You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
List of Matrices
This page lists some important classes of matrices used in mathematics, science and engineering. A matrix (plural matrices, or less commonly matrixes) is a rectangular array of numbers called entries. Matrices have a long history of both study and application, leading to diverse ways of classifying matrices. A first group is matrices satisfying concrete conditions of the entries, including constant matrices. An important example is the identity matrix given by Further ways of classifying matrices are according to their eigenvalues or by imposing conditions on the product of the matrix with other matrices. Finally, many domains, both in mathematics and other sciences including physics and chemistry have particular matrices that are applied chiefly in these areas.
  • 1.2K
  • 29 Nov 2022
Topic Review
Vaccine and Variant-modified Covid-19 Trajectories
Covid-19 transmission in US and UK have diverged 1.73 times faster than predicted by recursion models after November 2020. Transmission follows a 20% infection rate compared to the previous 10% rate, attributed to a more contagious variant of covid-19. The effect of vaccination on covid-19 trajectory is analysed for US data. Modelling indicates case numbers continue to rise for some time after vaccination.
  • 1.2K
  • 26 Jan 2021
Topic Review
Zone File
A Domain Name System (DNS) zone file is a text file that describes a DNS zone. A DNS zone is a subset, often a single domain, of the hierarchical domain name structure of the DNS. The zone file contains mappings between domain names and IP addresses and other resources, organized in the form of text representations of resource records (RR). A zone file may be either a DNS master file, authoritatively describing a zone, or it may be used to list the contents of a DNS cache.
  • 1.2K
  • 13 Oct 2022
Topic Review
COHERENS
COHERENS is an open-source hydrodynamic computer model for shallow waters. It was developed in the 1990s by the Royal Belgian Institute of Natural Sciences (RBINS). The name COHERENS is an acronym of COupled Hydrodynamical Ecological model for REgioNal Shelf seas. COHERENS can be used in 1D, 2D or 3D mode and can model both salt waters such as coastal and shelf seas and freshwater basins such as lakes. Applications of the model include obtaining a better understanding of shallow water systems and managing pollution.
  • 1.2K
  • 19 Oct 2022
Topic Review
Two Dimensional Window Design
Windowing is a process where an index limited sequence has its maximum energy concentrated in a finite frequency interval. This can be extended to an N-dimension where the N-D window has the limited support and maximum concentration of energy in a separable or non-separable N-D passband. The design of an N-dimensional window particularly a 2-D window finds applications in various fields such as spectral estimation of multidimensional signals, design of circularly symmetric and quadrantally symmetric non-recursive 2D filters, design of optimal convolution functions, image enhancement so as to reduce the effects of data-dependent processing artifacts, optical apodization and antenna array design.
  • 1.2K
  • 21 Nov 2022
Topic Review
Physics of the Future
Physics of the Future: How Science Will Shape Human Destiny and Our Daily Lives by the Year 2100 is a 2011 book by theoretical physicist Michio Kaku, author of Hyperspace and Physics of the Impossible. In it Kaku speculates about possible future technological development over the next 100 years. He interviews notable scientists about their fields of research and lays out his vision of coming developments in medicine, computing, artificial intelligence, nanotechnology, and energy production. The book was on the New York Times Bestseller List for five weeks. Kaku writes how he hopes his predictions for 2100 will be as successful as science fiction writer Jules Verne's 1863 novel Paris in the Twentieth Century. Kaku contrasts Verne's foresight against U.S. Postmaster General John Wanamaker, who in 1893 predicted that mail would still be delivered by stagecoach and horseback in 100 years' time, and IBM chairman Thomas J. Watson, who in 1943 is alleged to have said "I think there is a world market for maybe five computers." Kaku points to this long history of failed predictions against progress to underscore his notion "that it is very dangerous to bet against the future".
  • 1.1K
  • 24 Oct 2022
Topic Review
Google Cast
Google Cast is a proprietary protocol developed by Google for playing Internet-streamed audio/video content on a compatible consumer device. The protocol is used to initiate and control playback of content on digital media players, high-definition televisions, and home audio systems using a mobile device, personal computer, or smart speaker. The protocol was first launched on July 24, 2013, to support Google's first-generation Chromecast player. The Google Cast SDK was released on February 3, 2014, allowing third parties to modify their software to support the protocol. According to Google, over 20,000 Google Cast-ready apps were available as of May 2015. Support for Google Cast has since been integrated into subsequent devices, such as the Nexus Player and other Android TV devices (such as televisions), as well as soundbars, speakers, and later models of the Chromecast. Consumer devices that natively support the protocol are marketed as Chromecast built-in. As of October 2017, over 55 million Chromecasts and Chromecast built-in devices have been sold.
  • 1.1K
  • 19 Oct 2022
Topic Review
Deception Technology
Deception technology is a category of cyber security defense. Deception technology products can detect, analyze, and defend against zero-day and advanced attacks, often in real time. They are automated, accurate, and provide insight into malicious activity within internal networks which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations. Existing defense-in-depth cyber technologies have struggled against the increasing wave of sophisticated and persistent human attackers. These technologies seek primarily to defend a perimeter, but both firewalls and endpoint security cannot defend a perimeter with 100% certainty. Cyber-attackers can penetrate these networks and move unimpeded for months, stealing data and intellectual property. Heuristics may find an attacker within the network, but often generate so many alerts that critical alerts are missed. Since 2014, attacks have accelerated and there is evidence that cyber-attackers are penetrating traditional defenses at a rapidly increasing rate. Deception technology considers the human attacker's point of view and method for exploiting and navigating networks to identify and exfiltrate data. It integrates with existing technologies to provide new visibility into the internal networks, share high probability alerts and threat intelligence with the existing infrastructure.
  • 1.1K
  • 10 Nov 2022
Topic Review
Buddhist Studies
Buddhist studies, also known as Buddhology (although the latter term is sometimes reserved for the study of Buddhas rather than that of Buddhism as a whole), is the academic study of Buddhism. The term applies especially to the modern academic field, which is a subset of religious studies, and is distinct from Buddhist philosophy or Buddhist theology. Scholars of Buddhist studies represent a variety of disciplines including history, anthropology, and philosophy. In contrast to the study of Judaism or Christianity, the field of Buddhist studies has been dominated by "outsiders" to Buddhist cultures and traditions. However, Japan ese universities have also made major contributions, as have Asian immigrants to Western countries, and Western converts to Buddhism.
  • 1.1K
  • 18 Nov 2022
Biography
Antonín Svoboda
Antonín Svoboda (1907–1980) was a Czech computer scientist, mathematician, electrical engineer, and researcher. He is credited with originating the design of fault-tolerant computer systems,[1] and with the creation of SAPO, the first Czech computer design.[2] Svoboda was born in Prague in 1907.[1] Attending a series of schools, he studied at the College of Mechanical and Electrical Engine
  • 1.1K
  • 12 Dec 2022
Topic Review
Periodic Matrix Set
In mathematics, a periodic matrix set is a set of square matrices in which each square matrix is of a different size, and such that each cell within each matrix within a set contains data associated with some type of periodic distribution.
  • 1.1K
  • 13 Oct 2022
Topic Review
Net Neutrality (Last Week Tonight)
"Net Neutrality" is the first segment of the HBO news satire television series Last Week Tonight with John Oliver devoted to net neutrality in the United States. It aired for 13 minutes on June 1, 2014, as part of the fifth episode of Last Week Tonight's first season. During this segment, as well Oliver's follow-up segment entitled "Net Neutrality II", comedian John Oliver discusses the threats to net neutrality. Under the administration of President Barack Obama, the Federal Communications Commission (FCC) was considering two options for net neutrality in early 2014. The FCC proposed permitting fast and slow broadband lanes, which would compromise net neutrality, but was also considering reclassifying broadband as a telecommunication service, which would preserve net neutrality. After a surge of comments supporting net neutrality that were inspired by Oliver's episode, the FCC voted to reclassify broadband as a utility in 2015.
  • 1.1K
  • 17 Oct 2022
Topic Review
Ctty (Command)
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 1.1K
  • 29 Sep 2022
Topic Review
Trinity: Souls of Zill O’ll
Trinity: Souls of Zill O’ll, known in Japan as Trinity: Zill O'll Zero (トリニティ ジルオール ゼロ, Toriniti Jiru Ōru Zero), is an action fantasy role-playing video game developed by Omega Force, set in part of the Zill O'll series, which had previously appeared on PlayStation, PlayStation 2 and PlayStation Portable. The game is a prequel, taking place five years before the events in Zill O'll. Downloadable content that included additional quests and alternate costumes for the main party was released exclusively in Japan.
  • 1.1K
  • 27 Oct 2022
Topic Review
Dynamic SSL
Dynamic SSL is an endpoint security technology developed by Daniel McCann and Nima Sharifimehr of NetSecure Technologies Ltd. Dynamic SSL was created to solve the endpoint security problem in public networks by transparently correcting the implementation flaws in SSL systems that expose sensitive data to interception and tampering. Dynamic SSL is sometimes referred to as Dynamic TLS.
  • 1.1K
  • 16 Nov 2022
Topic Review
CloudBerry Backup
MSP360 Backup (former CloudBerry Backup) is an online backup app developed by MSP360. The software is integrated with 3rd-party cloud storage providers and supports data backup and restore for Windows (desktop and servers), macOS and Linux. Additionally, it offers support for Microsoft SQL Server, Microsoft Exchange, VMware, Hyper-V, Office 365 and G Suite (Google Apps). MSP360 Backup is available in several commercial editions as well as a free offering (MSP360 Backup Desktop Free). MSP360 Managed Backup is a SaaS solution and is designed to help manage backup and recovery across multiple computers or servers.
  • 1.1K
  • 10 Nov 2022
Topic Review
Leech (Computing)
In computing and specifically Internet, a leech is one who benefits, usually deliberately, from others' information or effort but does not offer anything in return, or makes only token offerings in an attempt to avoid being called a leech. In economics, this type of behavior is called "free riding" and is associated with the free rider problem. Depending on context, leeching does not necessarily refer to illegal use of computer resources, but often instead to greedy use according to etiquette: to wit, using too much of what is freely given without contributing a reasonable amount back to the community that provides it. The name derives from the leech, an animal that sucks blood and then tries to leave unnoticed. Other terms are used, such as "freeloader" and "sponge", but leech is the most common.
  • 1.1K
  • 16 Nov 2022
Topic Review
SHIFT (DOS Command)
This research presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 1.1K
  • 19 Oct 2022
Topic Review
Comparison of Notetaking Software
The tables below compare features of notable note-taking software.
  • 1.1K
  • 28 Nov 2022
Topic Review
Cartan Formalism
The vierbein or tetrad theory much used in theoretical physics is a special case of the application of Cartan connection in four-dimensional manifolds. It applies to metrics of any signature. (See metric tensor.) This section is an approach to tetrads, but written in general terms. In dimensions other than 4, words like triad, pentad, zweibein, fünfbein, elfbein etc. have been used. Vielbein covers all dimensions. (In German, vier means four, zwei means two, fünf means five, elf means eleven and, in general, viel means many.) For a basis-dependent index notation, see tetrad (index notation).
  • 1.1K
  • 04 Nov 2022
  • Page
  • of
  • 48
Academic Video Service