You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
All
Title
Keyword
Contributor
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
Autonomous Vehicles and Urban Transport
Autonomous driving is a technological innovation that involves the use of Artificial Intelligence (AI) in the automotive area, representing the future of transport and whose applications will influence the concept of driving and many other features of modern society. Indeed, the introduction of Autonomous Vehicles (AVs) on the market, along with the development of related technologies, will have a potential impact not only on the automotive industry but also on urban transport systems. New mobility-related businesses will emerge, whereas existing ones will have to adapt to changes.
1.0K
05 May 2021
Topic Review
Parisoma
Coordinates: 37°46′24.89″N 122°24′57.19″W / 37.7735806°N 122.4158861°W / 37.7735806; -122.4158861 Parisoma (/ˈpærɪˈsoʊmə/) is a coworking space and open incubator in the SoMa district of San Francisco founded and managed by the firm Fabernovel. In addition to providing shared work space to approximately 120 members, it also hosts events and classes related to design, business, technology, and entrepreneurship.
1.0K
22 Nov 2022
Topic Review
MLT (Hacktivist)
MLT, real name Matt Telfer, is a former grey hat computer hacker and member of TeaMp0isoN. MLT was arrested in May 2012 in relation to his activities within TeaMp0isoN, a computer-hacking group which claimed responsibility for many high-profile attacks, including website defacements of the United Nations , Facebook, NATO, BlackBerry, T-Mobile USA and several other large sites in addition to high-profile denial-of-service attacks and leaks of confidential data.
1.0K
18 Nov 2022
Topic Review
Nominet UK
Nominet UK is the .uk domain name registry in the United Kingdom , which was founded by Dr Willie Black and five others on 14 May 1996 when its predecessor, the "Naming Committee" was unable to deal with the volume of registrations then being sought under the .uk domain. Nominet is a non-profit company limited by guarantee. It has members who act as shareholders, but without the right to participate in the profits of the company. Anyone can become a member, but most members are internet service providers who are also registrars. As one of the first professional ccTLD operators, Nominet became the model for many other operators worldwide. Customers wishing to register a domain do not approach Nominet directly but register the domain via a domain registrar – a business entity authorised by Nominet to register and manage .uk domains on behalf of customers. Registrars for .uk domains were formerly known as "tagholders". As of 2019, the .uk register held over 12,000,000 .uk domain names, making it the fourth largest ccTLD in the world. Nominet also deals with disputes about registrations of .uk domain names, via its Dispute Resolution Service (DRS) which is similar to the UDRP system used for generic Top Level Domain Names, but with certain innovations such as a free mediation service. Nominet, which operates the .uk domain, has launched a charitable foundation, the Nominet Trust, funded with Nominet grants.
1.0K
23 Nov 2022
Topic Review
Conceptual Interoperability
Conceptual interoperability is a concept in simulation theory. However, it is broadly applicable for other model-based information technology domains. From the early ideas of Harkrider and Lunceford, simulation composability has been studied in more detail. Petty and Weisel formulated the current working definition: "Composability is the capability to select and assemble simulation components in various combinations into simulation systems to satisfy specific user requirements. The defining characteristic of composability is the ability to combine and recombine components into different simulation systems for different purposes." A recent RAND study provided a coherent overview of the state of composability for military simulation systems within the U.S. Department of Defense; many of its findings have much broader applicability.
1.0K
25 Oct 2022
Topic Review
Local Zeta-Function
In number theory, the local zeta function Z(V, s) (sometimes called the congruent zeta function) is defined as where Nm is the number of points of V defined over the mth cyclotomic field extension Fqm of Fq, and V is a non-singular n-dimensional projective algebraic variety over the field Fq with q elements. By the variable transformation u = q−s, then it is defined by as the formal power series of the variable [math]\displaystyle{ u }[/math]. Equivalently, the local zeta function sometimes is defined as follows: In other word, the local zeta function Z(V, u) with coefficients in the finite field Fq is defined as a function whose logarithmic derivative generates the numbers Nm of the solutions of equation, defining V, in the m degree extension Fqm.
1.0K
21 Oct 2022
Topic Review
2D Filters
Two dimensional filters have seen substantial development effort due to their importance and high applicability across several domains. In the 2-D case the situation is quite different from the 1-D case, because the multi-dimensional polynomials cannot in general be factored. This means that an arbitrary transfer function cannot generally be manipulated into a form required by a particular implementation. The input-output relationship of a 2-D IIR filter obeys a constant-coefficient linear partial difference equation from which the value of an output sample can be computed using the input samples and previously computed output samples. Because the values of the output samples are fed back, the 2-D filter, like its 1-D counterpart, can be unstable.
1.0K
26 Oct 2022
Topic Review
Personally Identifiable Information
Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. The abbreviation PII is widely accepted in the U.S. context, but the phrase it abbreviates has four common variants based on personal / personally, and identifiable / identifying. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used. (In other countries with privacy protection laws derived from the OECD privacy principles, the term used is more often "personal information", which may be somewhat broader: in Australia's Privacy Act 1988 (Cth) "personal information" also includes information from which the person's identity is "reasonably ascertainable", potentially covering some information not covered by PII.) Under European and other data protection regimes, which centre primarily around the General Data Protection Regulation, the term "personal data" is significantly broader, and determines the scope of the regulatory regime. NIST Special Publication 800-122 defines PII as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." So, for example, a user's IP address is not classed as PII on its own, but is classified as linked PII. The concept of PII has become prevalent as information technology and the Internet have made it easier to collect PII leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts. As a response to these threats, many website privacy policies specifically address the gathering of PII, and lawmakers have enacted a series of legislation to limit the distribution and accessibility of PII. However, PII is a legal concept, not a technical concept, and as noted, it is not utilised in all jurisdictions. Because of the versatility and power of modern re-identification algorithms, the absence of PII data does not mean that the remaining data does not identify individuals. While some attributes may not be uniquely identifying on their own, any attribute can be potentially identifying in combination with others. These attributes have been referred to as quasi-identifiers or pseudo-identifiers. While such data may not constitute PII in the United States, it is highly likely to remain personal data under European data protection law.
1.0K
03 Nov 2022
Topic Review
Comparison of Metadata Editors
This article presents a comparison of digital image metadata viewers and metadata editors. A metadata editor is a computer program that allows users to view and edit metadata tags interactively on the computer screen and save them in the graphics file. Usually a metadata viewer is preferred over a metadata editor for viewing tags. A number of metadata editors for various platforms exist. Users choose among them based on factors such as the availability for the user's platform, the feature set and usability of the user interface (UI). The Metadata Working Group (MWG) is a consortium of leading companies in the digital media industry. The MWG publishes technical specifications that describe how to effectively store metadata into digital media files. These royalty-free specifications are made available to software developers, manufacturers and service providers so that they may create products that use metadata in a consistent way, and that allow consumers to better describe, organize and find their media. Where possible, these specifications rely on existing standards, and aim to create a unified and cohesive approach to applying these standards.
998
20 Oct 2022
Topic Review
GNU Build System
The GNU Build System, also known as the Autotools, is a suite of programming tools designed to assist in making source code packages portable to many Unix-like systems. It can be difficult to make a software program portable: the C compiler differs from system to system; certain library functions are missing on some systems; header files may have different names. One way to handle this is to write conditional code, with code blocks selected by means of preprocessor directives (#ifdef); but because of the wide variety of build environments this approach quickly becomes unmanageable. Autotools is designed to address this problem more manageably. Autotools is part of the GNU toolchain and is widely used in many free software and open source packages. Its component tools are free software-licensed under the GNU General Public License with special license exceptions permitting its use with proprietary software. The GNU Build System makes it possible to build many programs using a two-step process: configure followed by make.
994
20 Oct 2022
Topic Review
MEMMAKER
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
991
30 Oct 2022
Topic Review
Quality Assurance Agency for Higher Education
The Quality Assurance Agency for Higher Education (QAA) is the independent body that checks on standards and quality in UK higher education. It conducts quality assessment reviews, develops reference points and guidance for providers, and conducts or commissions research on relevant issues. QAA checks how universities, colleges and alternative providers of UK higher education maintain their academic standards and quality. It does this through external peer review. Reviewers check that the 19 expectations of the Quality Code, agreed and recognised by the UK higher education sector, are met. It also provides advice to the Privy Council of the United Kingdom, on institutions' requests for degree awarding powers and the right to be called a university. In addition to its role in sustaining the reputation of UK higher education, QAA also regulates the Access to Higher Education Diploma, a qualification that enables individuals without A Levels or the usual equivalent to enter higher education. QAA works closely with other organisations that have an interest in the reputation of UK higher education, including the Higher Education Academy, Universities UK and GuildHE.
990
19 Oct 2022
Topic Review
Inventory (Library)
Inventories are the one method that libraries use to determine whether some items in their collection are in need of preservation or conservation activities. A modern inventory might involve examining item by item with a barcode scanner and a laptop, with the objective of adjusting bibliographic and item records in theirs and OCLC's WorldCat databases. Using a laptop and handheld bar code reader will “reduce human error and inconsistencies, while helping to maintain staff concentration and enthusiasm for the project”. Print materials in the digital age, though dramatically decreased in size compared to e-print materials, are still valuable components of a library's collection. Increasing print material's accessibility, and reducing user frustration, make the inventory process an effective tool in improving library service quality. “When library users are unable to find materials in the expected locations, they lose confidence in the library catalog as well as in the library itself”. Missing or mislabeled books have a direct impact on the quality of library services. Maintaining the stacks through inventories and shelf reading can mitigate staff time lost searching for missing or mislabeled items. Libraries have thousands of books; large academic libraries may have millions of books;. Doing an annual (or less frequent) physical inventory with the laying on of hands on each individual item may not be practical for several reasons. It may not be financially feasible, employees required may not have extra time to devote to such an inventory, and there are no financial rewards for the Library for completing an inventory. Problems that are discovered (books in need of repurchase, rebinding, repair, or digitization) may require solutions that are expensive and labor-intensive. Because of these restraints, inventories may not take place for decades, if ever, at large academic institutions. By contrast, complete inventories are often a regular part of the school library media specialist's job at K-12 institutions, where inventory may be a legal requirement that shows that the libraries are accountable for the money they have spent throughout the year. Checking for lost books and materials can be similarly compared to auditing. However, there are alternative options to performing a complete inventory, such as performing a selective inventory. Selective inventory can be performed by circumstance or by data prediction. Physical space is a premium in libraries. Inventorying mini collections before relocating them to their new location presents the library with an opportunity to perform a selective inventory project. An alternative to opportunistic selective inventory projects is Kohl's (1982) assertion that circulation statistics, book search statistics, and ILL statistics can be useful tools in identifying areas as possible selective inventory areas. He writes, “areas in need of an inventory can be identified through the use of predictive data”. Once the objectives for accuracy and methods of measuring have been established “the criteria need to be quantified. An overall measure of the inventory accuracy should be maintained as a management key performance indicator”.
988
01 Nov 2022
Topic Review
Nehru Memorial Museum & Library
The Nehru Memorial Museum & Library (NMML) is a museum and library in New Delhi, India , which aims to preserve and reconstruct the history of the Indian independence movement. Housed within the Teen Murti House complex, it is an autonomous institution under the Indian Ministry of Culture, and was founded in 1964 after the death of India's first prime minister, Jawaharlal Nehru. It aims to foster academic research on modern and contemporary history. Today, the Nehru Memorial Library is the world’s leading resource centre on India’s first prime minister. Its archives contain the bulk of Mahatma Gandhi's writings, as well as private papers of C. Rajagopalachari, B. C. Roy, Jayaprakash Narayan, Charan Singh, Sarojini Naidu and Rajkumari Amrit Kaur. In March 2010 it launched a digitization project of its archives, and by June 2011, 867,000 pages of manuscripts and 29,807 photographs had been scanned and 500,000 pages had been uploaded on the digital library website. Amongst noted publications of the NMML are Selected Works of Jawaharlal Nehru, Man of Destiny by Ruskin Bond, Nehru Anthology (1980) and Nehru Anthology. Nehru Memorial Museum & Library has over the years supported scholars and historians across India. Through its fellowship programme, the Nehru Memorial Fellowship, it has funded some of India’s best academics such as Chief Information Commissioner OP Kejriwal. It is also one of the best libraries in Delhi for the social sciences as it has a huge collection on labour related issues in the form of PhD dissertations, reports, books, journals and news papers. On 26 April 2016 a dagger gifted to former prime minister Jawaharlal Nehru by Saudi Arabia was stolen from the Nehru Memorial Museum and Library.
988
11 Nov 2022
Topic Review
Retraction
A retraction is a public statement made about an earlier statement that withdraws, cancels, refutes, or reverses the original statement or ceases and desists from publishing the original statement.
987
18 Oct 2022
Topic Review
ID-Based Encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can encrypt a message using e.g. the text-value of the receiver's name or email address as a key. The receiver obtains its decryption key from a central authority, which needs to be trusted as it generates secret keys for every user. ID-based encryption was proposed by Adi Shamir in 1984. He was however only able to give an instantiation of identity-based signatures. Identity-based encryption remained an open problem for many years. The pairing-based Boneh–Franklin scheme and Cocks's encryption scheme based on quadratic residues both solved the IBE problem in 2001.
980
25 Oct 2022
Topic Review
Java Transaction API
The Java Transaction API (JTA), one of the Java Enterprise Edition (Java EE) APIs, enables distributed transactions to be done across multiple X/Open XA resources in a Java environment. JTA is a specification developed under the Java Community Process as JSR 907. JTA provides for:
979
05 Dec 2022
Topic Review
Human-Computer Interaction Institute
The Human-Computer Interaction Institute (HCII) is a department within the School of Computer Science at Carnegie Mellon University (CMU) in Pittsburgh, Pennsylvania. It is considered one of the leading centers of human-computer interaction research, and was named one of the top ten most innovative schools in information technology by Computer World in 2008. For the past three decades, the institute has been the predominant publishing force at leading HCI venues, most notably ACM CHI, where it regularly contributes more than 10% of the papers. Research at the institute aims to understand and create technology that harmonizes with and improves human capabilities by integrating aspects of computer science, design, social science, and learning science. Depending on the selected coursework that the student decides to take (in addition to some core classes), they are able to form a schedule specific to the field they are interested in. For example, if a student is specifically interested in pursuing a user experience design profession, they are able to choose courses that focus mainly on the design process behind applications. If the student is interested in product management or project management, they can select electives that encourage group work and cross-collaboration across majors so that they may learn some of the tasks of these professions. A list of courses and course descriptions is included below. HCII offers an HCI major for undergraduates, as well a master's degree and a PhD in HCI. Students from various academic backgrounds come together from around the world to participate in these programs. Students enter the program at various stages in their academic and professional careers, with various levels of experience. HCII research and educational programs span a full cycle of value creation. The cycle includes research on how people work, play, and communicate within groups, organizations, and social structures. It includes the design, creation, and evaluation of technologies and tools to support human and social activities.
979
29 Sep 2022
Topic Review
Life Table
In actuarial science and demography, a life table (also called a mortality table or actuarial table) is a table which shows, for each age, what the probability is that a person of that age will die before their next birthday ("probability of death"). In other words, it represents the survivorship of people from a certain population. They can also be explained as a long-term mathematical way to measure a population's longevity. Tables have been created by demographers including Graunt, Reed and Merrell, Keyfitz, and Greville. There are two types of life tables used in actuarial science. The period life table represents mortality rates during a specific time period of a certain population. A cohort life table, often referred to as a generation life table, is used to represent the overall mortality rates of a certain population's entire lifetime. They must have had to be born during the same specific time interval. A cohort life table is more frequently used because it is able to make a prediction of any expected changes in mortality rates of a population in the future. This type of table also analyzes patterns in mortality rates that can be observed over time. Both of these types of life tables are created based on an actual population from the present, as well as an educated prediction of the experience of a population in the near future. In order to find the true life expectancy average, 100 years would need to pass and by then finding that data would be of no use as healthcare is continually advancing. Other life tables in historical demography may be based on historical records, although these often undercount infants and understate infant mortality, on comparison with other regions with better records, and on mathematical adjustments for varying mortality levels and life expectancies at birth. From this starting point, a number of inferences can be derived. Life tables are also used extensively in biology and epidemiology. An area that uses this tool is Social Security. It examines the mortality rates of all the people who have Social Security to decide which actions to take. The concept is also of importance in product life cycle management. All mortality tables are specific to environmental and life circumstances, and are used to probabilistically determine expected maximum age within those environmental conditions.
975
02 Nov 2022
Topic Review
Alundra 2: A New Legend Begins
Alundra 2: A New Legend Begins (アランドラ2 魔進化の謎, Arandora 2 Ma Shinka no Nazo, Alundra 2: The Mystery of Magic Evolution) is an action role-playing game developed by Matrix Software for the Sony PlayStation. It was published by SCEI in Japan and Activision worldwide. Unlike its predecessor, Alundra, Alundra 2 features a 3D look which opens up a new world of puzzles. Also, despite its title, Alundra 2 is a standalone sequel, and has no ties with the original. It has a whole new story with a different set of characters, including the main character, Flint. Compared to the darker storyline of Alundra, Alundra 2 has a more light-hearted storyline.
974
03 Nov 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Engineering
Volume 1 (2023) >>
Chief Editor:
Raffaele Barretta
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
Academic Video Service
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×
<<
11 April 2025
>>
0:00
0:05
0:10
0:15
0:20
0:25
0:30
0:35
0:40
0:45
0:50
0:55
Today
<<
11 April 2025
>>
0:00
1:00
2:00
3:00
4:00
5:00
6:00
7:00
8:00
9:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
Today
<<
April 2025
>>
Su
Mo
Tu
We
Th
Fr
Sa
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
6
7
8
9
10
Today
<<
2025
>>
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Today
<<
2020-2029
>>
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
Today
<<
11 April 2025
>>
0:00
0:05
0:10
0:15
0:20
0:25
0:30
0:35
0:40
0:45
0:50
0:55
Today
<<
11 April 2025
>>
0:00
1:00
2:00
3:00
4:00
5:00
6:00
7:00
8:00
9:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
Today
<<
April 2025
>>
Su
Mo
Tu
We
Th
Fr
Sa
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
6
7
8
9
10
Today
<<
2025
>>
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Today
<<
2020-2029
>>
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
Today