You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Tarbell Course in Magic
The Tarbell Course in Magic is a notable encyclopedia of magic amongst professional and amateur magicians. It has eight volumes; the first five were part of the original home-study correspondence course compiled in 1928 by Dr. Harlan Tarbell, the remaining three volumes being added on later. This magic volume series was originally designed as a correspondence course for budding magicians. Once they were collected and bound, the series has become an unparalleled reference standard for magicians. In its impact on the magic world, it is second perhaps in its influence on the art of magic only to Hoffman's Modern Magic, and many professional magicians have based their careers on the Tarbell Course.
  • 1.1K
  • 21 Oct 2022
Topic Review
Automedian Triangle
In plane geometry, an automedian triangle is a triangle in which the lengths of the three medians (the line segments connecting each vertex to the midpoint of the opposite side) are proportional to the lengths of the three sides, in a different order. The three medians of an automedian triangle may be translated to form the sides of a second triangle that is similar to the first one.
  • 1.1K
  • 17 Nov 2022
Topic Review
Seifert–Van Kampen Theorem
In mathematics, the Seifert–van Kampen theorem of algebraic topology (named after Herbert Seifert and Egbert van Kampen), sometimes just called van Kampen's theorem, expresses the structure of the fundamental group of a topological space [math]\displaystyle{ X }[/math] in terms of the fundamental groups of two open, path-connected subspaces that cover [math]\displaystyle{ X }[/math]. It can therefore be used for computations of the fundamental group of spaces that are constructed out of simpler ones.
  • 1.1K
  • 27 Oct 2022
Topic Review
Go Ranks and Ratings
There are various systems of Go ranks and ratings that measure the skill in the traditional board game Go. Traditionally, Go rankings have been measured using a system of dan and kyu ranks. Especially in amateur play, these ranks facilitate the handicapping system, with a difference of one rank roughly corresponding to one free move at the beginning of the game. This system is also commonly used in many East Asian martial arts, where it often corresponds with a belt color. With the ready availability of calculators and computers, rating systems have been introduced. In such systems, a rating is rigorously calculated on the basis of game results.
  • 1.1K
  • 29 Nov 2022
Topic Review
Feit–Thompson Theorem
In mathematics, the Feit–Thompson theorem, or odd order theorem, states that every finite group of odd order is solvable. It was proved by Walter Feit and John Griggs Thompson (1962, 1963).
  • 1.1K
  • 22 Nov 2022
Topic Review
EINTR
The Unix philosophy, originated by Ken Thompson, is a set of cultural norms and philosophical approaches to minimalist, modular software development. It is based on the experience of leading developers of the Unix operating system. Early Unix developers were important in bringing the concepts of modularity and reusability into software engineering practice, spawning a "software tools" movement. Over time, the leading developers of Unix (and programs that ran on it) established a set of cultural norms for developing software; these norms became as important and influential as the technology of Unix itself, and have been termed the "Unix philosophy." The Unix philosophy emphasizes building simple, compact, clear, modular, and extensible code that can be easily maintained and repurposed by developers other than its creators. The Unix philosophy favors composability as opposed to monolithic design.
  • 1.1K
  • 04 Nov 2022
Topic Review
No Postage Necessary
"No Postage Necessary” is a 2018 American romantic comedy independent film written and directed by Jeremy Culver as his second narrative feature and starring George Blagden, Charleene Closshey, Robbie Kay, Stelio Savante, with Michael Beach and Raymond J. Barry. The film integrates current political happenings—including the Silk Road (online marketplace) (referred to "The Spice Trail" in the film's script), hacktivism, and cyberterrorism—into a dramedy set in Plant City, FL. Principal photography began in Plant City, FL in August 2016 filming on 35mm film. The film initially premiered on October 14, 2017 as an Official Selection of the Heartland Film Festival. The shortened and final version later premiered on June 28, 2018 at the Tampa Theatre in Hillsborough County, Florida where the movie was filmed exclusively. It released in theaters in ten markets across the United States on July 6, 2018 by Two Roads Picture Co. as well as on the decentralized application Vevue, making history as the first film to ever release via blockchain technology and available to stream using cryptocurrency as payment. The film’s script is now part of the Core Collection of the Margaret Herrick Library at the Academy of Motion Picture Arts and Sciences. No Postage Necessary received mixed reviews, with praise for its heartfelt performances, music, production values, and ending that is “satisfying without artifice”, but criticism suggesting it relies too heavily on its unique distribution strategy as its "hook”.
  • 1.1K
  • 30 Sep 2022
Topic Review
Packard Bell Statesman
The Packard Bell Statesman was an economy line of notebook computers introduced in 1993 by Packard Bell. They were slower in performance and lacked features compared to most competitor products, but they were lower in price. It was created in a collaboration between Packard Bell and Zenith Data Systems. The Statesman series was essentially a rebrand of Zenith Data Systems Z-Star 433 series, with the only notable difference of the logo in the middle and text on the front bezel.
  • 1.1K
  • 27 Oct 2022
Topic Review
Power Soccer (Browser-based Game)
Power Soccer, also known as Power Challenge and PS, was a massively multiplayer online browser-based sports game, developed by the Swedish developer Power Challenge, the same company that develops ManagerZone (but PS focuses in the sports gameplay instead of management simulation). This game was a browser-based soccer simulator in which users could create a team and play against other users from all around the globe. Additional benefits were offered to those that purchased the Club Membership. Following a decline in interest from users in the game, it was announced that on May 16, 2016 Power Soccer would come to an end, encouraging users to join their sister game ManagerZone. The announcement was made months before the closure date, which led to many posts in the forums where some users even wanted to donate to keep the game afloat but to no avail, and in the early hours of May 16, 2016, the game closed.
  • 1.1K
  • 27 Sep 2022
Topic Review
Crowds
Crowds is a proposed anonymity network for anonymous web browsing. The main idea behind Crowds anonymity protocol is to hide each user's communications by routing them randomly within a group of similar users. Neither the collaborating group members nor the end receiver can therefore be sure where in the group the packet originated. Crowds was designed by Michael K. Reiter and Aviel D. Rubin. It defends against internal attackers and a corrupt receiver, but provides no anonymity against a global attacker or a local eavesdropper (see "Crowds: Anonymity For Web Transactions"). Crowds is vulnerable to the predecessor attack; this was discussed in Reiter and Rubin's paper and further expanded in "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems" by Matthew K. Wright, Micah Adler, And Brian Neil Levine. Crowds introduced the concept of users blending into a crowd of computers.
  • 1.1K
  • 08 Nov 2022
Topic Review
Complexity Economics
Complexity economics is the application of complexity science to the problems of economics. It sees the economy not as a system in equilibrium, but as one in motion, perpetually constructing itself anew. It uses computational and mathematical analysis to explore how economic structure is formed and reformed, in continuous interaction with the adaptive behavior of the 'agents' in the economy.
  • 1.1K
  • 29 Nov 2022
Topic Review
Blockchain and Energy Internet
Emergence of the Energy Internet (EI) demands restructuring of traditional electricity grids to integrate heterogeneous energy sources, distribution network management with grid intelligence and big data management. This paradigm shift is considered to be a breakthrough in the energy industry towards facilitating autonomous and decentralized grid operations while maximizing the utilization of Distributed Generation (DG). Blockchain has been identified as a disruptive technology enabler for the realization of EI to facilitate reliable, self-operated energy delivery. 
  • 1.1K
  • 12 Aug 2021
Topic Review
DNS Zone
A DNS zone is a specific portion of the DNS namespace in the Domain Name System (DNS), which is managed by a specific organization or administrator. A DNS zone is an administrative space that allows for more granular control of the DNS components, such as authoritative nameserver. The DNS is broken up into many different zones, which are distinctly managed areas in the DNS namespace. DNS zones are not necessarily physically separated from one another, however, a DNS zone can contain multiple subdomains and multiple zones can exist on the same server. The domain namespace of the Internet is organized into a hierarchical layout of subdomains below the DNS root domain. The individual domains of this tree may serve as delegation points for administrative authority and management. However, usually, it is furthermore desirable to implement fine-grained boundaries of delegation, so that multiple sub-levels of a domain may be managed independently. Therefore, the domain name space is partitioned into areas (zones) for this purpose. A zone starts at a domain and extends downward in the tree to the leaf nodes or to the top-level of subdomains where other zones start. A DNS zone is implemented in the configuration system of a domain name server. Historically, it is defined in the zone file, an operating system text file that starts with the special DNS record type Start of Authority (SOA) and contains all records for the resources described within the zone. This format was originally used by the Berkeley Internet Name Domain Server (BIND) software package and is defined in RFC 1034 and RFC 1035.
  • 1.1K
  • 01 Dec 2022
Biography
Edward H. Shortliffe
Edward ("Ted") Hance Shortliffe (born 1947) is a Canadian-born American biomedical informatician, physician, and computer scientist. Shortliffe is a pioneer in the use of artificial intelligence in medicine. He was the principal developer of the clinical expert system MYCIN, one of the first rule-based artificial intelligence expert systems, which obtained clinical data interactively from a phys
  • 1.1K
  • 27 Dec 2022
Biography
Bashir Rameyev
Bashir Iskandarovich Rameyev (Russian: Баши́р Исканда́рович Раме́ев; 1 May 1918 – 16 May 1994) was a Soviet inventor and scientist, one of the founders of Soviet computing, author of 23 patents,[1] including the first patent in the field of electronic computers officially registered in the USSR—a patent for the Automatic Electronic Digital Machine (1948).[2] Rame
  • 1.1K
  • 07 Dec 2022
Topic Review
Sturm-Liouville Theory
In mathematics and its applications, a classical Sturm–Liouville equation, named after Jacques Charles François Sturm (1803–1855) and Joseph Liouville (1809–1882), is a real second-order linear differential equation of the form where y is a function of the free variable x. Here the functions p(x) > 0 has a continuous derivative, q(x), and w(x) > 0 are specified at the outset, and in the simplest of cases are continuous on the finite closed interval [a,b]. In addition, the function y is typically required to satisfy some boundary conditions at a and b. The function w(x), which is sometimes called r(x), is called the "weight" or "density" function. The value of λ is not specified in the equation; finding the values of λ for which there exists a non-trivial solution of (1) satisfying the boundary conditions is part of the problem called the Sturm–Liouville problem (S L). Such values of λ when they exist are called the eigenvalues of the boundary value problem defined by (1) and the prescribed set of boundary conditions. The corresponding solutions (for such a λ) are the eigenfunctions of this problem. Under normal assumptions on the coefficient functions p(x), q(x), and w(x) above, they induce a Hermitian differential operator in some function space defined by boundary conditions. The resulting theory of the existence and asymptotic behavior of the eigenvalues, the corresponding qualitative theory of the eigenfunctions and their completeness in a suitable function space became known as Sturm–Liouville theory. This theory is important in applied mathematics, where S–L problems occur very commonly, particularly when dealing with linear partial differential equations that are separable.
  • 1.1K
  • 01 Dec 2022
Topic Review
July 2009 Cyberattacks
The July 2009 cyberattacks were a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States . The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec's Security Technology Response group, and more than 166,000 according to a Vietnamese computer security researcher who analyzed the log files of the two servers the attackers controlled. An investigation revealed that at least 39 websites were targets in the attacks based on files stored on compromised systems. The targeting and timing of the attacks—which started the same day as a North Korean short-range ballistic missile test—have led to suggestions that they may be from North Korea, although these suggestions have not been substantiated. Researchers would later find links between these cyberattacks, the DarkSeoul attacks in 2013, and other attacks attributed to the Lazarus Group. This attack is considered by some to be the beginning of a series of DDoS attacks carried about by Lazarus dubbed "Operation Troy."
  • 1.1K
  • 11 Nov 2022
Topic Review
Studies on Bike-Sharing Systems
Cities are moving towards new mobility strategies to tackle smart cities’ challenges such as carbon emission reduction, urban transport multimodality and mitigation of pandemic hazards, emphasising on the implementation of shared modes, such as bike-sharing systems. 
  • 1.0K
  • 19 Mar 2021
Topic Review
Satisfaction Equilibrium
In game theory, a satisfaction equilibrium is a solution concept for a class of non-cooperative games, namely games in satisfaction form. Games in satisfaction form model situations in which players aim at satisfying a given individual constraint, e.g., a performance metric must be smaller or bigger than a given threshold. When a player satisfies its own constraint, the player is said to be satisfied. A satisfaction equilibrium, if it exists, arises when all players in the game are satisfied.
  • 1.0K
  • 07 Nov 2022
Topic Review
BitFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 1.0K
  • 01 Dec 2022
  • Page
  • of
  • 48
Academic Video Service