Your browser does not fully support modern features. Please upgrade for a smoother experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
ThinkServer
The ThinkServer product line began with the TS100 from Lenovo. The server was developed under agreement with IBM, by which Lenovo would produce single-socket and dual-socket servers based on IBM's xSeries technology. An additional feature of the server design was a support package aimed at small businesses. The focus of this support package was to provide small businesses with software tools to ease the process of server management and reduce dependence on IT support. The tools developed for this support package included: Lenovo's ThinkServer naming conventions reflect whether the server is a tower server or a rack server. First letter "T" is used to indicate tower servers, while "R" is used for rack servers, and "S" is storage rack server. Similarly, secondary letter "S" indicates single socket, while "D" indicates dual-socket. The ThinkServer family has been discontinued in 2019, and the new family of Intel servers is named ThinkSystem.
  • 890
  • 11 Nov 2022
Topic Review
COVID Mortality Prediction
The considerations in this review may help to develop further studies to predict mortality in COVID patients, including both adulthood and childhood, although children and young people remain at low risk of COVID mortality. Moreover, suggestions collected in this study could also be useful to predict prognoses other than mortality (e.g., intubation and length of hospital stay).
  • 888
  • 27 Oct 2021
Topic Review
Object-Relational Impedance Mismatch
The object-relational impedance mismatch is a set of conceptual and technical difficulties that are often encountered when a relational database management system (RDBMS) is being served by an application program (or multiple application programs) written in an object-oriented programming language or style, particularly because objects or class definitions must be mapped to database tables defined by a relational schema. The term object-relational impedance mismatch is derived from the electrical engineering term impedance matching.
  • 887
  • 19 Oct 2022
Topic Review
Predictive Modeling of Student Dropout in MOOCs
The features of massive open online courses (MOOCs), such as internet-based massiveness, openness, and flexible learning, create a unique blend of a large number of learners, making the prediction of learner success (as well as providing support based on these predictions) particularly challenging. 
  • 885
  • 20 Oct 2023
Topic Review
Hattendorf's Theorem
Hattendorff's Theorem, attributed to K. Hattendorff (1868), is a theorem in actuarial science that describes the allocation of the variance or risk of the loss random variable over the lifetime of an actuarial reserve. In other words, Hattendorff's theorem demonstrates that the variation in the present value of the loss of an issued insurance policy can be allocated to the future years during which the insured is still alive. This, in turn, facilitates the management of risk prevalent in such insurance contracts over short periods of time.
  • 884
  • 02 Nov 2022
Topic Review
BOSH
BOSH is an open-source software project that offers a toolchain for release engineering, software deployment and application lifecycle management of large-scale distributed services. The toolchain is made up of a server (the BOSH Director) and a command line tool. BOSH is typically used to package, deploy and manage cloud software. While BOSH was initially developed by VMware in 2010 to deploy Cloud Foundry PaaS, it can be used to deploy other software (such as Hadoop, RabbitMQ, or MySQL for instance). BOSH is designed to manage the whole lifecycle of large distributed systems. Since March 2016, BOSH can manage deployments on both Microsoft Windows and Linux servers. A BOSH Director communicates with a single Infrastructure as a service (IaaS) provider to manage the underlying networking and virtual machines (VMs) (or containers). Several IaaS providers are supported: Amazon Web Services EC2, Apache CloudStack, Google Compute Engine, Microsoft Azure, OpenStack, and VMware vSphere. To help support more underlying IaaS providers, BOSH uses the concept of a Cloud Provider Interface (CPI). There is an implementation of the CPI for each of the IaaS providers listed above. Typically the CPI is used to deploy VMs, but it can be used to deploy containers as well. Few CPIs exist for deploying containers with BOSH and only one is actively supported. For this one, BOSH uses a CPI that deploys Pivotal Software's Garden containers (Garden is very similar to Docker) on a single virtual machine, run by VirtualBox or VMware Workstation. In theory, any other container engine could be supported, if the necessary CPIs were developed. Due to BOSH indifferently supporting deployments on VMs or containers, BOSH uses the generic term “instances” to designate those. It is up to the CPI to choose whether a BOSH “instance” is actually a VM or a container.
  • 884
  • 28 Nov 2022
Topic Review
Most Frequent K Characters
In information theory, MostFreqKDistance is a string metric technique for quickly estimating how similar two ordered sets or strings are. The scheme was invented by Sadi Evren Seker (2014), and initially used in text mining applications like author recognition. The method is originally based on a hashing function MaxFreqKChars classical author recognition problem and idea first came out while studying on data stream mining. The algorithm is suitable for coding in any turing complete programming language.
  • 882
  • 10 Nov 2022
Topic Review
Rob Redding
Robert "Rob" Redding, Jr. (born January 13, 1976) is an American media proprietor, award-winning radio talk show host, political commentator, independent journalist, a best-selling American author, a best-selling American music artist and songwriter, visual artist and social entrepreneur. Redding is known as the founder and publisher of Redding News Review and host of a talk radio show and podcast. In 2003, he was among few blacks to be named to Talkers Magazine's "100 Most Important Radio Talk Show Hosts in America" and has received a proclamation for his work by the Atlanta City Council the same year. He made history being the only black program director in white-dominated talk radio station in 2009. His web site Redding News Review has earned three consecutive Black Web Awards. He currently runs the web's oldest black news aggregation outlet and first and most successful stand-alone subscriber-based web site and talk show.
  • 881
  • 10 Oct 2022
Topic Review
Interactive Storytelling
Interactive storytelling (also known as interactive drama) is a form of digital entertainment in which the storyline is not predetermined. The author creates the setting, characters, and situation which the narrative must address, but the user (also reader or player) experiences a unique story based on their interactions with the story world. The architecture of an interactive storytelling program includes a drama manager, user model, and agent model to control, respectively, aspects of narrative production, player uniqueness, and character knowledge and behavior. Together, these systems generate characters that act "human," alter the world in real-time reactions to the player, and ensure that new narrative events unfold comprehensibly. The field of study surrounding interactive storytelling encompasses many disparate fields, including psychology, sociology, cognitive science, linguistics, natural language processing, user interface design, computer science, and emergent intelligence. They fall under the umbrella term of Human-Computer Interaction (HCI), at the intersection of hard science and the humanities. The difficulty of producing an effective interactive storytelling system is attributed to the ideological division between professionals in each field: artists have trouble constraining themselves to logical and linear systems and programmers are disinclined to appreciate or incorporate the abstract and unproven concepts of the humanities.
  • 880
  • 07 Nov 2022
Topic Review
Network Computer
The Network Computer (or NC) was a diskless desktop computer device made by Oracle Corporation from about 1996 to 2000. The devices were designed and manufactured by an alliance, which included Sun Microsystems, IBM, and others. The devices were designed with minimum specifications, based on the Network Computer Reference Profile. The brand was also employed as a marketing term to try to popularize this design of computer within enterprise and among consumers. The NC brand was mainly intended to inspire a range of desktop computers from various suppliers that, by virtue of their diskless design and use of inexpensive components and software, were cheaper and easier to manage than standard fat client desktops. However, due to the commoditization of standard desktop components, and due to the increasing availability and popularity of various software options for using full desktops as diskless nodes, thin clients, and hybrid clients, the Network Computer brand never achieved the popularity hoped for by Oracle and was eventually mothballed. The term "network computer" is now used for any diskless desktop computer or a thin client.
  • 878
  • 11 Oct 2022
Topic Review
Military Operations Research Society
The Military Operations Research Society (MORS) is a society for professionals active within defense applications of operations research (OR) in the United States . Membership include analysts, researchers, consultants and officers in the United States Department of Defense, organizations within the military of the United States, various think tanks, academic institutions and consultancy firms. The Military Operations Research Society arranges symposia and courses, and publishes books, a quarterly bulletin called Phalanx, and a peer reviewed journal called Military Operations Research. Participation in MORS activities generally requires a United States security clearance. MORS is headquartered in Alexandria, Virginia. The MORS has served the Department of Defense analytic community for over forty years and now also includes other aspects of national security for the United States federal government. Under the sponsorship of the Army, Navy, Air Force, Marine Corps, Office of the Secretary of Defense, the Joint Staff and the Department of Homeland Security, the objective of MORS is to enhance the quality and effectiveness of operations research as applied to national security issues. MORS vision is to "become the recognized leader in advancing the national security analytic community through the advancement and application of the interdisciplinary field of Operations Research to national security issues, being responsive to our constituents, enabling collaboration and development opportunities, and expanding our membership and disciplines, while maintaining our profession’s heritage." This vision encompasses all aspects of national security including not only the military but also Homeland Security and the other agencies of government – including the US and its allies. Members of the Society include a cross section of the defense analysts, operators and managers from government, industry and academia. Their involvement fosters professional interchange within the military operations research community, the sharing of insights and information on challenging national security issues and specific support to decision makers in the many organizations and agencies that address national defense. MORS provides an array of meetings and publications. In particular, the Society provides a unique environment in which classified presentations and discussions can take place with joint service participation and peer criticism from the full range of students, theoreticians, practitioners and users of military analysis. Throughout its activities, the Society promotes professional methodology, individual excellence and ethical conduct.
  • 878
  • 22 Nov 2022
Topic Review
Cryptographic Engineering
Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate. Below are the main topics that are specifically related to cryptographic engineering: Cryptographic implementations Attacks against implementations and countermeasures against these attacks Tools and methodologies Applications Interactions between cryptographic theory and implementation issues
  • 877
  • 08 Nov 2022
Topic Review
MediaMax CD-3
MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and computer security experts regard the software as a form of malware since its purpose is to intercept and inhibit normal computer operation without the user's authorization. MediaMax received media attention in late 2005 in fallout from the Sony XCP copy protection scandal. MediaMax is a second-generation system meant to address the problems of earlier copy-preventing schemes, where many types of playback devices had difficulty reading discs in normal use. MediaMax was first used on Anthony Hamilton's Comin' From Where I'm From in the United States ; the first US No. 1 CD to use it was Velvet Revolver's Contraband. (The European release of the Velvet Revolver album used Macrovision CDS-200 and the Japan ese is without copy protection.)
  • 876
  • 20 Oct 2022
Topic Review
ISO 17442
A Legal Entity Identifier (or LEI) is a 20-character identifier that identifies distinct legal entities that engage in financial transactions. It is defined by ISO 17442. Natural persons are not required to have an LEI; they’re eligible to have one issued, however, but only if they act in an independent business capacity. The LEI is a global standard, designed to be non-proprietary data that is freely accessible to all. As of October 2017, over 630,000 legal entities from more than 195 countries have now been issued with LEIs.
  • 875
  • 28 Nov 2022
Topic Review
Using Homomorphic Encryption for Smart Metering Systems
Smart metering systems (SMSs) have been widely used by industrial users and residential customers for purposes such as real-time tracking, outage notification, quality monitoring, load forecasting, etc. Protecting data privacy for SMSs that considers trust boundaries (TBs) and computability using real-world data sets while providing privacy guarantees. The proposed framework uses homomorphic encryption (HE) as a primitive for security. HE can provide strong protection based on cryptography and data processing on encrypted data without first decrypting it.
  • 875
  • 31 May 2023
Topic Review
Internet-Based Treatments for Trauma Survivors
Internet-based treatments for trauma survivors is a growing class of online treatments that allow for an individual who has experienced trauma to seek and receive treatment without needing to attend psychotherapy in person. The progressive movement to online resources and the need for more accessible mental health services has given rise to the creation of online-based interventions aimed to help those who have experienced traumatic events. Cognitive behavioral therapy (CBT) has shown to be particularly effective in the treatment of trauma-related disorders and adapting CBT to an online format has been shown to be as effective as in-person CBT in the treatment of trauma. Due to its positive outcomes, CBT-based internet treatment options for trauma survivors has been an expanding field in both research and clinical settings.
  • 874
  • 27 Oct 2022
Topic Review
Blockchain Technology and E-Government
The field of electronic government (e-government) is gaining prominence in contemporary society, as it has a significant influence on the wider populace within the context of a technologically advanced world. E-government makes use of information and communication technologies (ICTs) at various levels and domains within government agencies and the public sector. ICT reduces manual labour, potential fraud points, errors, and process lapses. The Internet’s quick accessibility and the widespread adoption of modern technologies and disciplines, such as big data, the Internet of Things, machine learning, and artificial intelligence, have accelerated the need for e-government.
  • 874
  • 07 Aug 2023
Topic Review
GenI Process
The GenI process (/dʒiːnaɪ/ for Generic Intelligence) models team decision making by launching a chaotic competition between so-called ideas, where one idea after another dwindles out until exactly one remains. The decision statistics are completely determined by the process start configuration and match those known from quantum measurements. The random process accomplishes this in a natural way without any fine adjustment. Therefore, it is also of interest for the interpretation of physical processes. In mathematical terms, the GenI process describes a time-discrete stochastic process [math]\displaystyle{ X: [0,1] \times \mathbb{N}_0 \rightarrow 2^E }[/math] in the state space of the finite subsets of a countable set E, together with a mapping [math]\displaystyle{ 2^E \rightarrow \mathbb{C}^n }[/math] of the power set on E into an n-dimensional complex vector space. In principle, it can be classified as a Markov chain of first order, with variable transition probabilities [math]\displaystyle{ P(X_{n+1} \mid X_n) }[/math]. There are two expressions of the GenI process, for [math]\displaystyle{ n \geq 2 }[/math] and for [math]\displaystyle{ n=2 }[/math].
  • 871
  • 29 Sep 2022
Topic Review
Anonymous Web Browsing
Anonymous web browsing refers to the utilization of the World Wide Web that hides a user's personally identifiable information from websites visited. The current popular application for anonymous browsing is the Tor Browser.
  • 856
  • 28 Sep 2022
Topic Review
GLIMMER
In bioinformatics, GLIMMER (Gene Locator and Interpolated Markov ModelER) is used to find genes in prokaryotic DNA. "It is effective at finding genes in bacteria, archea, viruses, typically finding 98-99% of all relatively long protein coding genes". GLIMMER was the first system that used the interpolated Markov model to identify coding regions. The GLIMMER software is open source and is maintained by Steven Salzberg, Art Delcher, and their colleagues at the Center for Computational Biology at Johns Hopkins University. The original GLIMMER algorithms and software were designed by Art Delcher, Simon Kasif and Steven Salzberg and applied to bacterial genome annotation in collaboration with Owen White.
  • 854
  • 11 Nov 2022
  • Page
  • of
  • 48
Academic Video Service

Quick Survey

Encyclopedia MDPI is conducting a targeted survey to identify the specific barriers hindering efficient research. We invite you to spend 3 minutes defining the priorities for our next generation of structured knowledge tools.
Take Survey