You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
International Trade Theory
International trade theory is a sub-field of economics which analyzes the patterns of international trade, its origins, and its welfare implications. International trade policy has been highly controversial since the 18th century. International trade theory and economics itself have developed as means to evaluate the effects of trade policies.
  • 8.4K
  • 14 Nov 2022
Topic Review
WikiLeaks
WikiLeaks (/ˈwɪkiliːks/) is an international non-profit organisation that publishes news leaks and classified media provided by anonymous sources. Its website, initiated in 2006 in Iceland by the organisation Sunshine Press, stated in 2015 that it had released online 10 million documents in its first 10 years. Julian Assange, an Australian Internet activist, is generally described as its founder and director. Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief. WikiLeaks has variously described itself as an organization of journalists, political activists, mathematicians, and start-up company technologists, an intermediary between sources and journalists, an advocacy group for sources, and a public intelligence agency. The group has released a number of prominent document caches that exposed serious violations of human rights and civil liberties to the US and international public. Early releases included documentation of equipment expenditures and holdings in the Afghanistan war, a report about a corruption investigation in Kenya, and an operating procedures manual for the U.S. prison at Guantanamo Bay, Cuba. In April 2010, WikiLeaks released the Collateral Murder footage from the 12 July 2007 Baghdad airstrike in which Iraqi Reuters journalists were among several civilians killed. Other releases in 2010 included the Afghan War Diary and the "Iraq War Logs". The latter release allowed the mapping of 109,032 deaths in "significant" attacks by insurgents in Iraq that had been reported to Multi-National Force – Iraq, including about 15,000 that had not been previously published. In 2010, WikiLeaks also released classified diplomatic cables that had been sent to the US State Department. In April 2011, WikiLeaks began publishing 779 secret files relating to prisoners detained in the Guantanamo Bay detention camp. In 2012, WikiLeaks released the "Syria Files," over two million emails sent by Syrian politicians, corporations and government ministries. In 2015, WikiLeaks published Saudi Arabian diplomatic cables, documents detailing spying by the U.S. National Security Agency on successive French presidents, and the intellectual property chapter of the Trans-Pacific Partnership, a controversial international trade agreement which had been negotiated in secret. During the 2016 U.S. presidential election campaign, WikiLeaks released emails and other documents from the Democratic National Committee and from Hillary Clinton's campaign manager, John Podesta, showing that the party's national committee favoured Clinton over her rival Bernie Sanders in the primaries, leading to the resignation of DNC chairwoman Debbie Wasserman Schultz and an apology to Sanders from the DNC. These releases caused significant harm to the Clinton campaign, and have been attributed as a potential contributing factor to her loss in the general election against Donald Trump. The U.S. intelligence community expressed "high confidence" that the leaked emails had been hacked by Russia and supplied to WikiLeaks. WikiLeaks said that the source of the documents was not Russia or any other state. During the campaign, WikiLeaks promoted conspiracy theories about Hillary Clinton and the Democratic Party. In 2016, WikiLeaks released nearly 300,000 emails it described as coming from Turkey's ruling Justice and Development Party, later found to be taken from public mailing archives, and rereleased over 50,000 emails from the Turkish Minister of Energy and Natural Resources. In 2017, WikiLeaks published internal CIA documents describing tools used by the agency to hack devices including mobile phones and routers. In 2019, WikiLeaks published over 30,000 files as part of the Fishrot Files, exposing corruption at Samherji, a multinational fishing company based in Iceland. In October 2021, WikiLeaks' secure chat stopped working and in February 2022 their submission system and email server went offline. The organisation has been criticised for inadequately curating its content and violating the personal privacy of individuals. WikiLeaks has, for instance, revealed Social Security numbers, medical information, credit card numbers and details of suicide attempts.
  • 8.3K
  • 11 Oct 2022
Topic Review
Yan Tan Tethera
Yan Tan Tethera is a sheep-counting rhyme/system traditionally used by shepherds in Northern England and earlier in some other parts of Britain. Until the Industrial Revolution, the use of traditional number systems was common among shepherds, especially in the fells of the Lake District. The Yan Tan Tethera system was also used for counting stitches in knitting. The words derive from a Brythonic Celtic language. Though most of these number systems fell out of use by 1910, some are still in use. The word yan or yen for "one" in some northern English dialects generally represents a regular development in Northern English in which the Old English long vowel /ɑː/ was broken into /ie/, /ia/ and so on. This explains the shift to yan and ane from the Old English ān, which is itself derived from the Proto-Germanic *ainaz. Another example of this development is the Northern English word for "home", hame, which has forms such as hyem, yem and yam all deriving from the Old English hām.
  • 8.3K
  • 20 Nov 2022
Topic Review
The Sims 2 Stuff Packs
Stuff packs are minor expansion packs for The Sims 2 that add new items, clothing, and furniture to the game without implementing any significant changes to gameplay.
  • 8.3K
  • 17 Nov 2022
Topic Review
Matthews Correlation Coefficient
The Matthews correlation coefficient (MCC) or phi coefficient is used in machine learning as a measure of the quality of binary (two-class) classifications, introduced by biochemist Brian W. Matthews in 1975. The MCC is defined identically to Pearson's phi coefficient, introduced by Karl Pearson, also known as the Yule phi coefficient from its introduction by Udny Yule in 1912. Despite these antecedents which predate Matthews's use by several decades, the term MCC is widely used in the field of bioinformatics and machine learning. The coefficient takes into account true and false positives and negatives and is generally regarded as a balanced measure which can be used even if the classes are of very different sizes. The MCC is in essence a correlation coefficient between the observed and predicted binary classifications; it returns a value between −1 and +1. A coefficient of +1 represents a perfect prediction, 0 no better than random prediction and −1 indicates total disagreement between prediction and observation. However, if MCC equals neither −1, 0, or +1, it is not a reliable indicator of how similar a predictor is to random guessing because MCC is dependent on the dataset. MCC is closely related to the chi-square statistic for a 2×2 contingency table where n is the total number of observations. While there is no perfect way of describing the confusion matrix of true and false positives and negatives by a single number, the Matthews correlation coefficient is generally regarded as being one of the best such measures. Other measures, such as the proportion of correct predictions (also termed accuracy), are not useful when the two classes are of very different sizes. For example, assigning every object to the larger set achieves a high proportion of correct predictions, but is not generally a useful classification. The MCC can be calculated directly from the confusion matrix using the formula: In this equation, TP is the number of true positives, TN the number of true negatives, FP the number of false positives and FN the number of false negatives. If any of the four sums in the denominator is zero, the denominator can be arbitrarily set to one; this results in a Matthews correlation coefficient of zero, which can be shown to be the correct limiting value. The MCC can be calculated with the formula: using the positive predictive value, the true positive rate, the true negative rate, the negative predictive value, the false discovery rate, the false negative rate, the false positive rate, and the false omission rate. The original formula as given by Matthews was: This is equal to the formula given above. As a correlation coefficient, the Matthews correlation coefficient is the geometric mean of the regression coefficients of the problem and its dual. The component regression coefficients of the Matthews correlation coefficient are Markedness (Δp) and Youden's J statistic (Informedness or Δp'). Markedness and Informedness correspond to different directions of information flow and generalize Youden's J statistic, the [math]\displaystyle{ \delta }[/math]p statistics and (as their geometric mean) the Matthews Correlation Coefficient to more than two classes. Some scientists claim the Matthews correlation coefficient to be the most informative single score to establish the quality of a binary classifier prediction in a confusion matrix context.
  • 8.0K
  • 18 Nov 2022
Topic Review
The Sims 3 Stuff Packs
Stuff packs are minor expansion packs for The Sims 3 that add new items, clothing, and furniture to the game without implementing any significant changes to gameplay.
  • 7.9K
  • 11 Nov 2022
Topic Review
Sina Weibo
Sina Weibo (NASDAQ: WB) (新浪微博) is a Chinese microblogging (weibo) website. Launched by Sina Corporation on 14 August 2009, it is one of the biggest social media platforms in China, with over 445 million monthly active users as of Q3 2018. The platform has been a huge financial success, with surging stocks, lucrative advertising sales and high revenue and total earnings per quarter. At the start of 2018, it surpassed the US$30 billion market valuation mark for the first time. In March 2014, Sina Corporation announced a spinoff of Weibo as a separate entity and filed an IPO under the symbol WB. Sina carved out 11% of Weibo in the IPO, with Alibaba owning 32% post-IPO. The company began trading publicly on 17 April 2014. In March 2017, Sina launched Sina Weibo International Version. This new version has a clean, concise user interface design, as well as an ad-free feature; while its volume is very small, only occupying one-fifth of the space of the original, it still performs all of the original's functions. In June 2018, Sina Weibo reached 413 million active users. In November 2018, Sina Weibo suspended its registration function for minors under the age of 14. In July 2019, Sina Weibo announced that it would launch a two-month campaign to clean up pornographic and vulgar information, named The Blue Plan. Sina Weibo has attracted criticism over censoring its users.
  • 7.8K
  • 02 Nov 2022
Topic Review
Circumscribed Circle
In geometry, the circumscribed circle or circumcircle of a polygon is a circle that passes through all the vertices of the polygon. The center of this circle is called the circumcenter and its radius is called the circumradius. Not every polygon has a circumscribed circle. A polygon that does have one is called a cyclic polygon, or sometimes a concyclic polygon because its vertices are concyclic. All triangles, all regular simple polygons, all rectangles, all isosceles trapezoids, and all right kites are cyclic. A related notion is the one of a minimum bounding circle, which is the smallest circle that completely contains the polygon within it, if the circle's center is within the polygon. Every polygon has a unique minimum bounding circle, which may be constructed by a linear time algorithm. Even if a polygon has a circumscribed circle, it may be different from its minimum bounding circle. For example, for an obtuse triangle, the minimum bounding circle has the longest side as diameter and does not pass through the opposite vertex.
  • 7.8K
  • 15 Nov 2022
Topic Review
Impact Factor
The impact factor (IF) or journal impact factor (JIF) of an academic journal is a scientometric index calculated by Clarivate that reflects the yearly average number of citations of articles published in the last two years in a given journal. It is frequently used as a proxy for the relative importance of a journal within its field; journals with higher impact factor values are often deemed to be more important, or carry more intrinsic prestige in their respective fields, than those with lower values.
  • 7.7K
  • 03 Mar 2023
Topic Review
Math 55
Math 55 is a two-semester long first-year undergraduate mathematics course at Harvard University, founded by Lynn Loomis and Shlomo Sternberg. The official titles of the course are Honors Abstract Algebra (Math 55a) and Honors Real and Complex Analysis (Math 55b). Previously, the official title was Honors Advanced Calculus and Linear Algebra.
  • 7.7K
  • 03 Nov 2022
Topic Review
Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan , and the United States. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade. Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, to prevent detection of Stuxnet. It is typically introduced to the target environment via an infected USB flash drive, thus crossing any air gap. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operation system values back to the users.
  • 7.6K
  • 30 Nov 2022
Topic Review
DualShock
The DualShock (originally Dual Shock; trademarked as DUALSHOCK or DUAL SHOCK; with the PlayStation 5 version named DualSense) is a line of gamepads with vibration-feedback and analog controls developed by Sony Interactive Entertainment for the PlayStation family of systems. Introduced in November 1997, it was initially marketed as a secondary peripheral for the original PlayStation, with updated versions of the PlayStation console including the controller, Sony subsequently phased out the controller that was originally included with the console, called the PlayStation controller, as well as the Sony Dual Analog Controller. The DualShock is the best-selling gamepad of all time in terms of units sold, excluding bundled controllers.
  • 7.6K
  • 24 Nov 2022
Topic Review
Tangential Quadrilateral
In Euclidean geometry, a tangential quadrilateral (sometimes just tangent quadrilateral) or circumscribed quadrilateral is a convex quadrilateral whose sides all can be tangent to a single circle within the quadrilateral. This circle is called the incircle of the quadrilateral or its inscribed circle, its center is the incenter and its radius is called the inradius. Since these quadrilaterals can be drawn surrounding or circumscribing their incircles, they have also been called circumscribable quadrilaterals, circumscribing quadrilaterals, and circumscriptible quadrilaterals. Tangential quadrilaterals are a special case of tangential polygons. Other less frequently used names for this class of quadrilaterals are inscriptable quadrilateral, inscriptible quadrilateral, inscribable quadrilateral, circumcyclic quadrilateral, and co-cyclic quadrilateral. Due to the risk of confusion with a quadrilateral that has a circumcircle, which is called a cyclic quadrilateral or inscribed quadrilateral, it is preferable not to use any of the last five names. All triangles can have an incircle, but not all quadrilaterals do. An example of a quadrilateral that cannot be tangential is a non-square rectangle. The section characterizations below states what necessary and sufficient conditions a quadrilateral must satisfy to be able to have an incircle.
  • 7.5K
  • 09 Oct 2022
Topic Review
Support Vector Machine
In machine learning, support-vector machines (SVMs, also support-vector networks) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis. The Support Vector Machine (SVM) algorithm is a popular machine learning tool that offers solutions for both classification and regression problems. Developed at AT&T Bell Laboratories by Vapnik with colleagues (Boser et al., 1992, Guyon et al., 1993, Vapnik et al., 1997), it presents one of the most robust prediction methods, based on the statistical learning framework or VC theory proposed by Vapnik and Chervonekis (1974) and Vapnik (1982, 1995). Given a set of training examples, each marked as belonging to one or the other of two categories, an SVM training algorithm builds a model that assigns new examples to one category or the other, making it a non-probabilistic binary linear classifier (although methods such as Platt scaling exist to use SVM in a probabilistic classification setting). An SVM model is a representation of the examples as points in space, mapped so that the examples of the separate categories are divided by a clear gap that is as wide as possible. New examples are then mapped into that same space and predicted to belong to a category based on the side of the gap on which they fall. In addition to performing linear classification, SVMs can efficiently perform a non-linear classification using what is called the kernel trick, implicitly mapping their inputs into high-dimensional feature spaces. When data are unlabelled, supervised learning is not possible, and an unsupervised learning approach is required, which attempts to find natural clustering of the data to groups, and then map new data to these formed groups. The support-vector clustering algorithm, created by Hava Siegelmann and Vladimir Vapnik, applies the statistics of support vectors, developed in the support vector machines algorithm, to categorize unlabeled data, and is one of the most widely used clustering algorithms in industrial applications.
  • 7.5K
  • 14 Oct 2022
Topic Review
Proofs of Fermat's Theorem on Sums of Two Squares
Fermat's theorem on sums of two squares asserts that an odd prime number p can be expressed as with integer x and y if and only if p is congruent to 1 (mod 4). The statement was announced by Girard in 1625, and again by Fermat in 1640, but neither supplied a proof. The "only if" clause is easy: a perfect square is congruent to 0 or 1 modulo 4, hence a sum of two squares is congruent to 0, 1, or 2. An odd prime number is congruent to either 1 or 3 modulo 4, and the second possibility has just been ruled out. The first proof that such a representation exists was given by Leonhard Euler in 1747 and was complicated. Since then, many different proofs have been found. Among them, the proof using Minkowski's theorem about convex sets and Don Zagier's short proof based on involutions have appeared.
  • 7.4K
  • 11 Nov 2022
Topic Review
Uniform Distribution (Continuous)
In probability theory and statistics, the continuous uniform distribution or rectangular distribution is a family of symmetric probability distributions. The distribution describes an experiment where there is an arbitrary outcome that lies between certain bounds. The bounds are defined by the parameters, a and b, which are the minimum and maximum values. The interval can be either be closed (eg. [a, b]) or open (eg. (a, b)). Therefore, the distribution is often abbreviated U (a, b), where U stands for uniform distribution. The difference between the bounds defines the interval length; all intervals of the same length on the distribution's support are equally probable. It is the maximum entropy probability distribution for a random variable X under no constraint other than that it is contained in the distribution's support.
  • 7.4K
  • 17 Oct 2022
Topic Review
Word Processor (Electronic Device)
A word processor is an electronic device (later a computer software application) for text, composing, editing, formatting, and printing. The word processor was a stand-alone office machine in the 1960s, combining the keyboard text-entry and printing functions of an electric typewriter with a recording unit, either tape or floppy disk (as used by the Wang machine) with a simple dedicated computer processor for the editing of text. Although features and designs varied among manufacturers and models, and new features were added as technology advanced, the first word processors typically featured a monochrome display and the ability to save documents on memory cards or diskettes. Later models introduced innovations such as spell-checking programs, and improved formatting options. As the more versatile combination of personal computers and printers became commonplace, and computer software applications for word processing became popular, most business machine companies stopped manufacturing dedicated word processor machines. As of 2009 there were only two U.S. companies, Classic and AlphaSmart, which still made them.[needs update] Many older machines, however, remain in use. Since 2009, Sentinel has offered a machine described as a "word processor", but it is more accurately a highly specialised microcomputer used for accounting and publishing. Word processing was one of the earliest applications for the personal computer in office productivity, and was the most widely used application on personal computers until the World Wide Web rose to prominence in the mid-1990s. Although the early word processors evolved to use tag-based markup for document formatting, most modern word processors take advantage of a graphical user interface providing some form of what-you-see-is-what-you-get ("WYSIWYG") editing. Most are powerful systems consisting of one or more programs that can produce a combination of images, graphics and text, the latter handled with type-setting capability. Typical features of a modern word processor include multiple font sets, spell checking, grammar checking, a built-in thesaurus, automatic text correction, web integration, HTML conversion, pre-formatted publication projects such as newsletters and to-do lists, and much more. Microsoft Word is the most widely used word processing software according to a user tracking system built into the software. Microsoft estimates that roughly half a billion people use the Microsoft Office suite, which includes Word. Many other word processing applications exist, including WordPerfect (which dominated the market from the mid-1980s to early-1990s on computers running Microsoft's MS-DOS operating system, and still (2014) is favored for legal applications), Apple's Pages application, and open source applications such as OpenOffice.org Writer, LibreOffice Writer, AbiWord, KWord, and LyX. Web-based word processors such as Office Online or Google Docs are a relatively new category.
  • 7.4K
  • 24 Nov 2022
Topic Review
Product Distribution
A product distribution is a probability distribution constructed as the distribution of the product of random variables having two other known distributions. Given two statistically independent random variables X and Y, the distribution of the random variable Z that is formed as the product is a product distribution.
  • 7.4K
  • 11 Nov 2022
Topic Review
The Challenges and Opportunities of Era 5.0
People are in an increasingly disruptive context, in an Era in which the world presents challenging and growing levels of uncertainty, unpredictability, and complexity. As a result, society is facing, at all levels and in all areas, more and more global challenges, challenging its stability and prosperity, whether at a technological, economic, social, environmental, or educational level. The new Era, Era 5.0, which places the human being at the center of innovation and technological transformation, can and must make its contribution to improving the quality of life, solving social problems, and human well-being, with the support of technology.
  • 7.3K
  • 09 Dec 2022
Topic Review
Proofs Involving the Moore–Penrose Inverse
In linear algebra, the Moore–Penrose inverse is a matrix that satisfies some but not necessarily all of the properties of an inverse matrix. This article collects together a variety of proofs involving the Moore–Penrose inverse.
  • 7.3K
  • 01 Dec 2022
  • Page
  • of
  • 48
Academic Video Service