Topic Review
Network Medicine
Network medicine is the application of network science towards identifying, preventing, and treating diseases. This field focuses on using network topology and network dynamics towards identifying diseases and developing medical drugs. Biological networks, such as protein-protein interactions and metabolic pathways, are utilized by network medicine. Disease networks, which map relationships between diseases and biological factors, also play an important role in the field. Epidemiology is extensively studied using network science as well; social networks and transportation networks are used to model the spreading of disease across populations. Network medicine is a medically focused area of systems biology.
  • 595
  • 27 Oct 2022
Topic Review
Foreman
Foreman (also known as The Foreman) is an open source complete life cycle systems management tool for provisioning, configuring and monitoring of physical and virtual servers. Foreman has deep integration to configuration management software, with Ansible, Puppet, Chef, Salt and other solutions through plugins, which allows users to automate repetitive tasks, deploy applications, and manage change to deployed servers. Foreman provides provisioning on bare-metal (through managed DHCP, DNS, TFTP, and PXE-based unattended installations), virtualization and cloud. Foreman provides comprehensive, auditable interaction facilities including a web frontend, a command line interface, and a robust REST API.
  • 593
  • 16 Nov 2022
Topic Review
Divide and Conquer Algorithm
In computer science, divide and conquer is an algorithm design paradigm based on multi-branched recursion. A divide and conquer algorithm works by recursively breaking down a problem into two or more sub-problems of the same or related type, until these become simple enough to be solved directly. The solutions to the sub-problems are then combined to give a solution to the original problem. This divide and conquer technique is the basis of efficient algorithms for all kinds of problems, such as sorting (e.g., quicksort, merge sort), multiplying large numbers (e.g. the Karatsuba algorithm), finding the closest pair of points, syntactic analysis (e.g., top-down parsers), and computing the discrete Fourier transform (FFTs) . Understanding and designing divide and conquer algorithms is a complex skill that requires a good understanding of the nature of the underlying problem to be solved. As when proving a theorem by induction, it is often necessary to replace the original problem with a more general or complicated problem in order to initialize the recursion, and there is no systematic method for finding the proper generalization. These divide and conquer complications are seen when optimizing the calculation of a Fibonacci number with efficient double recursion . The correctness of a divide and conquer algorithm is usually proved by mathematical induction, and its computational cost is often determined by solving recurrence relations.
  • 590
  • 01 Nov 2022
Topic Review
Negation and Speculation Corpora in Natural Language Processing
Negation and speculation are universal linguistic phenomena that affect the performance of Natural Language Processing (NLP) applications, such as those for opinion mining and information retrieval, especially in biomedical data. 
  • 589
  • 20 Jun 2022
Topic Review
Comprehensive School Mathematics Program
Comprehensive School Mathematics Program (CSMP) stands for both the name of a curriculum and the name of the project that was responsible for developing curriculum materials in the United States. Two major curricula were developed as part of the overall CSMP project: the Comprehensive School Mathematics Program (CSMP), a K–6 mathematics program for regular classroom instruction, and the Elements of Mathematics (EM) program, a grades 7–12 mathematics program for gifted students. EM treats traditional topics rigorously and in-depth, and was the only curriculum that strictly adhered to Goals for School Mathematics: The Report of the Cambridge Conference on School Mathematics (1963). As a result, it includes much of the content generally required for an undergraduate mathematics major. These two curricula are unrelated to one another, but certain members of the CSMP staff contributed to the development of both projects. Additionally, some staff were involved with the Secondary School Mathematics Curriculum Improvement Study program being developed around the same time. What follows is a description of the K–6 program that was designed for a general, heterogeneous audience. The CSMP project was established in 1966, under the direction of Burt Kaufman, who remained director until 1979, succeeded by Clare Heidema. It was originally affiliated with Southern Illinois University in Carbondale, Illinois. After a year of planning, CSMP was incorporated into the Central Midwest Regional Educational Laboratory (later CEMREL, Inc.), one of the national educational laboratories funded at that time by the U.S. Office of Education. In 1984, the project moved to Mid-continental Research for Learning (McREL) Institute's Comprehensive School Reform program, who supported the program until 2003. Heidema remained director to its conclusion. In 1984, it was implemented in 150 school districts in 42 states and about 55,000 students.
  • 589
  • 18 Oct 2022
Topic Review
Reactive Transport Modeling in Porous Media
Reactive transport modeling in porous media refers to the creation of computer models integrating chemical reaction with transport of fluids through the Earth's crust. Such models predict the distribution in space and time of the chemical reactions that occur along a flowpath. Reactive transport modeling in general can refer to many other processes, including reactive flow of chemicals through tanks, reactors, or membranes; particles and species in the atmosphere; gases exiting a smokestack; and migrating magma.
  • 589
  • 16 Nov 2022
Topic Review
Physics of the Future
Physics of the Future: How Science Will Shape Human Destiny and Our Daily Lives by the Year 2100 is a 2011 book by theoretical physicist Michio Kaku, author of Hyperspace and Physics of the Impossible. In it Kaku speculates about possible future technological development over the next 100 years. He interviews notable scientists about their fields of research and lays out his vision of coming developments in medicine, computing, artificial intelligence, nanotechnology, and energy production. The book was on the New York Times Bestseller List for five weeks. Kaku writes how he hopes his predictions for 2100 will be as successful as science fiction writer Jules Verne's 1863 novel Paris in the Twentieth Century. Kaku contrasts Verne's foresight against U.S. Postmaster General John Wanamaker, who in 1893 predicted that mail would still be delivered by stagecoach and horseback in 100 years' time, and IBM chairman Thomas J. Watson, who in 1943 is alleged to have said "I think there is a world market for maybe five computers." Kaku points to this long history of failed predictions against progress to underscore his notion "that it is very dangerous to bet against the future".
  • 588
  • 24 Oct 2022
Topic Review
Blockchain Technology Used for Smart Drone Swarms
Intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. The concept of leveraging blockchain technology to address problems with identification, security, and storage in UAV clusters is not new. There have been many approaches that have used novel methods to examine how we can use the benefits of blockchain technology to lessen these issues.
  • 586
  • 14 Nov 2023
Topic Review
Cyber–Physical Systems Forensics
Cyber–Physical Systems (CPS) connect the physical world (systems, environments, and humans) with the cyber world (software, data, etc.) to intelligently enhance the operational environment they serve. CPS are distributed software and hardware components embedded in the physical world and possibly attached to humans. CPS are vulnerable to security risks, which requires incorporating appropriate forensics measures in the design and operations of these systems.
  • 586
  • 17 Dec 2021
Topic Review
Satisfaction Equilibrium
In game theory, a satisfaction equilibrium is a solution concept for a class of non-cooperative games, namely games in satisfaction form. Games in satisfaction form model situations in which players aim at satisfying a given individual constraint, e.g., a performance metric must be smaller or bigger than a given threshold. When a player satisfies its own constraint, the player is said to be satisfied. A satisfaction equilibrium, if it exists, arises when all players in the game are satisfied.
  • 583
  • 07 Nov 2022
Topic Review
Set Notation
Sets are fundamental objects in mathematics. Intuitively, a set is merely a collection of elements or members. There are various conventions for textually denoting sets. In any particular situation, an author typically chooses from among these conventions depending on which properties of the set are most relevant to the immediate context or on which perspective is most useful.
  • 581
  • 17 Oct 2022
Topic Review
Service Virtualisation
Continuous delivery is an industry software development approach that aims to reduce the delivery time of software and increase the quality assurance within a short development cycle. The fast delivery and improved quality require continuous testing of the developed software service. Testing services are complicated and costly and postponed to the end of development due to unavailability of the requisite services. Therefore, an empirical approach that has been utilised to overcome these challenges is to automate software testing by virtualising the requisite services’ behaviour for the system being tested. Service virtualisation involves analysing the behaviour of software services to uncover their external behaviour in order to generate a light-weight executable model of the requisite services. There are different research areas which can be used to create such a virtual model of services from network interactions or service execution logs, including message format extraction, inferring control model, data model and multi-service dependencies.
  • 574
  • 07 Apr 2021
Topic Review
Spectral Estimation of Multidimensional Signals
Power spectral estimation forms the basis for distinguishing and tracking signals in the presence of noise and extracting information from available data. One dimensional signals are expressed in terms of a single domain while multidimensional signals are represented in wave vector and frequency spectrum. Therefore, spectral estimation in the case of multidimensional signals gets a bit tricky.
  • 574
  • 14 Oct 2022
Topic Review
Cryptographic Engineering
Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate. Below are the main topics that are specifically related to cryptographic engineering: Cryptographic implementations Attacks against implementations and countermeasures against these attacks Tools and methodologies Applications Interactions between cryptographic theory and implementation issues
  • 573
  • 08 Nov 2022
Topic Review
Social Affordance
Social affordance is a type of affordance. It refers to the properties of an object or environment that permit social actions. Social affordance is most often used in the context of a social technology such as Wiki, Chat and Facebook applications and refers to sociotechnical affordances. Social affordances emerge from the coupling between the behavioral and cognitive capacities of a given organism and the objective properties of its environment. Social affordances – or more accurately sociotechnical affordances – refer as reciprocal interactions between a technology application, its users, and its social context. These social interactions include users’ responses, social accessibility and society related changes. Social affordances are not synonymous with mere factual, statistical frequency; on the contrary, the social normality of primitive forms of coordination can become normative, even in primate societies. A good example clarifies social affordance as follows: “ A wooden bench is supposed to have a sit affordance. A hiker who has walked for hours and passes the wooden bench on a walk along small country roads might perceive the sit affordance of the wooden bench as a function of the degree of fatigue. A very tired hiker will sit on the wooden bench but will not lie down (unless the wooden bench also has a lie affordance). A still fit hiker, however, might not even pick up on the sit affordance of the bench and pass it. The wooden bench is in that case no more than a piece of wood with no further meaning.”
  • 572
  • 01 Nov 2022
Topic Review
COVID Mortality Prediction
The considerations in this review may help to develop further studies to predict mortality in COVID patients, including both adulthood and childhood, although children and young people remain at low risk of COVID mortality. Moreover, suggestions collected in this study could also be useful to predict prognoses other than mortality (e.g., intubation and length of hospital stay).
  • 570
  • 27 Oct 2021
Topic Review
Human-Computer Interaction Institute
The Human-Computer Interaction Institute (HCII) is a department within the School of Computer Science at Carnegie Mellon University (CMU) in Pittsburgh, Pennsylvania. It is considered one of the leading centers of human-computer interaction research, and was named one of the top ten most innovative schools in information technology by Computer World in 2008. For the past three decades, the institute has been the predominant publishing force at leading HCI venues, most notably ACM CHI, where it regularly contributes more than 10% of the papers. Research at the institute aims to understand and create technology that harmonizes with and improves human capabilities by integrating aspects of computer science, design, social science, and learning science. Depending on the selected coursework that the student decides to take (in addition to some core classes), they are able to form a schedule specific to the field they are interested in. For example, if a student is specifically interested in pursuing a user experience design profession, they are able to choose courses that focus mainly on the design process behind applications. If the student is interested in product management or project management, they can select electives that encourage group work and cross-collaboration across majors so that they may learn some of the tasks of these professions. A list of courses and course descriptions is included below. HCII offers an HCI major for undergraduates, as well a master's degree and a PhD in HCI. Students from various academic backgrounds come together from around the world to participate in these programs. Students enter the program at various stages in their academic and professional careers, with various levels of experience. HCII research and educational programs span a full cycle of value creation. The cycle includes research on how people work, play, and communicate within groups, organizations, and social structures. It includes the design, creation, and evaluation of technologies and tools to support human and social activities.
  • 569
  • 29 Sep 2022
Topic Review
MIDI 1.0
The Musical Instrument Digital Interface (MIDI) specification version 1.0 describes the communications protocol and the message format, as well electrical connector. MIDI 1.0 is a one-way connection from the MIDI Out connector of the sending device to the MIDI In connector of the receiving device, transmitted serially at a rate of 31.25 kbit/s.
  • 569
  • 15 Nov 2022
Topic Review
DSMod
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 567
  • 06 Oct 2022
Topic Review
Fictional Actuaries
Fictional actuaries and the appearance of actuaries in works of fiction have been the subject of a number of articles in actuarial journals.
  • 567
  • 26 Oct 2022
  • Page
  • of
  • 47
ScholarVision Creations