Topic Review
OpenCog
OpenCog is a project that aims to build an open source artificial intelligence framework. OpenCog Prime is an architecture for robot and virtual embodied cognition that defines a set of interacting components designed to give rise to human-equivalent artificial general intelligence (AGI) as an emergent phenomenon of the whole system. OpenCog Prime's design is primarily the work of Ben Goertzel while the OpenCog framework is intended as a generic framework for broad-based AGI research. Research utilizing OpenCog has been published in journals and presented at conferences and workshops including the annual Conference on Artificial General Intelligence. OpenCog is released under the terms of the GNU Affero General Public License. OpenCog is in use by more than 50 companies, including Huawei and Cisco.
  • 753
  • 28 Oct 2022
Topic Review
Blockchain and Energy Internet
Emergence of the Energy Internet (EI) demands restructuring of traditional electricity grids to integrate heterogeneous energy sources, distribution network management with grid intelligence and big data management. This paradigm shift is considered to be a breakthrough in the energy industry towards facilitating autonomous and decentralized grid operations while maximizing the utilization of Distributed Generation (DG). Blockchain has been identified as a disruptive technology enabler for the realization of EI to facilitate reliable, self-operated energy delivery. 
  • 751
  • 12 Aug 2021
Topic Review
Training, Test, and Validation Sets
In machine learning, the study and construction of algorithms that can learn from and make predictions on data is a common task. Such algorithms work by making data-driven predictions or decisions,:2 through building a mathematical model from input data. The data used to build the final model usually comes from multiple datasets. In particular, three data sets are commonly used in different stages of the creation of the model. The model is initially fit on a training dataset, that is a set of examples used to fit the parameters (e.g. weights of connections between neurons in artificial neural networks) of the model. The model (e.g. a neural net or a naive Bayes classifier) is trained on the training dataset using a supervised learning method (e.g. gradient descent or stochastic gradient descent). In practice, the training dataset often consist of pairs of an input vector and the corresponding "answer" vector (or scalar), which is commonly denoted as the target (or label). The current model is run with the training dataset and produces a result, which is then compared with the target, for each input vector in the training dataset. Based on the result of the comparison and the specific learning algorithm being used, the parameters of the model are adjusted. The model fitting can include both variable selection and parameter estimation. Successively, the fitted model is used to predict the responses for the observations in a second dataset called the validation dataset. The validation dataset provides an unbiased evaluation of a model fit on the training dataset while tuning the model's hyperparameters (e.g. the number of hidden units in a neural network). Validation datasets can be used for regularization by early stopping: stop training when the error on the validation dataset increases, as this is a sign of overfitting to the training dataset. This simple procedure is complicated in practice by the fact that the validation dataset's error may fluctuate during training, producing multiple local minima. This complication has led to the creation of many ad-hoc rules for deciding when overfitting has truly begun. Finally, the test dataset is a dataset used to provide an unbiased evaluation of a final model fit on the training dataset.. When the data in the test dataset has never been used in training (for example in cross-validation), the test dataset is also called a holdout dataset.
  • 751
  • 03 Nov 2022
Topic Review
Reverse DNS Lookup
In computer networks, a reverse DNS lookup or reverse DNS resolution (rDNS) is the querying technique of the Domain Name System (DNS) to determine the domain name associated with an IP address – the reverse of the usual "forward" DNS lookup of an IP address from a domain name. The process of reverse resolving of an IP address uses PTR records. rDNS involves searching domain name registry and registrar tables. This may be used to try to identify the originator’s domain name to track, for example, a spammer sending spam emails or the domain name of a computer trying to break into a firewall or someone trying to hack the system. It may also be used to determine the name of the internet service provider assigned to a particular IP address. The reverse DNS database of the Internet is rooted in the .arpa top-level domain. Although the informational RFC 1912 (Section 2.1) recommends that "every Internet-reachable host should have a name" and that "for every IP address, there should be a matching PTR record," it is not an Internet Standard requirement, and not all IP addresses have a reverse entry.
  • 751
  • 20 Nov 2022
Topic Review
Carbonite (Online Backup)
Carbonite (NASDAQ: CARB) is an online backup service, available to Windows and macOS users, that backs up documents, e-mails, music, photos, and settings. It is named after carbonite, the fictional substance used to freeze Han Solo in Star Wars: The Empire Strikes Back. It was the first such service to offer unlimited backup space for a fixed price. Previously, all online backup services were priced by the gigabyte; many other vendors have since changed to an unlimited model. Carbonite offers two separate lines of products: Carbonite Home and Home Office for individuals, families, and one- or two-person businesses; and Carbonite Small Business for businesses with three or more computers. Carbonite was named "Best Windows Backup Tool" by Lifehacker, "Labs Winner" by PC Pro, "Editor's Choice" by NextAdvisor, Hottest Boston Company by Lead411, but received only "two mice" in a MacWorld review putting it second to last.
  • 746
  • 11 Oct 2022
Topic Review
Multidimensional Filter Design and Implementation
Many concepts in one–dimensional signal processing are similar to concepts in multidimensional signal processing. However, many familiar one–dimensional procedures do not readily generalize to the multidimensional case and some important issues associated with multidimensional signals and systems do not appear in the one–dimensional special case.
  • 745
  • 10 Nov 2022
Topic Review
Completion (Algebra)
In abstract algebra, a completion is any of several related functors on rings and modules that result in complete topological rings and modules. Completion is similar to localization, and together they are among the most basic tools in analysing commutative rings. Complete commutative rings have a simpler structure than general ones, and Hensel's lemma applies to them. In algebraic geometry, a completion of a ring of functions R on a space X concentrates on a formal neighborhood of a point of X: heuristically, this is a neighborhood so small that all Taylor series centered at the point are convergent. An algebraic completion is constructed in a manner analogous to completion of a metric space with Cauchy sequences, and agrees with it in case R has a metric given by a non-Archimedean absolute value.
  • 745
  • 01 Dec 2022
Topic Review
Memristive System Based Image Processing Technology
This entry describes that recent advances of memristive system-based image processing are presented.
  • 744
  • 07 Jan 2022
Topic Review
Cinnamon
Cinnamon is a free and open-source desktop environment for the X Window System that derives from GNOME 3 but follows traditional desktop metaphor conventions. Cinnamon is the principal desktop environment of the Linux Mint distribution but is available as an optional desktop for other Linux distributions and other Unix-like operating systems as well. The development of Cinnamon began as a reaction to the April 2011 release of GNOME 3 in which the conventional desktop metaphor of GNOME 2 was abandoned in favor of GNOME Shell. Following several attempts to extend GNOME 3 such that it would suit the Linux Mint design goals, the Mint developers forked several GNOME 3 components to build an independent desktop environment. Separation from GNOME was completed in Cinnamon 2.0, which was released in October 2013. Applets and desklets are no longer compatible with GNOME 3. As the distinguishing factor of Linux Mint, Cinnamon has generally received favorable coverage by the press, in particular for its ease-of-use and gentle learning curve. With respect to its conservative design model, Cinnamon is similar to the XFCE and GNOME 2 (MATE and GNOME Flashback/Classic) desktop environments.
  • 742
  • 10 Nov 2022
Topic Review
Systems Theory in Anthropology
Systems theory in anthropology is an interdisciplinary, non-representative, non-referential, and non-Cartesian approach that brings together natural and social sciences to understand society in its complexity. The basic idea of a system theory in social science is to solve the classical problem of duality; mind-body, subject-object, form-content, signifier-signified, and structure-agency. System theory suggests that instead of creating closed categories into binaries (subject-object); the system should stay open so as to allow free flow of process and interactions. In this way the binaries are dissolved. Complex systems in nature—for example, ecosystems—involve a dynamic interaction of many variables (e.g. animals, plants, insects and bacteria; predators and prey; climate, the seasons and the weather, etc.) These interactions can adapt to changing conditions but maintain a balance both between the various parts and as a whole; this balance is maintained through homeostasis. Human societies are complex systems, as it were, human ecosystems. Early humans, as hunter-gatherers, recognized and worked within the parameters of the complex systems in nature and their lives were circumscribed by the realities of nature. But they couldn't explain complex systems. Only in recent centuries did the need arise to define complex systems scientifically. Complex systems theories first developed in math in the late 19th century, then in biology in the 1920s to explain ecosystems, then to deal with artificial intelligence (cybernetics), etc. Anthropologist Gregory Bateson is the most influential and earliest founder of system theory in social sciences. In the 1940s, as a result of the Macy conferences, he immediately recognized its application to human societies with their many variables and the flexible but sustainable balance that they maintain. Bateson describes system as "any unit containing feedback structure and therefore competent to process information." Thus an open system allows interaction between concepts and materiality or subject and the environment or abstract and real. In natural science, systems theory has been a widely used approach. Austrian biologist, Karl Ludwig von Bertalanffy, developed the idea of the general systems theory (GST). The GST is a multidisciplinary approach of system analysis.
  • 741
  • 27 Oct 2022
Topic Review
Igo Hatsuyōron
Igo Hatsuyōron (囲碁 発陽論, literally : On yang production in the game of go, often abbreviated Hatsuyōron) is a collection of 183 go problems (mostly tsumego), compiled in 1713 by the Japanese go master Inoue Dōsetsu Inseki. Until the end of the 19th century, the Hatsuyōron remained a closely guarded secret of the Inoue house, where it was used to drill the best disciples in the tactics. It became public after the collapse of the Four go houses; several incorrect editions are published, before the discovery in 1982 of a copy that is close to the original now lost. Igo Hatsuyōron is considered the most difficult of such collections, and as such is still used for training Go professionals. It contains many problems so complex that false or incomplete solutions were given in the first editions, and in particular an exceptional problem by its theme and its depth, rediscovered in 1982, and which is not yet completely solved in 2015.
  • 739
  • 12 Oct 2022
Topic Review
Apache Wave
Apache Wave was a software framework for real-time collaborative editing online. Google originally developed it as Google Wave. It was announced at the Google I/O conference on May 27, 2009. Wave is a web-based computing platform and communications protocol designed to merge key features of communications media such as email, instant messaging, wikis, and social networking. Communications using the system can be synchronous or asynchronous. Software extensions provide contextual spelling and grammar checking, automated language translation and other features. Initially released only to developers, a preview release of Google Wave was extended to 100,000 users in September 2009, each allowed to invite additional users. Google accepted most requests submitted starting November 29, 2009, soon after the September extended release of the technical preview. On May 19, 2010, it was released to the general public. On August 4, 2010, Google announced the suspension of stand-alone Wave development and the intent of maintaining the web site at least for the remainder of the year, and on November 22, 2011, announced that existing Waves would become read-only in January 2012 and all Waves would be deleted in April 2012. Development was handed over to the Apache Software Foundation which started to develop a server-based product called Wave in a Box. It was retired in January 2018.
  • 735
  • 24 Oct 2022
Topic Review
DSQuery
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 732
  • 08 Nov 2022
Topic Review
National Accreditation Authority for Translators and Interpreters
The National Accreditation Authority for Translators and Interpreters Ltd (known as NAATI) is the national standards and accreditation body for translators and interpreters in Australia. NAATI's mission, as outlined in the NAATI Constitution, is to set and maintain high national standards in translating and interpreting to enable the existence of a pool of accredited translators and interpreters responsive to the changing needs and demography of the Australian community. The core focus of the company is issuing certification for practitioners who wish to work as translators and interpreters in Australia.
  • 732
  • 10 Nov 2022
Topic Review
Leech (Computing)
In computing and specifically Internet, a leech is one who benefits, usually deliberately, from others' information or effort but does not offer anything in return, or makes only token offerings in an attempt to avoid being called a leech. In economics, this type of behavior is called "free riding" and is associated with the free rider problem. Depending on context, leeching does not necessarily refer to illegal use of computer resources, but often instead to greedy use according to etiquette: to wit, using too much of what is freely given without contributing a reasonable amount back to the community that provides it. The name derives from the leech, an animal that sucks blood and then tries to leave unnoticed. Other terms are used, such as "freeloader" and "sponge", but leech is the most common.
  • 730
  • 16 Nov 2022
Topic Review
Puppet
In computing, Puppet is a software configuration management tool which includes its own declarative language to describe system configuration. It is a model-driven solution that requires limited programming knowledge to use. Puppet is produced by Puppet, Inc, founded by Luke Kanies in 2005. Its primary product, Puppet Enterprise, is a proprietary and closed-source version of its open-source Puppet software. They use Puppet's declarative language to manage stages of the IT infrastructure lifecycle, including the provisioning, patching, configuration, and management of operating system and application components in data centers and cloud infrastructures. Puppet uses an open-core model; its free-software version was released under version 2 of the GNU General Public License (GPL) until version 2.7.0, and later releases use the Apache License, while Puppet Enterprise uses a proprietary license. Puppet and Puppet Enterprise operate on multiple Unix-like systems (including Linux, Solaris, BSD, Mac OS X, AIX, HP-UX) and has Microsoft Windows support. Puppet itself is written in Ruby, while Facter is written in C++, and Puppet Server and Puppet DB are written in Clojure.
  • 728
  • 20 Oct 2022
Topic Review
Illegal IPTV Technologies
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from different sources. These infringing IPTV technologies may include websites, software, software add-ons, and physical set-top boxes. Due to the free or low cost of illegal IPTV technologies, illicit IPTV content providers will often resort to intrusive advertising, scams, and the distribution of malware to increase their revenue.
  • 727
  • 20 Oct 2023
Topic Review
CryptoLocker
The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers running Microsoft Windows, and was believed to have first been posted to the Internet on 5 September 2013. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. When activated, the malware encrypted certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displayed a message which offered to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) was made by a stated deadline, and it threatened to delete the private key if the deadline passes. If the deadline was not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. There was no guarantee that payment would release the encrypted content. Although CryptoLocker itself was easily removed, the affected files remained encrypted in a way which researchers considered unfeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted. CryptoLocker was isolated in late May 2014 via Operation Tovar, which took down the Gameover ZeuS botnet that had been used to distribute the malware. During the operation, a security firm involved in the process obtained the database of private keys used by CryptoLocker, which was in turn used to build an online tool for recovering the keys and files without paying the ransom. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. Other instances of encryption-based ransomware that have followed have used the "CryptoLocker" name (or variations), but are otherwise unrelated.
  • 724
  • 14 Nov 2022
Topic Review
Vietnam SciMath Database Project
The Vietnam SciMath Database Project is a product of the mathematical research history initiative led by Professor Ngô Bảo Châu, a Vietnamese-French mathematician who won the Fields Medal in 2010.
  • 723
  • 19 Jul 2021
Topic Review
Scroll Lock
Scroll lock (⤓ or ⇳) is a lock key (typically with an associated status light) on most IBM-compatible computer keyboards. Depending on the operating system, it may be used for different purposes and applications may assign functions to the key or change their behaviour depending on its toggling state. The key is not frequently used, and therefore some reduced or specialized keyboards lack altogether. Pressing performs the same function as pressing . This behavior is a remnant of the original IBM PC keyboards, which did not have a dedicated key. Instead, they assigned the Pause function to and the Break function to .
  • 722
  • 09 Oct 2022
  • Page
  • of
  • 47
ScholarVision Creations