested in. For example, if a student is specifically interested in pursuing a user experience design profession, they are able to choose courses that focus mainly on the design process behind applications. If the student is interested in product management or project management, they can select electives that encourage group work and cross-collaboration across majors so that they may learn some of the tasks of these professions. A list of courses and course descriptions is included below. HCII offers an HCI major for undergraduates, as well a master's degree and a PhD in HCI. Students from various academic backgrounds come together from around the world to participate in these programs. Students enter the program at various stages in their academic and professional careers, with various levels of experience. HCII research and educational programs span a full cycle of value creation. The cycle includes research on how people work, play, and communicate within groups, organizations, and social structures. It includes the design, creation, and evaluation of technologies and tools to support human and social activities.
  • 971
  • 29 Sep 2022
Topic Review
Alundra 2: A New Legend Begins
Alundra 2: A New Legend Begins (アランドラ2 魔進化の謎, Arandora 2 Ma Shinka no Nazo, Alundra 2: The Mystery of Magic Evolution) is an action role-playing game developed by Matrix Software for the Sony PlayStation. It was published by SCEI in Japan and Activision worldwide. Unlike its predecessor, Alundra, Alundra 2 features a 3D look which opens up a new world of puzzles. Also, despite its title, Alundra 2 is a standalone sequel, and has no ties with the original. It has a whole new story with a different set of characters, including the main character, Flint. Compared to the darker storyline of Alundra, Alundra 2 has a more light-hearted storyline.
  • 970
  • 03 Nov 2022
Topic Review
Web-Based Serious Games and Accessibility
The entries consolidate the main concepts about serious web-based games; the characterization of serious games, accessibility, accessibility guidelines and types of disabilities, and the findings found after reviewing the literature.
  • 969
  • 18 Nov 2020
  • Page
  • of
  • 47
Academic Video Service