Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Set Notation
Sets are fundamental objects in mathematics. Intuitively, a set is merely a collection of elements or members. There are various conventions for textually denoting sets. In any particular situation, an author typically chooses from among these conventions depending on which properties of the set are most relevant to the immediate context or on which perspective is most useful.
  • 1.1K
  • 17 Oct 2022
Topic Review
Handicap (Go)
Within most systems and at most levels in the game of Go, a handicap is given to offset the strength difference between players of different ranks.
  • 1.1K
  • 28 Nov 2022
Topic Review
Studies on Bike-Sharing Systems
Cities are moving towards new mobility strategies to tackle smart cities’ challenges such as carbon emission reduction, urban transport multimodality and mitigation of pandemic hazards, emphasising on the implementation of shared modes, such as bike-sharing systems. 
  • 1.1K
  • 19 Mar 2021
Topic Review
Satisfaction Equilibrium
In game theory, a satisfaction equilibrium is a solution concept for a class of non-cooperative games, namely games in satisfaction form. Games in satisfaction form model situations in which players aim at satisfying a given individual constraint, e.g., a performance metric must be smaller or bigger than a given threshold. When a player satisfies its own constraint, the player is said to be satisfied. A satisfaction equilibrium, if it exists, arises when all players in the game are satisfied.
  • 1.1K
  • 07 Nov 2022
Topic Review
FabLab
The fast expansion of digital culture has fostered the creation of makerspaces such as fabrication laboratories (FabLabs) that, thanks to their flexibility and their use of open source tools, strengthen the sense of community and produce true transformations within those communities. Fabrication laboratories (FabLabs) are an integral part of “communities and spaces with more or less open to the public levels, with objectives and targets agreed by its members in which, through learning processes, production, prototyping, design, and manufacturing, both tangible and intangible assets, complex two-way exchanges of information are produced, knowledge, technology, skills and resources among users, users and society and between users and industry” that constitute the new wave of collaborative ecologies into which elements such as makerspaces, hackerspaces, living-labs or co-workings also fall, highlighted by its origin and its capacity as an international organization. A FabLab is a strong social space offering affordable and accessible manufactured tools and is sometimes conceived as an appropriate platform to begin the prototyping and development processes of any object. They emerged in the 2000s at the Massachusetts Institute of Technology (MIT) from Professor Neil Gershenfeld’s subject, called “How to Make (Almost) Anything”. Thanks to the creation of this first FabLab, Professor Gershenfeld’s students could realize their designs, popularizing digital manufacturing and making the subject successful.
  • 1.1K
  • 06 May 2022
Topic Review
BitFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 1.1K
  • 01 Dec 2022
Topic Review
H2O
H2O is open-source software for big-data analysis. It is produced by the company H2O.ai. H2O allows users to fit thousands of potential models as part of discovering patterns in data. The H2O software runs can be called from the statistical package R, Python, and other environments. It is used for exploring and analyzing datasets held in cloud computing systems and in the Apache Hadoop Distributed File System as well as in the conventional operating-systems Linux, macOS, and Microsoft Windows. The H2O software is written in Java, Python, and R. Its graphical-user interface is compatible with four browsers: Chrome, Safari, Firefox, and Internet Explorer.
  • 1.0K
  • 30 Nov 2022
Topic Review
Memristive System Based Image Processing Technology
This entry describes that recent advances of memristive system-based image processing are presented.
  • 1.0K
  • 07 Jan 2022
Topic Review
Tuxedo
Tuxedo (Transactions for Unix, Extended for Distributed Operations) is a middleware platform used to manage distributed transaction processing in distributed computing environments. Tuxedo is a transaction processing system or transaction-oriented middleware, or enterprise application server for a variety of systems and programming languages. Developed by AT&T in the 1980s, it became a software product of Oracle Corporation in 2008 when they acquired BEA Systems. Tuxedo is now part of the Oracle Fusion Middleware.
  • 1.0K
  • 27 Oct 2022
Topic Review
Regional Accreditation
Regional accreditation is the educational accreditation of schools, colleges, and universities in the United States by one of seven regional accrediting agencies. Accreditation is a voluntary process by which colleges demonstrate to each other, and sometimes to employers and licensing agencies, that their credits and degrees meet minimum standards. It is the self-regulation of the higher education industry. Each regional accreditor oversees the vast majority of public and private educational institutions, both not-for-profit and for-profit, in its region. Their primary function is accreditation of post-secondary institutions, though there is a limited amount of accreditation of primary and secondary schools. Regional accreditation is older than national accreditation and, with a few exceptions, more rigorous than national accreditation. Additionally, most non-profit institutions are regionally accredited while most for-profit colleges and universities are nationally accredited.
  • 1.0K
  • 27 Oct 2022
Topic Review
Cybersecurity Information Technology List
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid. Cybersecurity is a major endeavor of the IT industry. There are a number of professional certifications given for cybersecurity training and expertise. Although billions of dollars are spent annually on cybersecurity, no computer or network is immune from attacks or can be considered completely secure. The single most expensive loss due to a cybersecurity exploit was the ILOVEYOU or Love Bug email worm of 2000, which cost an estimated 8.7 billion American dollars. This article attempts to list all the important Wikipedia articles about cybersecurity. There are a number of minor articles that can be reached by means of links in the listed articles.
  • 1.0K
  • 08 Oct 2022
Topic Review
Trusted System
In the security engineering subspecialty of computer science, a trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system is one whose failure would break a security policy (if a policy exists that the system is trusted to enforce). The word "trust" is critical, as it does not carry the meaning that might be expected in everyday usage. A trusted system is one that the user feels safe to use, and trusts to perform tasks without secretly executing harmful or unauthorized programs; trusted computing refers to whether programs can trust the platform to be unmodified from the expected, and whether or not those programs are innocent ormalicious or whether they execute tasks that are undesired by the user. A trusted system can also be seen as a level-based security system where protection is provided and handle]]d according to different levels. This is commonly found in the military, where information is categorized as unclassified (U), confidential (C), Secret (S), Top secret (TS), and beyond. These also enforce the policies of no read-up and no write-down.
  • 1.0K
  • 28 Sep 2022
Topic Review
Trace Cache
Trace Cache (also known as execution trace cache) is a very specialized cache which stores the dynamic stream of instructions known as trace. It helps in increasing the instruction fetch bandwidth and decreasing power consumption (in the case of Intel Pentium 4) by storing traces of instructions that have already been fetched and decoded. Trace Processor is an architecture designed around the Trace Cache and processes the instructions at trace level granularity.
  • 1.0K
  • 02 Dec 2022
Topic Review
Compati Hero Series
The Compati Hero Series (コンパチヒーローシリーズ, Konpachi Hīrō Shirīzu) is a video game series published exclusively in Japan by Banpresto and Namco Bandai Games (formerly Bandai) that began in Template:Vgy, that serves as 16 crossover teams between Ultraman, Kamen Rider (also known as Masked Rider) and Gundam. It was the first video game series to involve a crossover between animated giant robots and live action tokusatsu heroes from different established franchises. The series makes this possible by using caricaturized versions of the characters (officially referred as "SD" or "super deformed" characters), which allowed the different heroes and villains to co-exist and interact with each other without the need to reconcile their contrasting styles, settings, or sizes. The first game in the series, SD Battle Ōzumō: Heisei Hero Basho for the Famicom, which mixed franchises that were originally licensed to Popy, was developed as a congratulatory present to Yukimasa Sugiura when he was promoted to president of Banpresto at the time, which was soon followed by series of spin-offs and related games featuring the same cast of characters that developed into the Compati Hero Series. The series was successful with children thanks to the SD Gundam craze, but after the release of Charinko Hero for the GameCube, there were no new games afterward for nearly eight years. Banpresto released a new game in the series titled Lost Heroes, for the Nintendo 3DS and the PlayStation Portable on September 2012.
  • 1.0K
  • 30 Oct 2022
Topic Review
Radiance
Radiance is a suite of tools for performing lighting simulation originally written by Greg Ward. It includes a renderer as well as many other tools for measuring the simulated light levels. It uses ray tracing to perform all lighting calculations, accelerated by the use of an octree data structure. It pioneered the concept of high-dynamic-range imaging, where light levels are (theoretically) open-ended values instead of a decimal proportion of a maximum (e.g. 0.0 to 1.0) or integer fraction of a maximum (0 to 255 / 255). It also implements global illumination using the Monte Carlo method to sample light falling on a point. Greg Ward started developing Radiance in 1985 while at Lawrence Berkeley National Laboratory. The source code was distributed under a license forbidding further redistribution. In January 2002 Radiance 3.4 was relicensed under a less restrictive license. One study found Radiance to be the most generally useful software package for architectural lighting simulation. The study also noted that Radiance often serves as the underlying simulation engine for many other packages.
  • 1.0K
  • 25 Nov 2022
Topic Review
Blockchain Technology Used for Smart Drone Swarms
Intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. The concept of leveraging blockchain technology to address problems with identification, security, and storage in UAV clusters is not new. There have been many approaches that have used novel methods to examine how we can use the benefits of blockchain technology to lessen these issues.
  • 1.0K
  • 14 Nov 2023
Topic Review
Phase Field Models
A phase field model is a mathematical model for solving interfacial problems. It has mainly been applied to solidification dynamics, but it has also been applied to other situations such as viscous fingering, fracture mechanics,, hydrogen embrittlement, and vesicle dynamics. The method substitutes boundary conditions at the interface by a partial differential equation for the evolution of an auxiliary field (the phase field) that takes the role of an order parameter. This phase field takes two distinct values (for instance +1 and −1) in each of the phases, with a smooth change between both values in the zone around the interface, which is then diffuse with a finite width. A discrete location of the interface may be defined as the collection of all points where the phase field takes a certain value (e.g., 0). A phase field model is usually constructed in such a way that in the limit of an infinitesimal interface width (the so-called sharp interface limit) the correct interfacial dynamics are recovered. This approach permits to solve the problem by integrating a set of partial differential equations for the whole system, thus avoiding the explicit treatment of the boundary conditions at the interface. Phase field models were first introduced by Fix and Langer, and have experienced a growing interest in solidification and other areas.
  • 1.0K
  • 25 Oct 2022
Topic Review
Belt Machine
In computer engineering and in programming language implementations, a belt machine is a real or emulated computer that uses a first in, first out (FIFO) queue rather than individual machine processor registers to evaluate each sub-expression in the program. A belt computer is programmed with an instruction set that specifies arguments explicitly but results implicitly. The common alternative to belt machines are register machines, in which each instruction explicitly names the specific registers to use for locations of operand arguments and results. Belt machines are related to stack machines, which specify both arguments and results implicitly using a pushdown stack. Other alternatives are accumulator machines, which have only one visible general-purpose temp register, and memory-to-memory machines, which have no visible temp registers. A belt machine implements temporary storage with a fixed-length FIFO queue, or belt by analogy to a conveyor belt. The operands of the arithmetic logic units (ALUs) and other functional units may be taken from any position on the belt, and the result from the computation is dropped (stored) in the front position of the belt, advancing the belt to make room. As the belt is fixed length, drops in the front are matched by older operands falling off the back; pushed-off operands become inaccessible and must be explicitly saved if still needed for later work. Most operations of the instruction set work only with data on the belt, not on data registers or main memory cells. For a typical instruction like add, both argument operands come from explicitly named positions on the belt, and the result is dropped on the front, ready for the next instruction. Operations with multiple results simply drop more values at the belt front. Most belt instructions are encoded as just an operation code (opcode) and two belt positions, with no added fields to specify a result register, memory address, or literal constant. This encoding is easily extended to richer operations with more than two inputs or more than one result. Constant operands are dropped by separate load immediate instructions. All access of program variables in main random-access memory (RAM) is segregated into separate load or store instructions containing one memory address, or some way to calculate that address from belt operands. All belt machines have variants of the load/store opcodes to access local variables and the heap. This can be by offsets, from a pointer on the belt, or from various special-purpose base registers. Similarly, there will be instructions to branch to an address taken from the belt, along with branches relative to the program counter.
  • 1.0K
  • 20 Oct 2022
Topic Review
NcRNAs in Human Diseases
The mammalian genome comprehends a small minority of genes that encode for proteins (barely 2% of the total genome in humans) and an immense majority of genes that are transcribed into RNA but not encoded for proteins (ncRNAs). These non-coding genes are intimately related to the expression regulation of protein-coding genes. The ncRNAs subtypes differ in their size, so there are long non-coding genes (lncRNAs) and other smaller ones, like microRNAs (miRNAs) and piwi-interacting RNAs (piRNAs). Due to their important role in the maintenance of cellular functioning, any deregulation of the expression profiles of these ncRNAs can dissemble in the development of different types of diseases, such as cancer, neurodegenerative, or cardiovascular disorders.
  • 1.0K
  • 16 Mar 2021
Topic Review
Force4
Force4 is a development system and framework for the rapid development of rich Internet applications for the connection of databases to different presentation technologies. It integrates the creation and reverse engineering of database models, the creation of the necessary objects and access classes and the composing of Rich Internet Applications.
  • 1.0K
  • 20 Oct 2022
  • Page
  • of
  • 48
Academic Video Service

Quick Survey

Encyclopedia MDPI is conducting a targeted survey to identify the specific barriers hindering efficient research. We invite you to spend 3 minutes defining the priorities for our next generation of structured knowledge tools.
Take Survey