Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
SHIFT (DOS Command)
This research presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
719
19 Oct 2022
Topic Review
Data Storage and Retrieval Using IPFS and Blockchain
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic and technological issues. Namely, the blockchain usually stores only a fingerprint of data, such as the hash of data, while full, raw information is stored off-chain. This is generally enough to guarantee immutability and traceability, but misses to support another important property, that is, data availability. This is particularly true when a traditional, centralized database is chosen for off-chain storage. For this reason, many proposals try to properly combine blockchain with decentralized IPFS storage. However, the storage of data on IPFS could pose some privacy problems. This entry proposes a solution that properly combines blockchain, IPFS, and encryption techniques to guarantee immutability, traceability, availability, and data privacy.
719
26 Mar 2024
Topic Review
Sensor Data Fusion Algorithms
Sensor Data Fusion (SDT) algorithms and methods have been utilised in many applications ranging from automobiles to healthcare systems. They can be used to design a redundant, reliable, and complementary system with the intent of enhancing the system’s performance. SDT can be multifaceted, involving many representations such as pixels, features, signals, and symbols.
716
12 Dec 2023
Topic Review
Service Virtualisation
Continuous delivery is an industry software development approach that aims to reduce the delivery time of software and increase the quality assurance within a short development cycle. The fast delivery and improved quality require continuous testing of the developed software service. Testing services are complicated and costly and postponed to the end of development due to unavailability of the requisite services. Therefore, an empirical approach that has been utilised to overcome these challenges is to automate software testing by virtualising the requisite services’ behaviour for the system being tested. Service virtualisation involves analysing the behaviour of software services to uncover their external behaviour in order to generate a light-weight executable model of the requisite services. There are different research areas which can be used to create such a virtual model of services from network interactions or service execution logs, including message format extraction, inferring control model, data model and multi-service dependencies.
713
07 Apr 2021
Topic Review
BitFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
713
01 Dec 2022
Topic Review
Scientific Workflow System
A scientific workflow system is a specialized form of a workflow management system designed specifically to compose and execute a series of computational or data manipulation steps, or workflow, in a scientific application.
708
24 Oct 2022
Topic Review
Bunyakovsky Conjecture
The Bunyakovsky conjecture (or Bouniakowsky conjecture) gives a criterion for a polynomial [math]\displaystyle{ f(x) }[/math] in one variable with integer coefficients to give infinitely many prime values in the sequence[math]\displaystyle{ f(1), f(2), f(3),\ldots. }[/math] It was stated in 1857 by the Russian mathematician Viktor Bunyakovsky. The following three conditions are necessary for [math]\displaystyle{ f(x) }[/math] to have the desired prime-producing property: Bunyakovsky's conjecture is that these conditions are sufficient: if [math]\displaystyle{ f(x) }[/math] satisfies (1)-(3), then [math]\displaystyle{ f(n) }[/math] is prime for infinitely many positive integers [math]\displaystyle{ n }[/math].
707
31 Oct 2022
Topic Review
Blockchain Technology Used for Smart Drone Swarms
Intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. The concept of leveraging blockchain technology to address problems with identification, security, and storage in UAV clusters is not new. There have been many approaches that have used novel methods to examine how we can use the benefits of blockchain technology to lessen these issues.
707
14 Nov 2023
Topic Review
Security of Transport Layer Security
This article discusses the security of the Transport Layer Security (TLS) internet protocol.
706
17 Oct 2022
Topic Review
MediaMax CD-3
MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and computer security experts regard the software as a form of malware since its purpose is to intercept and inhibit normal computer operation without the user's authorization. MediaMax received media attention in late 2005 in fallout from the Sony XCP copy protection scandal. MediaMax is a second-generation system meant to address the problems of earlier copy-preventing schemes, where many types of playback devices had difficulty reading discs in normal use. MediaMax was first used on Anthony Hamilton's Comin' From Where I'm From in the United States ; the first US No. 1 CD to use it was Velvet Revolver's Contraband. (The European release of the Velvet Revolver album used Macrovision CDS-200 and the Japan ese is without copy protection.)
703
20 Oct 2022
Topic Review
Heuristic (Computer Science)
In mathematical optimization and computer science, heuristic (from Greek εὑρίσκω "I find, discover") is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution. This is achieved by trading optimality, completeness, accuracy, or precision for speed. In a way, it can be considered a shortcut. A heuristic function, also simply called a heuristic, is a function that ranks alternatives in search algorithms at each branching step based on available information to decide which branch to follow. For example, it may approximate the exact solution.
702
14 Oct 2022
Topic Review
July 2009 Cyberattacks
The July 2009 cyberattacks were a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States . The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec's Security Technology Response group, and more than 166,000 according to a Vietnamese computer security researcher who analyzed the log files of the two servers the attackers controlled. An investigation revealed that at least 39 websites were targets in the attacks based on files stored on compromised systems. The targeting and timing of the attacks—which started the same day as a North Korean short-range ballistic missile test—have led to suggestions that they may be from North Korea, although these suggestions have not been substantiated. Researchers would later find links between these cyberattacks, the DarkSeoul attacks in 2013, and other attacks attributed to the Lazarus Group. This attack is considered by some to be the beginning of a series of DDoS attacks carried about by Lazarus dubbed "Operation Troy."
702
11 Nov 2022
Topic Review
Satisfaction Equilibrium
In game theory, a satisfaction equilibrium is a solution concept for a class of non-cooperative games, namely games in satisfaction form. Games in satisfaction form model situations in which players aim at satisfying a given individual constraint, e.g., a performance metric must be smaller or bigger than a given threshold. When a player satisfies its own constraint, the player is said to be satisfied. A satisfaction equilibrium, if it exists, arises when all players in the game are satisfied.
700
07 Nov 2022
Topic Review
Microsoft Double Space BIOS Parameter Block
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
699
12 Oct 2022
Topic Review
Loco2
Loco2, now rebranded as Rail Europe, is an online booking service for train travel in the United Kingdom and Europe. It sells tickets through its website and via its smartphone app which is available on iOS and Android platforms. It was founded in 2006 by brother and sister Jamie and Kate Andrews, and started trading in 2012 from its headquarters in London. Loco2 website and apps were rebranded Rail Europe in November 2019.
699
19 Oct 2022
Topic Review
Xi (Alternate Reality Game)
Xi (UK: /ˈsaɪ/ or US: /ˈzaɪ/) was the world's first console-based and virtual world-based alternate reality game. It was a one-time-only play, unfolding in real time, and only available on the PlayStation 3 through the social gaming network, PlayStation Home. The game was an adventure to help find "Jess" and the meaning of Xi by collecting fragments and butterflies found in a series of secret areas in Home that changed frequently. The game also challenged the users to search for clues in the real world. The game was created by nDreams who released several spaces for Xi. The game was promoted through a teaser campaign of clues and hints during the month prior to its release on March 23, 2009. The clues were hidden in the Menu Pad and videos in the central meeting point. The game lasted a total of 12 weeks from its release. Xi and all of the corresponding spaces were exclusive to the European and North American versions of PlayStation Home, though there were also websites, videos, printed media and live events which were accessible to anyone. In September 2009, it was reported that the number of visits to the Xi spaces, including the ones after Xi's completion, had exceeded 5 million visits. A sequel, Xi: Continuum, was released in December 2012.
690
30 Oct 2022
Topic Review
Glossary of Graph Theory Terms
This is a glossary of graph theory terms. Graph theory is the study of graphs, systems of nodes or vertices connected in pairs by edges.
690
16 Nov 2022
Topic Review
Propellerhead Software
Reason Studios (formerly known as Propellerhead Software) is a music software company, based in Stockholm, Sweden, and founded in 1994. It produces the studio emulation Reason.
689
04 Nov 2022
Topic Review
MediaWiki Extension
MediaWiki extensions allow MediaWiki to be made more advanced and useful for various purposes. These extensions vary greatly in complexity. The Wikimedia Foundation operates a Git server where many extensions are hosted, and a directory of them can be found on the MediaWiki website. Some other sites also are known for development of—or support for—extensions are MediaWiki.org, which maintains an extension matrix; and Google Code. MediaWiki code review is itself facilitated through a Gerrit instance. Since version 1.16 MediaWiki also used the jQuery library.
688
09 Nov 2022
Topic Review
Chinese Cyberwarfare
China is both the world's second-largest economy and a nuclear weapons state with the world's second-largest defense budget. Chinese Information Operations and Information Warfare includes the concept of “network warfare”, which is roughly analogous to the United States concept of cyber-warfare. Foreign Policy magazine provided an estimated range for China's "hacker army" personnel, anywhere from 50,000 to 100,000 individuals. Western countries have long accused China of aggressive espionage, and while investigations have traced various attacks on corporate and infrastructure computer systems to have originated in China , "it is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace." China has denied these accusations of cyber-warfare and has, in turn, accused the United States of engaging in cyber-warfare against China - a claim the US government denies.
684
11 Oct 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Engineering
Volume 1 (2023) >>
Chief Editor:
Raffaele Barretta
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
Video Production Service
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×