You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
BitFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 1.0K
  • 01 Dec 2022
Topic Review
Propellerhead Software
Reason Studios (formerly known as Propellerhead Software) is a music software company, based in Stockholm, Sweden, and founded in 1994. It produces the studio emulation Reason.
  • 1.0K
  • 04 Nov 2022
Topic Review
Cybersecurity Information Technology List
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid. Cybersecurity is a major endeavor of the IT industry. There are a number of professional certifications given for cybersecurity training and expertise. Although billions of dollars are spent annually on cybersecurity, no computer or network is immune from attacks or can be considered completely secure. The single most expensive loss due to a cybersecurity exploit was the ILOVEYOU or Love Bug email worm of 2000, which cost an estimated 8.7 billion American dollars. This article attempts to list all the important Wikipedia articles about cybersecurity. There are a number of minor articles that can be reached by means of links in the listed articles.
  • 1.0K
  • 08 Oct 2022
Topic Review
Suzuki TT Superbikes
Suzuki TT Superbikes: Real Road Racing, often shortened to simply Suzuki TT Superbikes; also known as TT Superbikes: Real Road Racing in Europe and Japan, is a 2005 motorcycle simulation racing video game developed by Jester Interactive exclusively for the PlayStation 2 gaming console. The game was self–published by Jester in Europe, with Valcon Games and Taito handling publishing in North America and Japan, respectively. In North America, the game is licensed under Suzuki, an automobile manufacturer. The title features over 50 licensed vehicles and is entirely based around the famed Isle of Man TT race, a 60.72 km annual competition held within the Isle of Man. It is the second game based on the race, following the 1995 release of Manx TT Super Bike, though this game was only based on the Manx TT event, which is a small section of the course. The game was available on the PlayStation 3 via the North American PlayStation Store. Suzuki TT Superbikes has since received two sequels.
  • 1.0K
  • 30 Nov 2022
Topic Review
Set Notation
Sets are fundamental objects in mathematics. Intuitively, a set is merely a collection of elements or members. There are various conventions for textually denoting sets. In any particular situation, an author typically chooses from among these conventions depending on which properties of the set are most relevant to the immediate context or on which perspective is most useful.
  • 1.0K
  • 17 Oct 2022
Topic Review
Go Equipment
Go equipment consists of the objects that are necessary in order to play the game of Go which originated in China. Although the equipment is simple, there is a varying degree of quality and material used in making the equipment, from the economical to the extremely valuable.
  • 1.0K
  • 25 Oct 2022
Topic Review
Memristive System Based Image Processing Technology
This entry describes that recent advances of memristive system-based image processing are presented.
  • 1.0K
  • 07 Jan 2022
Topic Review
Trace Cache
Trace Cache (also known as execution trace cache) is a very specialized cache which stores the dynamic stream of instructions known as trace. It helps in increasing the instruction fetch bandwidth and decreasing power consumption (in the case of Intel Pentium 4) by storing traces of instructions that have already been fetched and decoded. Trace Processor is an architecture designed around the Trace Cache and processes the instructions at trace level granularity.
  • 1.0K
  • 02 Dec 2022
Topic Review
Tuxedo
Tuxedo (Transactions for Unix, Extended for Distributed Operations) is a middleware platform used to manage distributed transaction processing in distributed computing environments. Tuxedo is a transaction processing system or transaction-oriented middleware, or enterprise application server for a variety of systems and programming languages. Developed by AT&T in the 1980s, it became a software product of Oracle Corporation in 2008 when they acquired BEA Systems. Tuxedo is now part of the Oracle Fusion Middleware.
  • 1.0K
  • 27 Oct 2022
Topic Review
H2O
H2O is open-source software for big-data analysis. It is produced by the company H2O.ai. H2O allows users to fit thousands of potential models as part of discovering patterns in data. The H2O software runs can be called from the statistical package R, Python, and other environments. It is used for exploring and analyzing datasets held in cloud computing systems and in the Apache Hadoop Distributed File System as well as in the conventional operating-systems Linux, macOS, and Microsoft Windows. The H2O software is written in Java, Python, and R. Its graphical-user interface is compatible with four browsers: Chrome, Safari, Firefox, and Internet Explorer.
  • 1.0K
  • 30 Nov 2022
Topic Review
Blockchain Technology Used for Smart Drone Swarms
Intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. The concept of leveraging blockchain technology to address problems with identification, security, and storage in UAV clusters is not new. There have been many approaches that have used novel methods to examine how we can use the benefits of blockchain technology to lessen these issues.
  • 1.0K
  • 14 Nov 2023
Topic Review
Radiance
Radiance is a suite of tools for performing lighting simulation originally written by Greg Ward. It includes a renderer as well as many other tools for measuring the simulated light levels. It uses ray tracing to perform all lighting calculations, accelerated by the use of an octree data structure. It pioneered the concept of high-dynamic-range imaging, where light levels are (theoretically) open-ended values instead of a decimal proportion of a maximum (e.g. 0.0 to 1.0) or integer fraction of a maximum (0 to 255 / 255). It also implements global illumination using the Monte Carlo method to sample light falling on a point. Greg Ward started developing Radiance in 1985 while at Lawrence Berkeley National Laboratory. The source code was distributed under a license forbidding further redistribution. In January 2002 Radiance 3.4 was relicensed under a less restrictive license. One study found Radiance to be the most generally useful software package for architectural lighting simulation. The study also noted that Radiance often serves as the underlying simulation engine for many other packages.
  • 1.0K
  • 25 Nov 2022
Topic Review
Trusted System
In the security engineering subspecialty of computer science, a trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system is one whose failure would break a security policy (if a policy exists that the system is trusted to enforce). The word "trust" is critical, as it does not carry the meaning that might be expected in everyday usage. A trusted system is one that the user feels safe to use, and trusts to perform tasks without secretly executing harmful or unauthorized programs; trusted computing refers to whether programs can trust the platform to be unmodified from the expected, and whether or not those programs are innocent ormalicious or whether they execute tasks that are undesired by the user. A trusted system can also be seen as a level-based security system where protection is provided and handle]]d according to different levels. This is commonly found in the military, where information is categorized as unclassified (U), confidential (C), Secret (S), Top secret (TS), and beyond. These also enforce the policies of no read-up and no write-down.
  • 1.0K
  • 28 Sep 2022
Topic Review
Phase Field Models
A phase field model is a mathematical model for solving interfacial problems. It has mainly been applied to solidification dynamics, but it has also been applied to other situations such as viscous fingering, fracture mechanics,, hydrogen embrittlement, and vesicle dynamics. The method substitutes boundary conditions at the interface by a partial differential equation for the evolution of an auxiliary field (the phase field) that takes the role of an order parameter. This phase field takes two distinct values (for instance +1 and −1) in each of the phases, with a smooth change between both values in the zone around the interface, which is then diffuse with a finite width. A discrete location of the interface may be defined as the collection of all points where the phase field takes a certain value (e.g., 0). A phase field model is usually constructed in such a way that in the limit of an infinitesimal interface width (the so-called sharp interface limit) the correct interfacial dynamics are recovered. This approach permits to solve the problem by integrating a set of partial differential equations for the whole system, thus avoiding the explicit treatment of the boundary conditions at the interface. Phase field models were first introduced by Fix and Langer, and have experienced a growing interest in solidification and other areas.
  • 1.0K
  • 25 Oct 2022
Topic Review
Belt Machine
In computer engineering and in programming language implementations, a belt machine is a real or emulated computer that uses a first in, first out (FIFO) queue rather than individual machine processor registers to evaluate each sub-expression in the program. A belt computer is programmed with an instruction set that specifies arguments explicitly but results implicitly. The common alternative to belt machines are register machines, in which each instruction explicitly names the specific registers to use for locations of operand arguments and results. Belt machines are related to stack machines, which specify both arguments and results implicitly using a pushdown stack. Other alternatives are accumulator machines, which have only one visible general-purpose temp register, and memory-to-memory machines, which have no visible temp registers. A belt machine implements temporary storage with a fixed-length FIFO queue, or belt by analogy to a conveyor belt. The operands of the arithmetic logic units (ALUs) and other functional units may be taken from any position on the belt, and the result from the computation is dropped (stored) in the front position of the belt, advancing the belt to make room. As the belt is fixed length, drops in the front are matched by older operands falling off the back; pushed-off operands become inaccessible and must be explicitly saved if still needed for later work. Most operations of the instruction set work only with data on the belt, not on data registers or main memory cells. For a typical instruction like add, both argument operands come from explicitly named positions on the belt, and the result is dropped on the front, ready for the next instruction. Operations with multiple results simply drop more values at the belt front. Most belt instructions are encoded as just an operation code (opcode) and two belt positions, with no added fields to specify a result register, memory address, or literal constant. This encoding is easily extended to richer operations with more than two inputs or more than one result. Constant operands are dropped by separate load immediate instructions. All access of program variables in main random-access memory (RAM) is segregated into separate load or store instructions containing one memory address, or some way to calculate that address from belt operands. All belt machines have variants of the load/store opcodes to access local variables and the heap. This can be by offsets, from a pointer on the belt, or from various special-purpose base registers. Similarly, there will be instructions to branch to an address taken from the belt, along with branches relative to the program counter.
  • 1.0K
  • 20 Oct 2022
Topic Review
Force4
Force4 is a development system and framework for the rapid development of rich Internet applications for the connection of databases to different presentation technologies. It integrates the creation and reverse engineering of database models, the creation of the necessary objects and access classes and the composing of Rich Internet Applications.
  • 1.0K
  • 20 Oct 2022
Topic Review
Regional Accreditation
Regional accreditation is the educational accreditation of schools, colleges, and universities in the United States by one of seven regional accrediting agencies. Accreditation is a voluntary process by which colleges demonstrate to each other, and sometimes to employers and licensing agencies, that their credits and degrees meet minimum standards. It is the self-regulation of the higher education industry. Each regional accreditor oversees the vast majority of public and private educational institutions, both not-for-profit and for-profit, in its region. Their primary function is accreditation of post-secondary institutions, though there is a limited amount of accreditation of primary and secondary schools. Regional accreditation is older than national accreditation and, with a few exceptions, more rigorous than national accreditation. Additionally, most non-profit institutions are regionally accredited while most for-profit colleges and universities are nationally accredited.
  • 1.0K
  • 27 Oct 2022
Topic Review
NcRNAs in Human Diseases
The mammalian genome comprehends a small minority of genes that encode for proteins (barely 2% of the total genome in humans) and an immense majority of genes that are transcribed into RNA but not encoded for proteins (ncRNAs). These non-coding genes are intimately related to the expression regulation of protein-coding genes. The ncRNAs subtypes differ in their size, so there are long non-coding genes (lncRNAs) and other smaller ones, like microRNAs (miRNAs) and piwi-interacting RNAs (piRNAs). Due to their important role in the maintenance of cellular functioning, any deregulation of the expression profiles of these ncRNAs can dissemble in the development of different types of diseases, such as cancer, neurodegenerative, or cardiovascular disorders.
  • 1.0K
  • 16 Mar 2021
Topic Review
Sun-Ni Law
Sun-Ni's Law (or Sun and Ni's Law, also known as memory-bounded speedup), is a memory-bounded speedup model which states that as computing power increases the corresponding increase in problem size is constrained by the system’s memory capacity. In general, as a system grows in computational power, the problems run on the system increase in size. Analogous to Amdahl's law, which says that the problem size remains constant as system sizes grow, and Gustafson's law, which proposes that the problem size should scale but be bound by a fixed amount of time, Sun-Ni's Law states the problem size should scale but be bound by the memory capacity of the system. Sun-Ni's Law was initially proposed by Xian-He Sun and Lionel Ni at the Proceedings of IEEE Supercomputing Conference 1990. With the increasing disparity between CPU speed and memory data access latency, application execution time often depends on the memory speed of the system. As predicted by Sun and Ni, data access has become the premier performance bottleneck for high-end computing. From this fact one can see the intuition behind Sun-Ni's Law, as system resources increase, applications are often bottlenecked by memory speed and bandwidth, thus an application can achieve a larger speedup by utilizing all the memory capacity in the system. Sun-Ni's Law can be applied to different layers of a memory hierarchy system, from L1 cache to main memory. Through its memory-bounded function,W=G(M), it reveals the trade-off between computing and memory in algorithm and system architecture design. All three speedup models, Sun-Ni, Gustafson, and Amdahl, provide a metric to analyze speedup for Parallel computing. Amdahl’s law focuses on the time reduction for a given fixed-size problem. Amdahl’s law states that the sequential portion of the problem (algorithm) limits the total speedup that can be achieved as system resources increase. Gustafson’s law suggests that it is beneficial to build a large-scale parallel system as the speedup can grow linearly with the system size if the problem size is scaled up to maintain a fixed execution time. Yet as memory access latency often becomes the dominant factor in an application’s execution time, applications may not scale up to meet the time bound constraint. Sun-Ni's Law, instead of constraining the problem size by time, constrains the problem by the memory capacity of the system, or in other words bounds based on memory. Sun-Ni's Law is a generalization of Amdahl's Law and Gustafson's Law. When the memory-bounded function G(M)=1, it resolves to Amdahl's law, when the memory-bounded function G(M)=m,the number of processors, it resolves to Gustafson's Law.
  • 1.0K
  • 31 Oct 2022
Topic Review
Glossary of Military Modeling and Simulation
The US DoD Modeling and Simulation Glossary (formally known as DoD 5000.59-M), was originally created in 1998. (As of October 2010) the glossary was being updated, without changing its main objective of providing a uniform language for use by the M&S community. This article contains a list of terms and acronyms, based on the original DoD 5000.59-M and information related to the update.
  • 1.0K
  • 22 Nov 2022
  • Page
  • of
  • 48
Academic Video Service