You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
IoT Critical Infrastructure security
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. 
  • 1.1K
  • 19 Aug 2021
Topic Review
Simulation of Sunspot Cycles
Numerous systems in nature exhibit oscillatory dynamics suggesting common underlying processes. Without knowing an exact interacting mechanism, predictive modelling applied to known count data of a system can provide a non-statistical solution defining its evolution. A recursive difference equation is used to describe the evolution of sunspots and solar cycles in the discrete time domain. Sunspot count for solar cycle 21 is pulse-like over an 11-year period, definable by the product of a pair of growth and decay logistic difference equations. Oscillatory behaviour of multiple solar cycles 22 to 24 up to 2010 are modelled by stabilizing a delayed logistic difference equation.
  • 1.1K
  • 28 Sep 2021
Topic Review
Cognitive Ecology of Religion
Cognitive ecology of religion is an integrative approach to studying how religious beliefs covary with social and natural dynamics of the environment. This is done by incorporating a cognitive ecological perspective to cross-cultural god concepts. Religious beliefs are thought to be a byproduct of domain-specific cognitive modules that give rise to religious cognition. The cognitive biases leading to religious belief are constraints on perceptions of the environment, which is part and parcel of a cognitive ecological approach. This means that they not only shape religious beliefs, but they are determinants of how successfully cultural beliefs are transmitted. Furthermore, cognition and behavior are inextricably linked, so the consequences of cultural concepts are associated with behavioral outcomes (i.e., continued interactions with the environment). For religion, behaviors often take the form of rituals and are similarly executed as a consequence of beliefs. Because the religious beliefs distributed in a population are relevant to their behavioral strategies and fine-tuned by natural selection, cross-cultural representations of gods and their characteristics are hypothesized to address ecologically relevant challenges. In other words, religious beliefs are thought to frequently involve solutions, insofar as evolved cognitive equipment can build them, to social and natural environmental problems faced by a given population.
  • 1.1K
  • 10 Oct 2022
Topic Review
Root System of a Semi-simple Lie Algebra
In mathematics, there is a one-to-one correspondence between reduced crystallographic root systems and semisimple Lie algebras. Here the construction of a root system of a semisimple Lie algebra – and, conversely, the construction of a semisimple Lie algebra from a reduced crystallographic root system – are shown.
  • 1.1K
  • 17 Nov 2022
Topic Review
Systems Thinking and Simulation for Sustainability Education
Education for sustainable development (ESD) is considered vital to the success of the United Nations’ sustainable development goals. Systems thinking has been identified as a core competency that must be included in ESD. However, systems thinking-orientated ESD learning tools, established methods for assessment of sustainability skills, and formal trials to demonstrate the effectiveness of such learning tools are all lacking. Furthermore, simulation is seen by many Systems Thinkers as essential for learning about complex systems. Therefore, whether Systems Thinking theory, interactive simulation, or both, offer the best learning outcomes for sustainability education, is also an important question. A randomised controlled study found that simulation alone significantly increased sustainability learning outcomes. Simulation, together with systems archetypes, was also found to significantly support transfer of understanding from one problem to another with a similar systemic structure, although at a lower level of confidence.
  • 1.1K
  • 06 Jan 2022
Topic Review
Missing-Digit Sum
Missing-digit sums are integer numbers that are equal to the sum of numbers created by deleting one or more digits at a time from the original number. For example, the OEIS lists these two integers as missing-digit sums in base ten: Missing-digit sums are therefore a subset of narcissistic numbers, when these are defined as numbers that are equal to some manipulation of their own digits (for example, 153 and 132 are narcissistic numbers in base ten because 153 = 13 + 53 + 33 and 132 = 13 + 32 + 12 + 31 + 23 + 21).
  • 1.1K
  • 27 Oct 2022
Topic Review
Infrastructure as Code
Infrastructure as code (IaC) is the process of managing and provisioning computer data centers through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. The IT infrastructure managed by this comprises both physical equipment such as bare-metal servers as well as virtual machines and associated configuration resources. The definitions may be in a version control system. It can use either scripts or declarative definitions, rather than manual processes, but the term is more often used to promote declarative approaches. IaC approaches are promoted for cloud computing, which is sometimes marketed as infrastructure as a service (IaaS). IaC supports IaaS, but should not be confused with it.
  • 1.1K
  • 07 Nov 2022
Topic Review
Canadian Internet Registration Authority
The Canadian Internet Registration Authority (CIRA) (French: Autorité canadienne pour les enregistrements Internet ACEI) is the organization that manages the .ca country code top-level domain (ccTLD) for Canada. Its offices are located at 979 Bank Street in Ottawa, Ontario, Canada. CIRA sets the policies and agendas that support Canada's Internet community and Canada's involvement in international Internet governance. It is a member-driven organization with membership open to all that hold a .ca domain. As of May 2020, there were more than 2.9 million active .ca domains.
  • 1.1K
  • 09 Nov 2022
Topic Review
CryptoLocker
The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers running Microsoft Windows, and was believed to have first been posted to the Internet on 5 September 2013. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. When activated, the malware encrypted certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displayed a message which offered to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) was made by a stated deadline, and it threatened to delete the private key if the deadline passes. If the deadline was not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. There was no guarantee that payment would release the encrypted content. Although CryptoLocker itself was easily removed, the affected files remained encrypted in a way which researchers considered unfeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted. CryptoLocker was isolated in late May 2014 via Operation Tovar, which took down the Gameover ZeuS botnet that had been used to distribute the malware. During the operation, a security firm involved in the process obtained the database of private keys used by CryptoLocker, which was in turn used to build an online tool for recovering the keys and files without paying the ransom. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. Other instances of encryption-based ransomware that have followed have used the "CryptoLocker" name (or variations), but are otherwise unrelated.
  • 1.1K
  • 14 Nov 2022
Topic Review
Decision Intelligence
Decision intelligence is an engineering discipline that augments data science with theory from social science, decision theory, and managerial science. Its application provides a framework for best practices in organizational decision-making and processes for applying machine learning at scale. The basic idea is that decisions are based on our understanding of how actions lead to outcomes. Decision intelligence is a discipline for analyzing this chain of cause-and-effect, and decision modeling is a visual language for representing these chains.
  • 1.1K
  • 09 Nov 2022
Topic Review
High-Level Shading Language
The High-Level Shader Language or High-Level Shading Language (HLSL) is a proprietary shading language developed by Microsoft for the Direct3D 9 API to augment the shader assembly language, and went on to become the required shading language for the unified shader model of Direct3D 10 and higher. HLSL is analogous to the GLSL shading language used with the OpenGL standard. It is very similar to the Nvidia Cg shading language, as it was developed alongside it. Early versions of the two languages were considered identical, only marketed differently. HLSL shaders can enable profound speed and detail increases as well as many special effects in both 2D and 3D computer graphics. HLSL programs come in six forms: pixel shaders (fragment in GLSL), vertex shaders, geometry shaders, compute shaders, tessellation shaders (Hull and Domain shaders), and ray tracing shaders (Ray Generation Shaders, Intersection Shaders, Any Hit/Closest Hit/Miss Shaders). A vertex shader is executed for each vertex that is submitted by the application, and is primarily responsible for transforming the vertex from object space to view space, generating texture coordinates, and calculating lighting coefficients such as the vertex's normal, tangent, and bitangent vectors. When a group of vertices (normally 3, to form a triangle) come through the vertex shader, their output position is interpolated to form pixels within its area; this process is known as rasterization. Optionally, an application using a Direct3D 10/11/12 interface and Direct3D 10/11/12 hardware may also specify a geometry shader. This shader takes as its input some vertices of a primitive (triangle/line/point) and uses this data to generate/degenerate (or tessellate) additional primitives or to change the type of primitives, which are each then sent to the rasterizer. D3D11.3 and D3D12 introduced Shader Model 5.1 and later 6.0.
  • 1.1K
  • 20 Nov 2022
Biography
William H. Press
William Henry Press (born May 23, 1948) is an astrophysicist, theoretical physicist, computer scientist, and computational biologist. He is a member of the U.S. National Academy of Sciences, the American Academy of Arts and Sciences, and the Council on Foreign Relations. Other honors include the 1981 Helen B. Warner Prize for Astronomy.[1][2] Press has been a member of the JASON defense advisory
  • 1.1K
  • 28 Nov 2022
Topic Review
Compositing
Compositing is the combining of visual elements from separate sources into single images, often to create the illusion that all those elements are parts of the same scene. Live-action shooting for compositing is variously called "chroma key", "blue screen", "green screen" and other names. Today, most, though not all, compositing is achieved through digital image manipulation. Pre-digital compositing techniques, however, go back as far as the trick films of Georges Méliès in the late 19th century, and some are still in use.
  • 1.1K
  • 11 Nov 2022
Topic Review
Textile-Based Sensors for Biosignal Detection
Biosignals often have to be detected in sports or for medical reasons. Typical biosignals are pulse and ECG (electrocardiogram), breathing, blood pressure, skin temperature, oxygen saturation, bioimpedance, etc. Typically, scientists attempt to measure these biosignals noninvasively, i.e., with electrodes or other sensors, detecting electric signals, measuring optical or chemical information.
  • 1.1K
  • 13 Sep 2021
Topic Review
Igo Hatsuyōron
Igo Hatsuyōron (囲碁 発陽論, literally : On yang production in the game of go, often abbreviated Hatsuyōron) is a collection of 183 go problems (mostly tsumego), compiled in 1713 by the Japanese go master Inoue Dōsetsu Inseki. Until the end of the 19th century, the Hatsuyōron remained a closely guarded secret of the Inoue house, where it was used to drill the best disciples in the tactics. It became public after the collapse of the Four go houses; several incorrect editions are published, before the discovery in 1982 of a copy that is close to the original now lost. Igo Hatsuyōron is considered the most difficult of such collections, and as such is still used for training Go professionals. It contains many problems so complex that false or incomplete solutions were given in the first editions, and in particular an exceptional problem by its theme and its depth, rediscovered in 1982, and which is not yet completely solved in 2015.
  • 1.1K
  • 12 Oct 2022
Topic Review
Recommendations for Integrating P300-based BCI
The integration of a P300-based brain-computer interface (BCI) into virtual reality (VR) environments is promising for the video games industry. However, it faces several limitations, mainly due to hardware constraints and limitations engendered by the stimulation needed by the BCI. The main restriction is still the low transfer rate that can be achieved by current BCI technology, preventing movement while using VR. Adventure and simulation games, appear to be the best candidates for designing an effective VR game enriched by BCI technology.
  • 1.1K
  • 10 Dec 2020
Topic Review
Similitude (Model)
Similitude is a concept applicable to the testing of engineering models. A model is said to have similitude with the real application if the two share geometric similarity, kinematic similarity and dynamic similarity. Similarity and similitude are interchangeable in this context. The term dynamic similitude is often used as a catch-all because it implies that geometric and kinematic similitude have already been met. Similitude's main application is in hydraulic and aerospace engineering to test fluid flow conditions with scaled models. It is also the primary theory behind many textbook formulas in fluid mechanics. The concept of similitude is strongly tied to dimensional analysis.
  • 1.1K
  • 24 Oct 2022
Topic Review
Agrippa (A Book of the Dead)
Agrippa (A Book of the Dead) is a work of art created by science fiction novelist William Gibson, artist Dennis Ashbaugh and publisher Kevin Begos Jr. in 1992. The work consists of a 300-line semi-autobiographical electronic poem by Gibson, embedded in an artist's book by Ashbaugh. Gibson's text focused on the ethereal, human-owed nature of memories retained over the passage of time (the title referred to a Kodak photo album from which the text's memories are taken). Its principal notoriety arose from the fact that the poem, stored on a 3.5" floppy disk, was programmed to encrypt itself after a single use; similarly, the pages of the artist's book were treated with photosensitive chemicals, effecting the gradual fading of the words and images from the book's first exposure to light.
  • 1.1K
  • 24 Oct 2022
Topic Review
Forensic Search
Forensic search is an emerging field of computer forensics. Forensic search focuses on user created data such as email files, cell phone records, office documents, PDFs and other files that are easily interpreted by a person. Forensic search differs from computer forensic analysis in that it does not seek to review or analyze the lower level system files such as the registry, link files or disk level issues more commonly associated with traditional computer forensic analysis.
  • 1.1K
  • 27 Oct 2022
Topic Review
CVF (File Format)
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 1.1K
  • 15 Nov 2022
  • Page
  • of
  • 48
Academic Video Service