Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Autonomous Vehicles and Urban Transport
Autonomous driving is a technological innovation that involves the use of Artificial Intelligence (AI) in the automotive area, representing the future of transport and whose applications will influence the concept of driving and many other features of modern society. Indeed, the introduction of Autonomous Vehicles (AVs) on the market, along with the development of related technologies, will have a potential impact not only on the automotive industry but also on urban transport systems. New mobility-related businesses will emerge, whereas existing ones will have to adapt to changes. 
  • 1.3K
  • 05 May 2021
Biography
Adam C. Siepel
Adam C. Siepel (born 1972) is an American computational biologist known for his research in comparative genomics and population genetics, particularly the development of statistical methods and software tools for identifying evolutionarily conserved sequences.[1][2][3][4] Siepel is currently Chair of the Simons Center for Quantitative Biology and Professor in the Watson School for Biological Sci
  • 1.3K
  • 29 Dec 2022
Topic Review
Network Function Virtualization
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen.
  • 1.3K
  • 30 May 2022
Topic Review
Batch File
A batch file is a script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file. A batch file may contain any command the interpreter accepts interactively and use constructs that enable conditional branching and looping within the batch file, such as IF, FOR, and GOTO labels. The term "batch" is from batch processing, meaning "non-interactive execution", though a batch file may not process a batch of multiple data. Similar to Job Control Language (JCL), DCL and other systems on mainframe and minicomputer systems, batch files were added to ease the work required for certain regular tasks by allowing the user to set up a script to automate them. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. Unix-like operating systems, such as Linux, have a similar, but more flexible, type of file called a shell script. The filename extension .bat is used in DOS and Windows. Windows NT and OS/2 also added .cmd. Batch files for other environments may have different extensions, e.g., .btm in 4DOS, 4OS2 and 4NT related shells. The detailed handling of batch files has changed significantly between versions. Some of the detail in this article applies to all batch files, while other details apply only to certain versions.
  • 1.3K
  • 19 Oct 2022
Topic Review
Landrush Period
A landrush period is the time during which domain names are available for registration, usually to a closed group (usually through a premium price), to entities that do not own a trademark in the name they wish to register, for example generic terms like loan or car, and thus would not qualify for registration during the sunrise period. Orders may or may not be treated on a first-come-first-served basis. This period follows the sunrise period just after the launch of a new top-level domain or second-level domain during which, for example, owners of trademarks may register a domain name containing the owned mark, but a landrush period precedes a period of general availability, when any qualifying entity can register any name on a first come first-served basis.
  • 1.3K
  • 14 Oct 2022
Topic Review
Magnus Expansion
In mathematics and physics, the Magnus expansion, named after Wilhelm Magnus (1907–1990), provides an exponential representation of the solution of a first-order homogeneous linear differential equation for a linear operator. In particular, it furnishes the fundamental matrix of a system of linear ordinary differential equations of order n with varying coefficients. The exponent is aggregated as an infinite series, whose terms involve multiple integrals and nested commutators.
  • 1.3K
  • 21 Oct 2022
Topic Review
DSMod
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 1.3K
  • 06 Oct 2022
Topic Review
Data Re-Identification
Data Re-Identification is the practice of matching anonymous data (also known as de-identified data) with publicly available information, or auxiliary data, in order to discover the individual to which the data belongs to. This is a concern because companies with privacy policies, health care providers, and financial institutions may release the data they collect after the data has gone through the de-identification process. The de-identification process involves masking, generalizing or deleting both direct and indirect identifiers; the definition of this process is not universal, however. Information in the public domain, even seemingly anonymized, may thus be re-identified in combination with other pieces of available data and basic computer science techniques. The Common Rule Agencies, a collection of multiple U.S. federal agencies and departments including the U.S. Department of Health and Human Services, speculate that re-identification is becoming gradually easier because of "big data" - the abundance and constant collection and analysis of information along the evolution of technologies and the advances of algorithms. However, others have claimed that de-identification is a safe and effective data liberation tool and do not view re-identification as a concern. A 2000 study found that 87 percent of the U.S. population can be identified using a combination of their gender, birthdate and zip code. Others do not think that re-identification is a serious threat, and call it a "myth"; they claim that the combination of zip code, date of birth and gender is rare or partially complete, such as only the year and month birth without the date, or the county name instead of the specific zip code, thus the risk of such re-identification is reduced in many instances.
  • 1.3K
  • 31 Oct 2022
Topic Review
ID-Based Encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can encrypt a message using e.g. the text-value of the receiver's name or email address as a key. The receiver obtains its decryption key from a central authority, which needs to be trusted as it generates secret keys for every user. ID-based encryption was proposed by Adi Shamir in 1984. He was however only able to give an instantiation of identity-based signatures. Identity-based encryption remained an open problem for many years. The pairing-based Boneh–Franklin scheme and Cocks's encryption scheme based on quadratic residues both solved the IBE problem in 2001.
  • 1.3K
  • 25 Oct 2022
Topic Review
Iterared Skew Polynomial Rings
Skew polynomial rings used to be, especially during the 1970’s and 1980’s, a popular topic of the modern abstract Algebra with great theoretical interest. The researchers’ attention about them has renewed recently, due to the important applications that they have found to the study of Quantum Groups and to Cryptography. The present work studies a special class of iterated skew polynomial rings over a ring R, defined with respect to a finite set of pairwise commuting derivations of R.
  • 1.3K
  • 17 Dec 2020
Topic Review
Negation and Speculation Corpora in Natural Language Processing
Negation and speculation are universal linguistic phenomena that affect the performance of Natural Language Processing (NLP) applications, such as those for opinion mining and information retrieval, especially in biomedical data. 
  • 1.3K
  • 20 Jun 2022
Topic Review
Fat Object
In geometry, a fat object is an object in two or more dimensions, whose lengths in the different dimensions are similar. For example, a square is fat because its length and width are identical. A 2-by-1 rectangle is thinner than a square, but it is fat relative to a 10-by-1 rectangle. Similarly, a circle is fatter than a 1-by-10 ellipse and an equilateral triangle is fatter than a very obtuse triangle. Fat objects are especially important in computational geometry. Many algorithms in computational geometry can perform much better if their input consists of only fat objects; see the applications section below.
  • 1.3K
  • 28 Nov 2022
Topic Review
Systems Theory in Anthropology
Systems theory in anthropology is an interdisciplinary, non-representative, non-referential, and non-Cartesian approach that brings together natural and social sciences to understand society in its complexity. The basic idea of a system theory in social science is to solve the classical problem of duality; mind-body, subject-object, form-content, signifier-signified, and structure-agency. System theory suggests that instead of creating closed categories into binaries (subject-object); the system should stay open so as to allow free flow of process and interactions. In this way the binaries are dissolved. Complex systems in nature—for example, ecosystems—involve a dynamic interaction of many variables (e.g. animals, plants, insects and bacteria; predators and prey; climate, the seasons and the weather, etc.) These interactions can adapt to changing conditions but maintain a balance both between the various parts and as a whole; this balance is maintained through homeostasis. Human societies are complex systems, as it were, human ecosystems. Early humans, as hunter-gatherers, recognized and worked within the parameters of the complex systems in nature and their lives were circumscribed by the realities of nature. But they couldn't explain complex systems. Only in recent centuries did the need arise to define complex systems scientifically. Complex systems theories first developed in math in the late 19th century, then in biology in the 1920s to explain ecosystems, then to deal with artificial intelligence (cybernetics), etc. Anthropologist Gregory Bateson is the most influential and earliest founder of system theory in social sciences. In the 1940s, as a result of the Macy conferences, he immediately recognized its application to human societies with their many variables and the flexible but sustainable balance that they maintain. Bateson describes system as "any unit containing feedback structure and therefore competent to process information." Thus an open system allows interaction between concepts and materiality or subject and the environment or abstract and real. In natural science, systems theory has been a widely used approach. Austrian biologist, Karl Ludwig von Bertalanffy, developed the idea of the general systems theory (GST). The GST is a multidisciplinary approach of system analysis.
  • 1.3K
  • 27 Oct 2022
Topic Review
Atari Assembler Editor
Atari Assembler Editor (sometimes written as Atari Assembler/Editor) is a ROM cartridge-based development system released by Atari, Inc. in 1981. It is used to edit, assemble, and debug 6502 programs for the Atari 8-bit family of home computers. It was programmed by Kathleen O'Brien of Shepardson Microsystems, the company which wrote Atari BASIC, and Assembler Editor shares many design concepts with that language. Assembly times are slow, making the cartridge challenging to use for larger programs. In the manual, Atari recommended the Assembler Editor as a tool for writing subroutines to speed up Atari BASIC, which would be much smaller than full applications. The Atari Macro Assembler was offered as an alternative with better performance and more features, such as macros, but it was disk-based, copy-protected, and did not include an editor or debugger. Despite the recommendation, commercial software was written using the Assembler Editor, such as the games Eastern Front (1941), Caverns of Mars, Galahad and the Holy Grail, and Kid Grid. The source code to the original Assembler Editor was licensed to Optimized Systems Software who shipped EASMD based on it.
  • 1.2K
  • 21 Nov 2022
Topic Review
Ko Fight
A ko (Japanese: コウ, 劫, kō, from the translation of the Sanskrit term kalpa) fight is a tactical and strategic phase that can arise in the game of go.
  • 1.2K
  • 28 Nov 2022
Topic Review
Sun Ray
The Sun Ray was a stateless thin client computer (and associated software) aimed at corporate environments, originally introduced by Sun Microsystems in September 1999 and discontinued by Oracle Corporation in 2014. It featured a smart card reader and several models featured an integrated flat panel display. The idea of a stateless desktop was a significant shift from, and the eventual successor to, Sun's earlier line of diskless Java-only desktops, the JavaStation.
  • 1.2K
  • 10 Nov 2022
Topic Review
Open Source in Kosovo
The first project in open source in Kosovo was the adjustment of Open Office Packet in December 2003. On 28 July 2004 the Albanian team, users of Linux (GGSL), was one of the first public organizations for the purpose of getting information about the field of open source. This conference was called "Software Freedom Day". Software Freedom Day is known as the first initiative about FOSS in Kosovo in the level of conference. The purpose of that conference was to promote the free and open software. Some of the issues that were discussed were about Linux, what is free software and open sources in general. Another issue that was discussed in that conference was about the operative system Linux and its benefits. KDE and GNOME were the last issues that were discussed in conference. Ati-Kos has made some surveys in five municipal assemblies of Kosovo in May 2005. According to this survey about 98.6% wanted software box in mother tongue, in Albanian. In another survey, the majority of the participants believed that a software box like Open Office would help in increasing the productivity in different fields because of the interface in Albanian.
  • 1.2K
  • 15 Nov 2022
Topic Review
Military Simulation
Military simulations, also known informally as war games, are simulations in which theories of warfare can be tested and refined without the need for actual hostilities. Military simulations are seen as a useful way to develop tactical, strategical and doctrinal solutions, but critics argue that the conclusions drawn from such models are inherently flawed, due to the approximate nature of the models used. Many professional analysts object to the term wargames as this is generally taken to be referring to the civilian hobby, thus the preference for the term simulation. Simulations exist in many different forms, with varying degrees of realism. In recent times, the scope of simulations has widened to include not only military but also political and social factors, which are seen as inextricably entwined in a realistic warfare model. Whilst many governments make use of simulation, both individually and collaboratively, little is known about it outside professional circles. Yet modelling is often the means by which governments test and refine their military and political policies.
  • 1.2K
  • 29 Sep 2022
Topic Review
Here Be Dragons
Here Be Dragons (formerly known as Vrse.works) is a medium-agnostic creative studio co-founded by Patrick Milling-Smith, Chris Milk and Brian Carmody.
  • 1.2K
  • 08 Oct 2022
Topic Review
Latin-1 Supplement (Unicode Block)
The Latin-1 Supplement (also called C1 Controls and Latin-1 Supplement) is the second Unicode block in the Unicode standard. It encodes the upper range of ISO 8859-1: 80 (U+0080) - FF (U+00FF). Controls C1 (0080–009F) are not graphic. This block ranges from U+0080 to U+00FF, contains 128 characters and includes the C1 controls, Latin-1 punctuation and symbols, 30 pairs of majuscule and minuscule accented Latin characters and 2 mathematical operators. The C1 controls and Latin-1 Supplement block has been included in its present form, with the same character repertoire since version 1.0 of the Unicode Standard. Its block name in Unicode 1.0 was simply Latin1.
  • 1.2K
  • 28 Nov 2022
  • Page
  • of
  • 48
Academic Video Service

Quick Survey

Encyclopedia MDPI is conducting a targeted survey to identify the specific barriers hindering efficient research. We invite you to spend 3 minutes defining the priorities for our next generation of structured knowledge tools.
Take Survey