You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Graphicacy
Graphicacy is defined as the ability to understand and present information in the form of sketches, photographs, diagrams, maps, plans, charts, graphs and other non-textual formats. The word graphicacy was coined by Balchin and Coleman as representation of the visuo-spatial abilities, they gave their reasons as follows "In the choice of a word to denote the educated counterpart of visual-spatial ability one must first ask the question what exactly does this form of communication involve. It is fundamentally the communication of spatial information that cannot be conveyed adequately by verbal or numerical means,e.g. the plan of a town, the pattern of a drainage network or a picture of a distant place - in other words the whole field of the graphic arts and much of geography cartography, computer-graphics, photography, itself. All of these words contain the syllable "graph" which seemed a logical stem for "graphicacy" which was completed by analogy with literacy, numeracy and articulacy. The modern economy is becoming increasingly reliant on graphics to communicate information. Until recently, words and numbers were the main vehicles for communication, as they have long been relatively easy to produce and distribute in comparison with graphics. Advances in information and communications technology and visualization techniques are increasing the accessibility and usage of graphics, increasing the importance of information graphics. Interpretation of graphics is loosely analogous to the process of reading text, while generation of graphics is the counterpart of writing text. However, these analogies are imperfect, as text and graphics are based on very different symbol systems. For example, whereas text is structured according to formal organisational rules that apply irrespective of the content, this is not the case for graphics. With text structure, the units of information (words) are expected to be organised according to broad conventions (such as being sequenced in orderly rows starting from top left and progressing down the page). However graphics are not subject to a similarly stringent set of structural conventions. Instead, it is the content itself that largely determines the nature of the graphic entities and the way they are arranged. For example, the form and spatial arrangement of the items that comprise the actual subject matter being represented in the graphic are used as the basis for the graphic entities and structure that are displayed in the graphic. This is not the case with written text where the words and their arrangement bear no resemblance to the represented subject matter. Because of these and other fundamental differences between text and graphics, it is appropriate that the processes involved in comprehension and production of graphics are clearly distinguished from those involved in comprehension and production of text.
  • 967
  • 29 Nov 2022
Topic Review
At-Large Advisory Committee
The At-Large Advisory Committee (ALAC) is an advisory committee to ICANN, the organization that administers the Internet's Domain Name System and addressing system. According to ICANN Bylaw XI.4.a, "ALAC is the primary organizational home within ICANN for individual Internet users", with a mandate to "consider and provide advice on the activities of ICANN, insofar as they relate to the interests of individual Internet users".
  • 963
  • 24 Nov 2022
Topic Review
Evaluating the Presence of Software-as-a-Medical-Device
SaMD is a growing trend within medical device innovation. In this work, we provide the first empirical analysis of SaMD. Within Australia, which relies heavily on importation of medical devices, SaMD shows a greater domestic production than other types of medical devices.
  • 960
  • 31 Aug 2021
Topic Review
INTERLNK
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 957
  • 28 Nov 2022
Topic Review
Cray-2
The Cray-2 is a supercomputer with four vector processors made by Cray Research starting in 1985. At 1.9 GFLOPS peak performance, it was the fastest machine in the world when it was released, replacing the Cray X-MP in that spot. It was, in turn, replaced in that spot by the Cray Y-MP in 1988. The Cray-2 was the first of Seymour Cray's designs to successfully use multiple CPUs. This had been attempted in the CDC 8600 in the early 1970s, but the emitter-coupled logic (ECL) transistors of the era were too difficult to package into a working machine. The Cray-2 addressed this through the use of ECL integrated circuits, packing them in a novel 3D wiring that greatly increased circuit density. The dense packaging and resulting heat loads were a major problem for the Cray-2. This was solved in a unique fashion by forcing the electrically inert Fluorinert liquid through the circuitry under pressure and then cooling it outside the processor box. The unique "waterfall" cooler system came to represent high-performance computing in the public eye and was found in many informational films and as a movie prop for some time. Unlike the original Cray-1, the Cray-2 had difficulties delivering peak performance. Other machines from the company, like the X-MP and Y-MP, outsold the Cray-2 by a wide margin. When Cray began development of the Cray-3, the company chose to develop the Cray C90 series instead. This is the same sequence of events that occurred when the 8600 was being developed, and as in that case, Cray left the company.
  • 956
  • 04 Nov 2022
Topic Review
Service Virtualisation
Continuous delivery is an industry software development approach that aims to reduce the delivery time of software and increase the quality assurance within a short development cycle. The fast delivery and improved quality require continuous testing of the developed software service. Testing services are complicated and costly and postponed to the end of development due to unavailability of the requisite services. Therefore, an empirical approach that has been utilised to overcome these challenges is to automate software testing by virtualising the requisite services’ behaviour for the system being tested. Service virtualisation involves analysing the behaviour of software services to uncover their external behaviour in order to generate a light-weight executable model of the requisite services. There are different research areas which can be used to create such a virtual model of services from network interactions or service execution logs, including message format extraction, inferring control model, data model and multi-service dependencies.
  • 955
  • 07 Apr 2021
Topic Review
Comprehensive School Mathematics Program
Comprehensive School Mathematics Program (CSMP) stands for both the name of a curriculum and the name of the project that was responsible for developing curriculum materials in the United States. Two major curricula were developed as part of the overall CSMP project: the Comprehensive School Mathematics Program (CSMP), a K–6 mathematics program for regular classroom instruction, and the Elements of Mathematics (EM) program, a grades 7–12 mathematics program for gifted students. EM treats traditional topics rigorously and in-depth, and was the only curriculum that strictly adhered to Goals for School Mathematics: The Report of the Cambridge Conference on School Mathematics (1963). As a result, it includes much of the content generally required for an undergraduate mathematics major. These two curricula are unrelated to one another, but certain members of the CSMP staff contributed to the development of both projects. Additionally, some staff were involved with the Secondary School Mathematics Curriculum Improvement Study program being developed around the same time. What follows is a description of the K–6 program that was designed for a general, heterogeneous audience. The CSMP project was established in 1966, under the direction of Burt Kaufman, who remained director until 1979, succeeded by Clare Heidema. It was originally affiliated with Southern Illinois University in Carbondale, Illinois. After a year of planning, CSMP was incorporated into the Central Midwest Regional Educational Laboratory (later CEMREL, Inc.), one of the national educational laboratories funded at that time by the U.S. Office of Education. In 1984, the project moved to Mid-continental Research for Learning (McREL) Institute's Comprehensive School Reform program, who supported the program until 2003. Heidema remained director to its conclusion. In 1984, it was implemented in 150 school districts in 42 states and about 55,000 students.
  • 955
  • 18 Oct 2022
Topic Review
Social Affordance
Social affordance is a type of affordance. It refers to the properties of an object or environment that permit social actions. Social affordance is most often used in the context of a social technology such as Wiki, Chat and Facebook applications and refers to sociotechnical affordances. Social affordances emerge from the coupling between the behavioral and cognitive capacities of a given organism and the objective properties of its environment. Social affordances – or more accurately sociotechnical affordances – refer as reciprocal interactions between a technology application, its users, and its social context. These social interactions include users’ responses, social accessibility and society related changes. Social affordances are not synonymous with mere factual, statistical frequency; on the contrary, the social normality of primitive forms of coordination can become normative, even in primate societies. A good example clarifies social affordance as follows: “ A wooden bench is supposed to have a sit affordance. A hiker who has walked for hours and passes the wooden bench on a walk along small country roads might perceive the sit affordance of the wooden bench as a function of the degree of fatigue. A very tired hiker will sit on the wooden bench but will not lie down (unless the wooden bench also has a lie affordance). A still fit hiker, however, might not even pick up on the sit affordance of the bench and pass it. The wooden bench is in that case no more than a piece of wood with no further meaning.”
  • 954
  • 01 Nov 2022
Topic Review
Agent-Based Model in Biology
Agent-based models have many applications in biology, primarily due to the characteristics of the modeling method. Agent-based modeling is a rule-based, computational modeling methodology that focuses on rules and interactions among the individual components or the agents of the system. The goal of this modeling method is to generate populations of the system components of interest and simulate their interactions in a virtual world. Agent-based models start with rules for behavior and seek to reconstruct, through computational instantiation of those behavioral rules, the observed patterns of behavior.
  • 949
  • 24 Oct 2022
Topic Review
Numerical Partial Differential Equations
Numerical partial differential equations is the branch of numerical analysis that studies the numerical solution of partial differential equations (PDEs).
  • 948
  • 25 Nov 2022
Topic Review
XTS-400
The XTS-400 is a multilevel secure computer operating system. It is multiuser and multitasking that uses multilevel scheduling in processing data and information. It works in networked environments and supports Gigabit Ethernet and both IPv4 and IPv6. The XTS-400 is a combination of Intel x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version 6.0 in December 2003. STOP provides high-assurance security and was the first general-purpose operating system with a Common Criteria assurance level rating of EAL5 or above. The XTS-400 can host, and be trusted to separate, multiple, concurrent data sets, users, and networks at different sensitivity levels. The XTS-400 provides both an untrusted environment for normal work and a trusted environment for administrative work and for privileged applications. The untrusted environment is similar to traditional Unix environments. It provides binary compatibility with Linux applications running most Linux commands and tools as well as most Linux applications without the need for recompiling. This untrusted environment includes an X Window System GUI, though all windows on a screen must be at the same sensitivity level. To support the trusted environment and various security features, STOP provides a set of proprietary APIs to applications. In order to develop programs that use these proprietary APIs, a special software development environment (SDE) is needed. The SDE is also needed in order to port some complicated Linux/Unix applications to the XTS-400. A new version of the STOP operating system, STOP 7 has since been introduced, with claims to have improved performance and new features such as RBAC.
  • 946
  • 08 Oct 2022
Topic Review
Advanced Persistent Threats Detection for Mobile Devices
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartphones have become the main target of APT attacks.
  • 942
  • 12 Oct 2023
Topic Review
Lempel-Ziv Complexity
The Lempel-Ziv complexity is a measure that was first presented in the article On the Complexity of Finite Sequences (IEEE Trans. On IT-22,1 1976), by two Israeli computer scientists, Abraham Lempel and Jacob Ziv. This complexity measure is related to Kolmogorov complexity, but the only function it uses is the recursive copy (i.e., the shallow copy). The underlying mechanism in this complexity measure is the starting point for some algorithms for lossless data compression, like LZ77, LZ78 and LZW. Even though it is based on an elementary principle of words copying, this complexity measure is not too restrictive in the sense that it satisfies the main qualities expected by such a measure: sequences with a certain regularity do not have a too large complexity, and the complexity grows as the sequence grows in length and irregularity. The Lempel-Ziv complexity can be used to measure the repetitiveness of binary sequences and text, like song lyrics or prose. Fractal dimension estimates of real-world data have also been shown to correlate with Lempel-Ziv complexity.
  • 933
  • 07 Nov 2022
Topic Review
Frame Technology (Software Engineering)
Frame technology (FT) is a language-neutral (i.e., processes various languages) system that manufactures custom software from reusable, machine-adaptable building blocks, called frames. FT is used to reduce the time, effort, and errors involved in the design, construction, and evolution of large, complex software systems. Fundamental to FT is its ability to stop the proliferation of similar but subtly different components, an issue plaguing software engineering, for which programming language constructs (subroutines, classes, or templates/generics) or add-in techniques such as macros and generators failed to provide a practical, scalable solution. A number of implementations of FT exist. Netron Fusion specializes in constructing business software and is proprietary. ART (Adaptive Reuse Technology) is a general-purpose, open-source implementation of FT. Paul G. Bassett invented the first FT in order to automate the repetitive, error-prone editing involved in adapting (generated and hand-written) programs to changing requirements and contexts. A substantial literature now exists that explains how FT can facilitate most aspects of software's life-cycle, including domain modeling, requirements gathering, architecture and design, construction, testing, documentation, fine tuning and evolution. Independent comparisons of FT to alternative approaches confirm that the time and resources needed to build and maintain complex systems can be substantially reduced. One reason: FT shields programmers from software's inherent redundancies: FT has reproduced COTS object-libraries from equivalent XVCL frame libraries that are two-thirds smaller and simpler; custom business applications are routinely specified and maintained by Netron FusionSPC frames that are 5% – 15% of the size of their assembled source files.
  • 929
  • 18 Oct 2022
Topic Review
Scientific Workflow System
A scientific workflow system is a specialized form of a workflow management system designed specifically to compose and execute a series of computational or data manipulation steps, or workflow, in a scientific application.
  • 929
  • 24 Oct 2022
Topic Review
FUJITSU Cloud IaaS Trusted Public S5
FUJITSU Cloud IaaS Trusted Public S5 is a Fujitsu cloud computing platform that aims to deliver standardized enterprise-class public cloud services globally. It offers Infrastructure-as-a-Service (IaaS) from Fujitsu's data centres to provide computing resources that can be employed on-demand and suited to customers' needs. The service ensures a high level of reliability that is sufficient for deployment in mission-critical systems. In Japan, the service was offered as the On-Demand Virtual System Service (OViSS) and was then launched globally as Fujitsu Global Cloud Platform/S5 (FGCP/S5). Since July 2013 the service has been called IaaS Trusted Public S5. Globally, the service is operated from Fujitsu data centers located in Australia , Singapore, the United States , the United Kingdom and Germany . Fujitsu has also launched a Windows Azure powered Global Cloud Platform in a partnership with Microsoft. This is a Platform-as-a-Service (PaaS) offering that was known as FGCP/A5 in Japan but has since been renamed FUJITSU Cloud PaaS A5 for Windows Azure. It is operated from a Fujitsu data center in Japan. It offers a set of application development frameworks, such as Microsoft .NET, Java and PHP, and data storage capabilities consistent with the Windows Azure platform provided by Microsoft. The basic service consists of compute, storage, Microsoft SQL Azure, and Windows Azure AppFabric technologies such as Service Bus and Access Control Service, with options for interoperating services covering implementation and migration of applications, system building, systems operation, and support. In 2015, Fujitsu launched its next generation Cloud Service K5 and was deployed globally. In October 2018, Fujitsu announced that it was discontinuing K5 in all regions except Japan. On October 16, 2018 the company stated that it will hire 10,000 employees and train them to use Microsoft Azure in order to "address what we see as an industry-wide shortage in cloud related skills, so that we can help clients address their execution gap in the provision of services which support operational efficiency, digital co-creation and multi-cloud management.”
  • 928
  • 04 Nov 2022
Topic Review
Life and Death
Life and death (死活) is a fundamental concept in the game of Go, where the status of a distinct group of stones is determined as either being "alive", where they may remain on the board indefinitely, or "dead," where the group will be lost as "captured". The basic idea can be summarized by:
  • 927
  • 25 Nov 2022
Topic Review
Xi (Alternate Reality Game)
Xi (UK: /ˈsaɪ/ or US: /ˈzaɪ/) was the world's first console-based and virtual world-based alternate reality game. It was a one-time-only play, unfolding in real time, and only available on the PlayStation 3 through the social gaming network, PlayStation Home. The game was an adventure to help find "Jess" and the meaning of Xi by collecting fragments and butterflies found in a series of secret areas in Home that changed frequently. The game also challenged the users to search for clues in the real world. The game was created by nDreams who released several spaces for Xi. The game was promoted through a teaser campaign of clues and hints during the month prior to its release on March 23, 2009. The clues were hidden in the Menu Pad and videos in the central meeting point. The game lasted a total of 12 weeks from its release. Xi and all of the corresponding spaces were exclusive to the European and North American versions of PlayStation Home, though there were also websites, videos, printed media and live events which were accessible to anyone. In September 2009, it was reported that the number of visits to the Xi spaces, including the ones after Xi's completion, had exceeded 5 million visits. A sequel, Xi: Continuum, was released in December 2012.
  • 924
  • 30 Oct 2022
Topic Review
Quantum Machine Learning for Security Assessment in IoMT
Internet of Medical Things (IoMT) is an ecosystem composed of connected electronic items such as small sensors/actuators and other cyber-physical devices (CPDs) in medical services. When these devices are linked together, they can support patients through medical monitoring, analysis, and reporting in more autonomous and intelligent ways.
  • 924
  • 13 Oct 2023
Topic Review
Time Control
A time control is a mechanism in the tournament play of almost all two-player board games so that each round of the match can finish in a timely way and the tournament can proceed. Time controls are typically enforced by means of a game clock, where the times below are given per player. Time pressure (or time trouble or Zeitnot) is the situation of having very little time on a player's clock to complete their remaining moves.
  • 922
  • 21 Oct 2022
  • Page
  • of
  • 48
Academic Video Service