You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Military Operations Research Society
The Military Operations Research Society (MORS) is a society for professionals active within defense applications of operations research (OR) in the United States . Membership include analysts, researchers, consultants and officers in the United States Department of Defense, organizations within the military of the United States, various think tanks, academic institutions and consultancy firms. The Military Operations Research Society arranges symposia and courses, and publishes books, a quarterly bulletin called Phalanx, and a peer reviewed journal called Military Operations Research. Participation in MORS activities generally requires a United States security clearance. MORS is headquartered in Alexandria, Virginia. The MORS has served the Department of Defense analytic community for over forty years and now also includes other aspects of national security for the United States federal government. Under the sponsorship of the Army, Navy, Air Force, Marine Corps, Office of the Secretary of Defense, the Joint Staff and the Department of Homeland Security, the objective of MORS is to enhance the quality and effectiveness of operations research as applied to national security issues. MORS vision is to "become the recognized leader in advancing the national security analytic community through the advancement and application of the interdisciplinary field of Operations Research to national security issues, being responsive to our constituents, enabling collaboration and development opportunities, and expanding our membership and disciplines, while maintaining our profession’s heritage." This vision encompasses all aspects of national security including not only the military but also Homeland Security and the other agencies of government – including the US and its allies. Members of the Society include a cross section of the defense analysts, operators and managers from government, industry and academia. Their involvement fosters professional interchange within the military operations research community, the sharing of insights and information on challenging national security issues and specific support to decision makers in the many organizations and agencies that address national defense. MORS provides an array of meetings and publications. In particular, the Society provides a unique environment in which classified presentations and discussions can take place with joint service participation and peer criticism from the full range of students, theoreticians, practitioners and users of military analysis. Throughout its activities, the Society promotes professional methodology, individual excellence and ethical conduct.
  • 873
  • 22 Nov 2022
Topic Review
Virtual Reality Automotive Lab Development
A Virtual Reality application was developed to be used as an immersive virtual learning strategy for Oculus Rift S Virtual Reality glasses and through Leap Motion Controller™ infrared sensors, focused on students of the Automotive Systems Engineering academic program, as a practical teaching-learning tool in the context of Education 4.0 and the pandemic caused by COVID-19 that has kept schools closed since March 2020. The technological pillars of Industry 4.0 were used to profile students so that they can meet the demands of their professional performance at the industrial level. Virtual Reality (VR) plays a very important role for the production-engineering sector in areas such as design and autonomous cars, as well as in training and driving courses. The VR application provides the student with a more immersive and interactive experience, supported by 3D models of both the main parts that make up the four-stroke combustion engine and the mechanical workshop scenario; it allows the student to manipulate the main parts of the four-stroke combustion engine through the Oculus Rift S controls and the Leap Motion Controller™ infrared sensors, and relate them to the operation of the engine, through the animation of its operation and the additional information shown for each part that makes it up in the application. 
  • 871
  • 06 Sep 2021
Topic Review
Cryptographic Engineering
Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate. Below are the main topics that are specifically related to cryptographic engineering: Cryptographic implementations Attacks against implementations and countermeasures against these attacks Tools and methodologies Applications Interactions between cryptographic theory and implementation issues
  • 871
  • 08 Nov 2022
Topic Review
BOSH
BOSH is an open-source software project that offers a toolchain for release engineering, software deployment and application lifecycle management of large-scale distributed services. The toolchain is made up of a server (the BOSH Director) and a command line tool. BOSH is typically used to package, deploy and manage cloud software. While BOSH was initially developed by VMware in 2010 to deploy Cloud Foundry PaaS, it can be used to deploy other software (such as Hadoop, RabbitMQ, or MySQL for instance). BOSH is designed to manage the whole lifecycle of large distributed systems. Since March 2016, BOSH can manage deployments on both Microsoft Windows and Linux servers. A BOSH Director communicates with a single Infrastructure as a service (IaaS) provider to manage the underlying networking and virtual machines (VMs) (or containers). Several IaaS providers are supported: Amazon Web Services EC2, Apache CloudStack, Google Compute Engine, Microsoft Azure, OpenStack, and VMware vSphere. To help support more underlying IaaS providers, BOSH uses the concept of a Cloud Provider Interface (CPI). There is an implementation of the CPI for each of the IaaS providers listed above. Typically the CPI is used to deploy VMs, but it can be used to deploy containers as well. Few CPIs exist for deploying containers with BOSH and only one is actively supported. For this one, BOSH uses a CPI that deploys Pivotal Software's Garden containers (Garden is very similar to Docker) on a single virtual machine, run by VirtualBox or VMware Workstation. In theory, any other container engine could be supported, if the necessary CPIs were developed. Due to BOSH indifferently supporting deployments on VMs or containers, BOSH uses the generic term “instances” to designate those. It is up to the CPI to choose whether a BOSH “instance” is actually a VM or a container.
  • 870
  • 28 Nov 2022
Topic Review
Libraries in Second Life
Second Life (SL) is an immersive 3D environment that can be used for entertainment and educational purposes. Due to increasing interest in digital services, some libraries have established virtual services on Second Life.
  • 869
  • 26 Oct 2022
Topic Review
Network Computer
The Network Computer (or NC) was a diskless desktop computer device made by Oracle Corporation from about 1996 to 2000. The devices were designed and manufactured by an alliance, which included Sun Microsystems, IBM, and others. The devices were designed with minimum specifications, based on the Network Computer Reference Profile. The brand was also employed as a marketing term to try to popularize this design of computer within enterprise and among consumers. The NC brand was mainly intended to inspire a range of desktop computers from various suppliers that, by virtue of their diskless design and use of inexpensive components and software, were cheaper and easier to manage than standard fat client desktops. However, due to the commoditization of standard desktop components, and due to the increasing availability and popularity of various software options for using full desktops as diskless nodes, thin clients, and hybrid clients, the Network Computer brand never achieved the popularity hoped for by Oracle and was eventually mothballed. The term "network computer" is now used for any diskless desktop computer or a thin client.
  • 868
  • 11 Oct 2022
Topic Review
Hattendorf's Theorem
Hattendorff's Theorem, attributed to K. Hattendorff (1868), is a theorem in actuarial science that describes the allocation of the variance or risk of the loss random variable over the lifetime of an actuarial reserve. In other words, Hattendorff's theorem demonstrates that the variation in the present value of the loss of an issued insurance policy can be allocated to the future years during which the insured is still alive. This, in turn, facilitates the management of risk prevalent in such insurance contracts over short periods of time.
  • 865
  • 02 Nov 2022
Topic Review
Coherent States in Mathematical Physics
Coherent states have been introduced in a physical context, first as quasi-classical states in quantum mechanics, then as the backbone of quantum optics and they are described in that spirit in the article Coherent states (see also). However, they have generated a huge variety of generalizations, which have led to a tremendous amount of literature in mathematical physics. In this article, we sketch the main directions of research on this line. For further details, we refer to several existing surveys.
  • 865
  • 30 Nov 2022
Topic Review
ISO 17442
A Legal Entity Identifier (or LEI) is a 20-character identifier that identifies distinct legal entities that engage in financial transactions. It is defined by ISO 17442. Natural persons are not required to have an LEI; they’re eligible to have one issued, however, but only if they act in an independent business capacity. The LEI is a global standard, designed to be non-proprietary data that is freely accessible to all. As of October 2017, over 630,000 legal entities from more than 195 countries have now been issued with LEIs.
  • 864
  • 28 Nov 2022
Topic Review
Using Homomorphic Encryption for Smart Metering Systems
Smart metering systems (SMSs) have been widely used by industrial users and residential customers for purposes such as real-time tracking, outage notification, quality monitoring, load forecasting, etc. Protecting data privacy for SMSs that considers trust boundaries (TBs) and computability using real-world data sets while providing privacy guarantees. The proposed framework uses homomorphic encryption (HE) as a primitive for security. HE can provide strong protection based on cryptography and data processing on encrypted data without first decrypting it.
  • 863
  • 31 May 2023
Topic Review
GenI Process
The GenI process (/dʒiːnaɪ/ for Generic Intelligence) models team decision making by launching a chaotic competition between so-called ideas, where one idea after another dwindles out until exactly one remains. The decision statistics are completely determined by the process start configuration and match those known from quantum measurements. The random process accomplishes this in a natural way without any fine adjustment. Therefore, it is also of interest for the interpretation of physical processes. In mathematical terms, the GenI process describes a time-discrete stochastic process [math]\displaystyle{ X: [0,1] \times \mathbb{N}_0 \rightarrow 2^E }[/math] in the state space of the finite subsets of a countable set E, together with a mapping [math]\displaystyle{ 2^E \rightarrow \mathbb{C}^n }[/math] of the power set on E into an n-dimensional complex vector space. In principle, it can be classified as a Markov chain of first order, with variable transition probabilities [math]\displaystyle{ P(X_{n+1} \mid X_n) }[/math]. There are two expressions of the GenI process, for [math]\displaystyle{ n \geq 2 }[/math] and for [math]\displaystyle{ n=2 }[/math].
  • 861
  • 29 Sep 2022
Topic Review
One Instruction Set Computer
A one instruction set computer (OISC), sometimes called an ultimate reduced instruction set computer (URISC), is an abstract machine that uses only one instruction – obviating the need for a machine language opcode. With a judicious choice for the single instruction and given infinite resources, an OISC is capable of being a universal computer in the same manner as traditional computers that have multiple instructions.:55 OISCs have been recommended as aids in teaching computer architecture:327:2 and have been used as computational models in structural computing research.
  • 859
  • 20 Oct 2022
Topic Review
Object-Relational Impedance Mismatch
The object-relational impedance mismatch is a set of conceptual and technical difficulties that are often encountered when a relational database management system (RDBMS) is being served by an application program (or multiple application programs) written in an object-oriented programming language or style, particularly because objects or class definitions must be mapped to database tables defined by a relational schema. The term object-relational impedance mismatch is derived from the electrical engineering term impedance matching.
  • 855
  • 19 Oct 2022
Topic Review
COVID Mortality Prediction
The considerations in this review may help to develop further studies to predict mortality in COVID patients, including both adulthood and childhood, although children and young people remain at low risk of COVID mortality. Moreover, suggestions collected in this study could also be useful to predict prognoses other than mortality (e.g., intubation and length of hospital stay).
  • 854
  • 27 Oct 2021
Topic Review
Rob Redding
Robert "Rob" Redding, Jr. (born January 13, 1976) is an American media proprietor, award-winning radio talk show host, political commentator, independent journalist, a best-selling American author, a best-selling American music artist and songwriter, visual artist and social entrepreneur. Redding is known as the founder and publisher of Redding News Review and host of a talk radio show and podcast. In 2003, he was among few blacks to be named to Talkers Magazine's "100 Most Important Radio Talk Show Hosts in America" and has received a proclamation for his work by the Atlanta City Council the same year. He made history being the only black program director in white-dominated talk radio station in 2009. His web site Redding News Review has earned three consecutive Black Web Awards. He currently runs the web's oldest black news aggregation outlet and first and most successful stand-alone subscriber-based web site and talk show.
  • 854
  • 10 Oct 2022
Topic Review
Interactive Storytelling
Interactive storytelling (also known as interactive drama) is a form of digital entertainment in which the storyline is not predetermined. The author creates the setting, characters, and situation which the narrative must address, but the user (also reader or player) experiences a unique story based on their interactions with the story world. The architecture of an interactive storytelling program includes a drama manager, user model, and agent model to control, respectively, aspects of narrative production, player uniqueness, and character knowledge and behavior. Together, these systems generate characters that act "human," alter the world in real-time reactions to the player, and ensure that new narrative events unfold comprehensibly. The field of study surrounding interactive storytelling encompasses many disparate fields, including psychology, sociology, cognitive science, linguistics, natural language processing, user interface design, computer science, and emergent intelligence. They fall under the umbrella term of Human-Computer Interaction (HCI), at the intersection of hard science and the humanities. The difficulty of producing an effective interactive storytelling system is attributed to the ideological division between professionals in each field: artists have trouble constraining themselves to logical and linear systems and programmers are disinclined to appreciate or incorporate the abstract and unproven concepts of the humanities.
  • 853
  • 07 Nov 2022
Topic Review
Internet-Based Treatments for Trauma Survivors
Internet-based treatments for trauma survivors is a growing class of online treatments that allow for an individual who has experienced trauma to seek and receive treatment without needing to attend psychotherapy in person. The progressive movement to online resources and the need for more accessible mental health services has given rise to the creation of online-based interventions aimed to help those who have experienced traumatic events. Cognitive behavioral therapy (CBT) has shown to be particularly effective in the treatment of trauma-related disorders and adapting CBT to an online format has been shown to be as effective as in-person CBT in the treatment of trauma. Due to its positive outcomes, CBT-based internet treatment options for trauma survivors has been an expanding field in both research and clinical settings.
  • 852
  • 27 Oct 2022
Topic Review
Blockchain Technology and E-Government
The field of electronic government (e-government) is gaining prominence in contemporary society, as it has a significant influence on the wider populace within the context of a technologically advanced world. E-government makes use of information and communication technologies (ICTs) at various levels and domains within government agencies and the public sector. ICT reduces manual labour, potential fraud points, errors, and process lapses. The Internet’s quick accessibility and the widespread adoption of modern technologies and disciplines, such as big data, the Internet of Things, machine learning, and artificial intelligence, have accelerated the need for e-government.
  • 850
  • 07 Aug 2023
Topic Review
Gatling
Gatling is an open-source load- and performance-testing framework based on Scala, Akka and Netty. The first stable release was published on January 13, 2012. In 2015, Gatling's founder, Stéphane Landelle, created a company (named "Gatling Corp"), dedicated to the development of the open-source project. According to Gatling Corp's official blog, Gatling was downloaded more than 1,000,000 times (2021). In June 2016, Gatling officially presented Gatling FrontLine, Gatling's Enterprise Version with additional features. The software is designed to be used as a load testing tool for analyzing and measuring the performance of a variety of services, with a focus on web applications. Gatling was mentioned twice in ThoughtWorks Technology Radar, in 2013 and 2014, "as a tool worth trying", with an emphasis on "the interesting premise of treating your performance tests as production code". The latest stable release is Gatling 3.8.0, published on July 06, 2022.
  • 847
  • 08 Nov 2022
Topic Review
Coordination Center for TLD RU
The Coordination Center for TLD RU (the acronym - the Coordination Center for domains .RU/.РФ; the full name - ANO “The Coordination Center for TLD RU”) — is the administrator of Top Level National Domains .RU and .PФ. It serves as the national registry.
  • 844
  • 07 Nov 2022
  • Page
  • of
  • 48
Academic Video Service