Topic Review
Elie Bursztein
Elie Bursztein (born 1 June 1980) leads the anti-abuse research team at Google.[r 1] He is best known for his research on anti-fraud and abuse,[r 2] his novel attacks against web service and video games and his work on applied cryptography.[p 1][p 2] Prior to Google Bursztein was a post-doctoral fellow in computer science at Stanford University, where he focused on CAPTCHAs security[p 3][p 4] and usability.[p 5][p 6]
  • 534
  • 20 Oct 2022
Topic Review
Agent-Based Model in Biology
Agent-based models have many applications in biology, primarily due to the characteristics of the modeling method. Agent-based modeling is a rule-based, computational modeling methodology that focuses on rules and interactions among the individual components or the agents of the system. The goal of this modeling method is to generate populations of the system components of interest and simulate their interactions in a virtual world. Agent-based models start with rules for behavior and seek to reconstruct, through computational instantiation of those behavioral rules, the observed patterns of behavior.
  • 530
  • 24 Oct 2022
Topic Review
INTERLNK
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 529
  • 28 Nov 2022
Topic Review
Petya (Malware)
Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system. The Petya malware had infected millions of people during its first year of its release. The maker of the Petya malware was arrested and fined.[citation needed] Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global cyberattack, primarily targeting Ukraine . The new variant propagates via the EternalBlue exploit, which is generally believed to have been developed by the United States . National Security Agency (NSA), and was used earlier in the year by the WannaCry ransomware. Kaspersky Lab referred to this new version as NotPetya to distinguish it from the 2016 variants, due to these differences in operation. In addition, although it purports to be ransomware, this variant was modified so that it is unable to actually revert its own changes. The NotPetya attacks have been blamed on the Russian government, specifically the Sandworm hacking group within the GRU Russian military intelligence organization, by security researchers, Google, and several governments.
  • 527
  • 17 Nov 2022
Topic Review
DSGet
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 524
  • 30 Oct 2022
Topic Review
Set (Command)
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 524
  • 10 Nov 2022
Topic Review
GIS Live DVD
GIS Live DVD is a type of the thematic Live CD containing GIS/RS applications and related tutorials, and sample data sets. The general sense of a GIS Live DVD is to demonstrate the power of FLOSS GIS and encourage users to start on FLOSS GIS. However, a disc can be used for GIS data processing and training, too. A disc usually includes some selected Linux-based or Wine-enabled Windows applications for GIS and Remote Sensing use. Using this disc the end users can execute GIS functions to get experience in free and open source software solutions or solve some simple business operations. The set-up and the operating behaviour of the applications can also be studied prior to building real FLOSS GIS-based systems. Recently a LiveDVD image is stored and booted from USB (Live USB).
  • 523
  • 01 Dec 2022
Topic Review
Graphicacy
Graphicacy is defined as the ability to understand and present information in the form of sketches, photographs, diagrams, maps, plans, charts, graphs and other non-textual formats. The word graphicacy was coined by Balchin and Coleman as representation of the visuo-spatial abilities, they gave their reasons as follows "In the choice of a word to denote the educated counterpart of visual-spatial ability one must first ask the question what exactly does this form of communication involve. It is fundamentally the communication of spatial information that cannot be conveyed adequately by verbal or numerical means,e.g. the plan of a town, the pattern of a drainage network or a picture of a distant place - in other words the whole field of the graphic arts and much of geography cartography, computer-graphics, photography, itself. All of these words contain the syllable "graph" which seemed a logical stem for "graphicacy" which was completed by analogy with literacy, numeracy and articulacy. The modern economy is becoming increasingly reliant on graphics to communicate information. Until recently, words and numbers were the main vehicles for communication, as they have long been relatively easy to produce and distribute in comparison with graphics. Advances in information and communications technology and visualization techniques are increasing the accessibility and usage of graphics, increasing the importance of information graphics. Interpretation of graphics is loosely analogous to the process of reading text, while generation of graphics is the counterpart of writing text. However, these analogies are imperfect, as text and graphics are based on very different symbol systems. For example, whereas text is structured according to formal organisational rules that apply irrespective of the content, this is not the case for graphics. With text structure, the units of information (words) are expected to be organised according to broad conventions (such as being sequenced in orderly rows starting from top left and progressing down the page). However graphics are not subject to a similarly stringent set of structural conventions. Instead, it is the content itself that largely determines the nature of the graphic entities and the way they are arranged. For example, the form and spatial arrangement of the items that comprise the actual subject matter being represented in the graphic are used as the basis for the graphic entities and structure that are displayed in the graphic. This is not the case with written text where the words and their arrangement bear no resemblance to the represented subject matter. Because of these and other fundamental differences between text and graphics, it is appropriate that the processes involved in comprehension and production of graphics are clearly distinguished from those involved in comprehension and production of text.
  • 521
  • 29 Nov 2022
Topic Review
Sustainable Adoption of E-Learning from the TAM Perspective
All TAM constructs significantly impact the BI of e-learning use. Additionally, the results showed that mentality acceptance substantially moderates the relationship between system trust and interaction, on the one hand, and PU and PEOU on the other. These findings suggest that educational institutions should focus on factors influencing teachers’ and students’ attitudes toward adopting and using e-learning services. Lack of internet connection, ICT skills, and technology capabilities are the main issues, and the main TAM constructs of all factors. 
  • 519
  • 22 Apr 2022
Topic Review
Apple Network Server
The Apple Network Server (ANS) was a line of PowerPC-based server computers designed, manufactured and sold by Apple Computer, Inc. from February 1996 to April 1997. It was codenamed "Shiner" and originally consisted of two models, the Network Server 500/132 ("Shiner LE", i.e., "low-end") and the Network Server 700/150 ("Shiner HE", i.e., "high-end"), which got a companion model, the Network Server 700/200 (also "Shiner HE") with a faster CPU in November 1996. The machines were not a part of the Apple Macintosh line of computers; they were designed to run IBM's AIX operating system and their ROM specifically prevented booting the classic Mac OS. This makes them the last non-Macintosh desktop computers made by Apple to date. The 500/132, 700/150, and 97 sold in the U.S. market for $11,000, $15,000 and $19,000, respectively. Apple Network Servers are not to be confused with the Apple Workgroup Servers and the Macintosh Servers, which were Macintosh workstations that shipped with server software and used Mac OS; the sole exception, the Workgroup Server 95—a Quadra 950 with an added SCSI controller that shipped with A/UX—was also capable of running Mac OS. Apple did not have comparable server hardware in their product lineup again until the introduction of the Xserve in 2002. The product's short lifespan is attributed to significant financial troubles at Apple in early 1997. CEO Gil Amelio cancelled both Network Server and OpenDoc in the same meeting as it was determined that they were low priorities.
  • 519
  • 30 Nov 2022
Topic Review
Model Products Corporation
Model Products Corporation, usually known by its acronym, MPC, was an American manufacturer of plastic scale model kits and pre-assembled promotional models popular in the 1960s and 1970s. Traditionally a Michigan company, since 2011 the MPC name has been part of Round2 LLC of South Bend, Indiana. MPC's main competition was Aluminum Model Toys (AMT) and Jo-Han Models.
  • 519
  • 13 Oct 2022
Topic Review
Lie's Theorem
In mathematics, specifically the theory of Lie algebras, Lie's theorem states that, over an algebraically closed field of characteristic zero, if [math]\displaystyle{ \pi: \mathfrak{g} \to \mathfrak{gl}(V) }[/math] is a finite-dimensional representation of a solvable Lie algebra, then [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] stabilizes a flag [math]\displaystyle{ V = V_0 \supset V_1 \supset \cdots \supset V_n = 0, \operatorname{codim} V_i = i }[/math]; "stabilizes" means [math]\displaystyle{ \pi(X) V_i \subset V_i }[/math] for each [math]\displaystyle{ X \in \mathfrak{g} }[/math] and i. Put in another way, the theorem says there is a basis for V such that all linear transformations in [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] are represented by upper triangular matrices. This is a generalization of the result of Frobenius that commuting matrices are simultaneously upper triangularizable, as commuting matrices form an abelian Lie algebra, which is a fortiori solvable. A consequence of Lie's theorem is that any finite dimensional solvable Lie algebra over a field of characteristic 0 has a nilpotent derived algebra (see #Consequences). Also, to each flag in a finite-dimensional vector space V, there correspond a Borel subalgebra (that consist of linear transformations stabilizing the flag); thus, the theorem says that [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] is contained in some Borel subalgebra of [math]\displaystyle{ \mathfrak{gl}(V) }[/math].
  • 517
  • 25 Oct 2022
Topic Review
Magnus Expansion
In mathematics and physics, the Magnus expansion, named after Wilhelm Magnus (1907–1990), provides an exponential representation of the solution of a first-order homogeneous linear differential equation for a linear operator. In particular, it furnishes the fundamental matrix of a system of linear ordinary differential equations of order n with varying coefficients. The exponent is aggregated as an infinite series, whose terms involve multiple integrals and nested commutators.
  • 516
  • 21 Oct 2022
Topic Review
Automedian Triangle
In plane geometry, an automedian triangle is a triangle in which the lengths of the three medians (the line segments connecting each vertex to the midpoint of the opposite side) are proportional to the lengths of the three sides, in a different order. The three medians of an automedian triangle may be translated to form the sides of a second triangle that is similar to the first one.
  • 513
  • 17 Nov 2022
Topic Review
Cybersecurity in Smart Cities
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT, are combined to exchange real-time information, making the everyday lives of their residents more convenient.  Cybersecurity for smart cities includes a combination of technologies that have emerged to address the highly complex challenges of insecure devices and networks, which can lead to unbounded attacks. 
  • 512
  • 17 Apr 2023
Topic Review
Batch File
A batch file is a script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file. A batch file may contain any command the interpreter accepts interactively and use constructs that enable conditional branching and looping within the batch file, such as IF, FOR, and GOTO labels. The term "batch" is from batch processing, meaning "non-interactive execution", though a batch file may not process a batch of multiple data. Similar to Job Control Language (JCL), DCL and other systems on mainframe and minicomputer systems, batch files were added to ease the work required for certain regular tasks by allowing the user to set up a script to automate them. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. Unix-like operating systems, such as Linux, have a similar, but more flexible, type of file called a shell script. The filename extension .bat is used in DOS and Windows. Windows NT and OS/2 also added .cmd. Batch files for other environments may have different extensions, e.g., .btm in 4DOS, 4OS2 and 4NT related shells. The detailed handling of batch files has changed significantly between versions. Some of the detail in this article applies to all batch files, while other details apply only to certain versions.
  • 511
  • 19 Oct 2022
Topic Review
Suzuki TT Superbikes
Suzuki TT Superbikes: Real Road Racing, often shortened to simply Suzuki TT Superbikes; also known as TT Superbikes: Real Road Racing in Europe and Japan, is a 2005 motorcycle simulation racing video game developed by Jester Interactive exclusively for the PlayStation 2 gaming console. The game was self–published by Jester in Europe, with Valcon Games and Taito handling publishing in North America and Japan, respectively. In North America, the game is licensed under Suzuki, an automobile manufacturer. The title features over 50 licensed vehicles and is entirely based around the famed Isle of Man TT race, a 60.72 km annual competition held within the Isle of Man. It is the second game based on the race, following the 1995 release of Manx TT Super Bike, though this game was only based on the Manx TT event, which is a small section of the course. The game was available on the PlayStation 3 via the North American PlayStation Store. Suzuki TT Superbikes has since received two sequels.
  • 511
  • 30 Nov 2022
Topic Review
Military Operations Research Society
The Military Operations Research Society (MORS) is a society for professionals active within defense applications of operations research (OR) in the United States . Membership include analysts, researchers, consultants and officers in the United States Department of Defense, organizations within the military of the United States, various think tanks, academic institutions and consultancy firms. The Military Operations Research Society arranges symposia and courses, and publishes books, a quarterly bulletin called Phalanx, and a peer reviewed journal called Military Operations Research. Participation in MORS activities generally requires a United States security clearance. MORS is headquartered in Alexandria, Virginia. The MORS has served the Department of Defense analytic community for over forty years and now also includes other aspects of national security for the United States federal government. Under the sponsorship of the Army, Navy, Air Force, Marine Corps, Office of the Secretary of Defense, the Joint Staff and the Department of Homeland Security, the objective of MORS is to enhance the quality and effectiveness of operations research as applied to national security issues. MORS vision is to "become the recognized leader in advancing the national security analytic community through the advancement and application of the interdisciplinary field of Operations Research to national security issues, being responsive to our constituents, enabling collaboration and development opportunities, and expanding our membership and disciplines, while maintaining our profession’s heritage." This vision encompasses all aspects of national security including not only the military but also Homeland Security and the other agencies of government – including the US and its allies. Members of the Society include a cross section of the defense analysts, operators and managers from government, industry and academia. Their involvement fosters professional interchange within the military operations research community, the sharing of insights and information on challenging national security issues and specific support to decision makers in the many organizations and agencies that address national defense. MORS provides an array of meetings and publications. In particular, the Society provides a unique environment in which classified presentations and discussions can take place with joint service participation and peer criticism from the full range of students, theoreticians, practitioners and users of military analysis. Throughout its activities, the Society promotes professional methodology, individual excellence and ethical conduct.
  • 510
  • 22 Nov 2022
Topic Review
ACT-R
ACT-R (pronounced /ˌækt ˈɑr/; short for "Adaptive Control of Thought—Rational") is a cognitive architecture mainly developed by John Robert Anderson and Christian Lebiere at Carnegie Mellon University. Like any cognitive architecture, ACT-R aims to define the basic and irreducible cognitive and perceptual operations that enable the human mind. In theory, each task that humans can perform should consist of a series of these discrete operations. Most of the ACT-R's basic assumptions are also inspired by the progress of cognitive neuroscience, and ACT-R can be seen and described as a way of specifying how the brain itself is organized in a way that enables individual processing modules to produce cognition.
  • 510
  • 05 Dec 2022
Topic Review
Livescribe
The Livescribe paper-based computing platform consists of a digital pen, digital paper, software applications, and developer tools. Central to the Livescribe platform is the smartpen, a ballpoint pen with an embedded computer and digital audio recorder. When used with Anoto digital paper, it records what it writes for later uploading to a computer, and synchronizes those notes with any audio it has recorded. This allows users to replay portions of a recording by tapping on the notes they were taking at the time the recording was made. It is also possible to select which portion of a recording to replay by clicking on the relevant portion of a page on-screen, once it has been synced to the Livescribe Desktop software. Jim Marggraff, inventor of the LeapFrog FLY Pentop computer and creator of the LeapPad Learning System, left Leapfrog in 2005 to form Livescribe. In November 2015, Livescribe announced its acquisition by Anoto for $15m.
  • 508
  • 17 Oct 2022
  • Page
  • of
  • 47
ScholarVision Creations