You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Systems Thinking and Simulation for Sustainability Education
Education for sustainable development (ESD) is considered vital to the success of the United Nations’ sustainable development goals. Systems thinking has been identified as a core competency that must be included in ESD. However, systems thinking-orientated ESD learning tools, established methods for assessment of sustainability skills, and formal trials to demonstrate the effectiveness of such learning tools are all lacking. Furthermore, simulation is seen by many Systems Thinkers as essential for learning about complex systems. Therefore, whether Systems Thinking theory, interactive simulation, or both, offer the best learning outcomes for sustainability education, is also an important question. A randomised controlled study found that simulation alone significantly increased sustainability learning outcomes. Simulation, together with systems archetypes, was also found to significantly support transfer of understanding from one problem to another with a similar systemic structure, although at a lower level of confidence.
  • 878
  • 06 Jan 2022
Topic Review
Driver Drowsiness Detection
Drowsy driving is a widespread cause of traffic accidents, especially on highways. It has become an essential task to seek an understanding of the situation in order to be able to take immediate remedial actions to detect driver drowsiness and enhance road safety.
  • 878
  • 25 Sep 2023
Topic Review
Zone File
A Domain Name System (DNS) zone file is a text file that describes a DNS zone. A DNS zone is a subset, often a single domain, of the hierarchical domain name structure of the DNS. The zone file contains mappings between domain names and IP addresses and other resources, organized in the form of text representations of resource records (RR). A zone file may be either a DNS master file, authoritatively describing a zone, or it may be used to list the contents of a DNS cache.
  • 877
  • 13 Oct 2022
Topic Review
Kune
Kune is a free/open source distributed social network focused on collaboration rather than just on communication. That is, it focuses on online real-time collaborative editing, decentralized social networking and web publishing, while focusing on workgroups rather than just on individuals. It aims to allow for the creation of online spaces for collaborative work where organizations and individuals can build projects online, coordinate common agendas, set up virtual meetings, publish on the web, and join organizations with similar interests. It has a special focus on Free Culture and social movements needs. Kune is a project of the Comunes Collective.
  • 877
  • 31 Oct 2022
Topic Review
Dengue Detection
The dengue virus (DENV) is a vector-borne flavivirus that infects around 390 million individuals each year with 2.5 billion being in danger. Having access to testing is paramount in preventing future infections and receiving adequate treatment. Currently, there are numerous conventional methods for DENV testing, such as NS1 based antigen testing, IgM/IgG antibody testing, and Polymerase Chain Reaction (PCR).
  • 876
  • 05 Jul 2021
Topic Review
Studies on Bike-Sharing Systems
Cities are moving towards new mobility strategies to tackle smart cities’ challenges such as carbon emission reduction, urban transport multimodality and mitigation of pandemic hazards, emphasising on the implementation of shared modes, such as bike-sharing systems. 
  • 875
  • 19 Mar 2021
Topic Review
Root System of a Semi-simple Lie Algebra
In mathematics, there is a one-to-one correspondence between reduced crystallographic root systems and semisimple Lie algebras. Here the construction of a root system of a semisimple Lie algebra – and, conversely, the construction of a semisimple Lie algebra from a reduced crystallographic root system – are shown.
  • 875
  • 17 Nov 2022
Topic Review
Cybersecurity Information Technology List
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid. Cybersecurity is a major endeavor of the IT industry. There are a number of professional certifications given for cybersecurity training and expertise. Although billions of dollars are spent annually on cybersecurity, no computer or network is immune from attacks or can be considered completely secure. The single most expensive loss due to a cybersecurity exploit was the ILOVEYOU or Love Bug email worm of 2000, which cost an estimated 8.7 billion American dollars. This article attempts to list all the important Wikipedia articles about cybersecurity. There are a number of minor articles that can be reached by means of links in the listed articles.
  • 873
  • 08 Oct 2022
Topic Review
Non-Standard Analysis
The history of calculus is fraught with philosophical debates about the meaning and logical validity of fluxions or infinitesimal numbers. The standard way to resolve these debates is to define the operations of calculus using epsilon–delta procedures rather than infinitesimals. Non-standard analysis instead reformulates the calculus using a logically rigorous notion of infinitesimal numbers. Non-standard analysis was originated in the early 1960s by the mathematician Abraham Robinson. He wrote: "... the idea of infinitely small or infinitesimal quantities seems to appeal naturally to our intuition. At any rate, the use of infinitesimals was widespread during the formative stages of the Differential and Integral Calculus. As for the objection ... that the distance between two distinct real numbers cannot be infinitely small, Gottfried Wilhelm Leibniz argued that the theory of infinitesimals implies the introduction of ideal numbers which might be infinitely small or infinitely large compared with the real numbers but which were to possess the same properties as the latter". Robinson argued that this law of continuity of Leibniz's is a precursor of the transfer principle. Robinson continued: "However, neither he nor his disciples and successors were able to give a rational development leading up to a system of this sort. As a result, the theory of infinitesimals gradually fell into disrepute and was replaced eventually by the classical theory of limits." "It is shown in this book that Leibniz's ideas can be fully vindicated and that they lead to a novel and fruitful approach to classical Analysis and to many other branches of mathematics. The key to our method is provided by the detailed analysis of the relation between mathematical languages and mathematical structures which lies at the bottom of contemporary model theory." In 1973, intuitionist Arend Heyting praised non-standard analysis as "a standard model of important mathematical research".
  • 871
  • 17 Nov 2022
Topic Review
Similitude (Model)
Similitude is a concept applicable to the testing of engineering models. A model is said to have similitude with the real application if the two share geometric similarity, kinematic similarity and dynamic similarity. Similarity and similitude are interchangeable in this context. The term dynamic similitude is often used as a catch-all because it implies that geometric and kinematic similitude have already been met. Similitude's main application is in hydraulic and aerospace engineering to test fluid flow conditions with scaled models. It is also the primary theory behind many textbook formulas in fluid mechanics. The concept of similitude is strongly tied to dimensional analysis.
  • 867
  • 24 Oct 2022
Topic Review
High-Level Shading Language
The High-Level Shader Language or High-Level Shading Language (HLSL) is a proprietary shading language developed by Microsoft for the Direct3D 9 API to augment the shader assembly language, and went on to become the required shading language for the unified shader model of Direct3D 10 and higher. HLSL is analogous to the GLSL shading language used with the OpenGL standard. It is very similar to the Nvidia Cg shading language, as it was developed alongside it. Early versions of the two languages were considered identical, only marketed differently. HLSL shaders can enable profound speed and detail increases as well as many special effects in both 2D and 3D computer graphics. HLSL programs come in six forms: pixel shaders (fragment in GLSL), vertex shaders, geometry shaders, compute shaders, tessellation shaders (Hull and Domain shaders), and ray tracing shaders (Ray Generation Shaders, Intersection Shaders, Any Hit/Closest Hit/Miss Shaders). A vertex shader is executed for each vertex that is submitted by the application, and is primarily responsible for transforming the vertex from object space to view space, generating texture coordinates, and calculating lighting coefficients such as the vertex's normal, tangent, and bitangent vectors. When a group of vertices (normally 3, to form a triangle) come through the vertex shader, their output position is interpolated to form pixels within its area; this process is known as rasterization. Optionally, an application using a Direct3D 10/11/12 interface and Direct3D 10/11/12 hardware may also specify a geometry shader. This shader takes as its input some vertices of a primitive (triangle/line/point) and uses this data to generate/degenerate (or tessellate) additional primitives or to change the type of primitives, which are each then sent to the rasterizer. D3D11.3 and D3D12 introduced Shader Model 5.1 and later 6.0.
  • 867
  • 20 Nov 2022
Topic Review
Shadow of the Beast
Shadow of the Beast is a platform game developed by Reflections and published by Psygnosis in 1989. The original version was released for the Amiga, and was later ported to many other systems. The game was known for its graphics, with many colours on screen and up to twelve levels of parallax scrolling backdrops, and for its atmospheric score composed by David Whittaker that used high-quality instrument samples. It was followed by two sequels, Shadow of the Beast II in 1990 and Shadow of the Beast III in 1993. A remake was released for the PlayStation 4 in May 2016, and included the Amiga original.
  • 866
  • 14 Oct 2022
Topic Review
Feit–Thompson Theorem
In mathematics, the Feit–Thompson theorem, or odd order theorem, states that every finite group of odd order is solvable. It was proved by Walter Feit and John Griggs Thompson (1962, 1963).
  • 866
  • 22 Nov 2022
Topic Review
Trusted System
In the security engineering subspecialty of computer science, a trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system is one whose failure would break a security policy (if a policy exists that the system is trusted to enforce). The word "trust" is critical, as it does not carry the meaning that might be expected in everyday usage. A trusted system is one that the user feels safe to use, and trusts to perform tasks without secretly executing harmful or unauthorized programs; trusted computing refers to whether programs can trust the platform to be unmodified from the expected, and whether or not those programs are innocent ormalicious or whether they execute tasks that are undesired by the user. A trusted system can also be seen as a level-based security system where protection is provided and handle]]d according to different levels. This is commonly found in the military, where information is categorized as unclassified (U), confidential (C), Secret (S), Top secret (TS), and beyond. These also enforce the policies of no read-up and no write-down.
  • 865
  • 28 Sep 2022
Biography
William H. Press
William Henry Press (born May 23, 1948) is an astrophysicist, theoretical physicist, computer scientist, and computational biologist. He is a member of the U.S. National Academy of Sciences, the American Academy of Arts and Sciences, and the Council on Foreign Relations. Other honors include the 1981 Helen B. Warner Prize for Astronomy.[1][2] Press has been a member of the JASON defense advisory
  • 863
  • 28 Nov 2022
Topic Review
COHERENS
COHERENS is an open-source hydrodynamic computer model for shallow waters. It was developed in the 1990s by the Royal Belgian Institute of Natural Sciences (RBINS). The name COHERENS is an acronym of COupled Hydrodynamical Ecological model for REgioNal Shelf seas. COHERENS can be used in 1D, 2D or 3D mode and can model both salt waters such as coastal and shelf seas and freshwater basins such as lakes. Applications of the model include obtaining a better understanding of shallow water systems and managing pollution.
  • 860
  • 19 Oct 2022
Topic Review
Magnus Expansion
In mathematics and physics, the Magnus expansion, named after Wilhelm Magnus (1907–1990), provides an exponential representation of the solution of a first-order homogeneous linear differential equation for a linear operator. In particular, it furnishes the fundamental matrix of a system of linear ordinary differential equations of order n with varying coefficients. The exponent is aggregated as an infinite series, whose terms involve multiple integrals and nested commutators.
  • 854
  • 21 Oct 2022
Topic Review
Open Source in Kosovo
The first project in open source in Kosovo was the adjustment of Open Office Packet in December 2003. On 28 July 2004 the Albanian team, users of Linux (GGSL), was one of the first public organizations for the purpose of getting information about the field of open source. This conference was called "Software Freedom Day". Software Freedom Day is known as the first initiative about FOSS in Kosovo in the level of conference. The purpose of that conference was to promote the free and open software. Some of the issues that were discussed were about Linux, what is free software and open sources in general. Another issue that was discussed in that conference was about the operative system Linux and its benefits. KDE and GNOME were the last issues that were discussed in conference. Ati-Kos has made some surveys in five municipal assemblies of Kosovo in May 2005. According to this survey about 98.6% wanted software box in mother tongue, in Albanian. In another survey, the majority of the participants believed that a software box like Open Office would help in increasing the productivity in different fields because of the interface in Albanian.
  • 853
  • 15 Nov 2022
Topic Review
BitFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 849
  • 01 Dec 2022
Topic Review
H2O
H2O is open-source software for big-data analysis. It is produced by the company H2O.ai. H2O allows users to fit thousands of potential models as part of discovering patterns in data. The H2O software runs can be called from the statistical package R, Python, and other environments. It is used for exploring and analyzing datasets held in cloud computing systems and in the Apache Hadoop Distributed File System as well as in the conventional operating-systems Linux, macOS, and Microsoft Windows. The H2O software is written in Java, Python, and R. Its graphical-user interface is compatible with four browsers: Chrome, Safari, Firefox, and Internet Explorer.
  • 848
  • 30 Nov 2022
  • Page
  • of
  • 47
Academic Video Service