You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
GLIMMER
In bioinformatics, GLIMMER (Gene Locator and Interpolated Markov ModelER) is used to find genes in prokaryotic DNA. "It is effective at finding genes in bacteria, archea, viruses, typically finding 98-99% of all relatively long protein coding genes". GLIMMER was the first system that used the interpolated Markov model to identify coding regions. The GLIMMER software is open source and is maintained by Steven Salzberg, Art Delcher, and their colleagues at the Center for Computational Biology at Johns Hopkins University. The original GLIMMER algorithms and software were designed by Art Delcher, Simon Kasif and Steven Salzberg and applied to bacterial genome annotation in collaboration with Owen White.
  • 844
  • 11 Nov 2022
Topic Review
Differentiable Vector-Valued Functions from Euclidean Space
In the mathematical discipline of functional analysis, a differentiable vector-valued function from Euclidean space is a differentiable function valued in a topological vector space (TVS) whose domains is a subset of some finite-dimensional Euclidean space. It is possible to generalize the notion of derivative to functions whose domain and codomain are subsets of arbitrary topological vector spaces (TVSs) in multiple ways. But when the domain of a TVS-valued function is a subset of a finite-dimensional Euclidean space then many of these notions become logically equivalent resulting in a much more limited number of generalizations of the derivative and additionally, differentiability is also more well-behaved compared to the general case. This article presents the theory of [math]\displaystyle{ k }[/math]-times continuously differentiable functions on an open subset [math]\displaystyle{ \Omega }[/math] of Euclidean space [math]\displaystyle{ \R^n }[/math] ([math]\displaystyle{ 1 \leq n \lt \infty }[/math]), which is an important special case of differentiation between arbitrary TVSs. This importance stems partially from the fact that every finite-dimensional vector subspace of a Hausdorff topological vector space is TVS isomorphic to Euclidean space [math]\displaystyle{ \R^n }[/math] so that, for example, this special case can be applied to any function whose domain is an arbitrary Hausdorff TVS by restricting it to finite-dimensional vector subspaces. All vector spaces will be assumed to be over the field [math]\displaystyle{ \mathbb{F}, }[/math] where [math]\displaystyle{ \mathbb{F} }[/math] is either the real numbers [math]\displaystyle{ \R }[/math] or the complex numbers [math]\displaystyle{ \Complex. }[/math]
  • 837
  • 07 Nov 2022
Topic Review
GIS Live DVD
GIS Live DVD is a type of the thematic Live CD containing GIS/RS applications and related tutorials, and sample data sets. The general sense of a GIS Live DVD is to demonstrate the power of FLOSS GIS and encourage users to start on FLOSS GIS. However, a disc can be used for GIS data processing and training, too. A disc usually includes some selected Linux-based or Wine-enabled Windows applications for GIS and Remote Sensing use. Using this disc the end users can execute GIS functions to get experience in free and open source software solutions or solve some simple business operations. The set-up and the operating behaviour of the applications can also be studied prior to building real FLOSS GIS-based systems. Recently a LiveDVD image is stored and booted from USB (Live USB).
  • 836
  • 01 Dec 2022
Topic Review
LPWAN Key Exchange
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users. Secure, low-powered, and long-range transmissions are some of the most vital requirements in developing IoT applications. IoT uses several communication technologies to fulfill transmission requirements. However, Low Powered Wide Area Networks (LPWAN) transmission standards have been gaining attention because of their exceptional low-powered and long-distance transmission capabilities. The features of LPWAN transmission standards make them a perfect candidate for IoT applications. However, the current LPWAN standards lack state-of-the-art security mechanisms because of the limitations of the IoT devices in energy and computational capacity. Most of the LPWAN standards, such as Sigfox, NB-IoT, and Weightless, use static keys for node authentication and encryption. LoRaWAN is the only LPWAN technology providing session key mechanisms for better security. However, the session key mechanism is vulnerable to replay attacks.
  • 831
  • 22 Jul 2022
Topic Review
MiniD
The MiniD (has been renamed Croc) programming language is a small, lightweight, extension language in the vein of Lua or Squirrel, but designed to be used mainly with the D programming language. It supports both object-oriented and imperative programming paradigms, as well as some simple functional aspects. Distributed under the licence of zlib/libpng, MiniD is free software.
  • 831
  • 29 Nov 2022
Topic Review
Anonymous Web Browsing
Anonymous web browsing refers to the utilization of the World Wide Web that hides a user's personally identifiable information from websites visited. The current popular application for anonymous browsing is the Tor Browser.
  • 830
  • 28 Sep 2022
Topic Review
Ten Rays Model
The ten-ray model is a model applied to the transmissions in the urban area, to generate a model of ten rays typically four rays more are added to the six rays model, these are ([math]\displaystyle{ R3 }[/math] and [math]\displaystyle{ R4 }[/math] bouncing on both sides of the wall); This incorporate paths from one to three reflections: specifically, there is the LOS (Line of sight), GR (ground reflected), SW (single-wall reflected), DW (double-wall reflected), TW (triple-wall reflected), WG (wall-ground reflected) and GW (ground-wall reflected paths). Where each one of the paths bounces on both sides of the wall. Experimentally, it has been demonstrated that the ten ray model simulates or can represent the propagation of signals through a dielectric canyon, in it which the rays that travel from a transmitter point to a receiver point bounce many times. As example for this model it is assume: a rectilinear free space with two walls, one upper and the other lower, from which two vertical bases are positioned at their ends, these are the transmitting and receiving antennas that it’s locate in such a way that their heights don’t surpass the limits of the top wall; Achieved this the structure acts as free space for its functioning similar to that of a dielectric canyon of signals propagation, since the rays transmitted from the transmitting antenna will collide each side of the upper and lower walls infinity of times (for this example up to 3 reflections) until reaching the receiving antenna. During the course of the rays for each reflection they suffer, part of the energy of the signal is dissipated in each reflection, normally after the third reflection of said ray its resulting component which is a retro-reflected ray is insignificant with a negligible energy.
  • 830
  • 01 Dec 2022
Topic Review
National Electronic Library for Health
The National electronic Library for Health (NeLH) was a digital library service provided by the NHS for healthcare professionals and the public between 1998 and 2006. It briefly became the National Library for Health and elements of it continue to this day as NHS Evidence, managed by the National Institute for Health and Care Excellence, and a range of services provided by Health Education England's Library and Knowledge Service Leads.
  • 829
  • 10 Oct 2022
Topic Review
X Display Manager (Program Type)
In the X Window System, an X display manager is a graphical login manager which starts a session on an X server from the same or another computer. A display manager presents the user with a login screen. A session starts when a user successfully enters a valid combination of username and password. When the display manager runs on the user's computer, it starts the X server before presenting the user the login screen, optionally repeating when the user logs out. In this condition, the DM realizes in the X Window System the functionality of getty and login on character-mode terminals. When the display manager runs on a remote computer, it acts like a telnet server, requesting username and password and starting a remote session. X11 Release 3 introduced display managers in October 1988 with the aim of supporting the standalone X terminals, just coming onto the market. Various display managers continue in routine use to provide a graphical login prompt on standalone computer workstations running X. X11R4 introduced the X Display Manager Control Protocol (XDMCP) in December 1989 to fix problems in the X11R3 implementation.
  • 828
  • 29 Sep 2022
Topic Review
Livescribe
The Livescribe paper-based computing platform consists of a digital pen, digital paper, software applications, and developer tools. Central to the Livescribe platform is the smartpen, a ballpoint pen with an embedded computer and digital audio recorder. When used with Anoto digital paper, it records what it writes for later uploading to a computer, and synchronizes those notes with any audio it has recorded. This allows users to replay portions of a recording by tapping on the notes they were taking at the time the recording was made. It is also possible to select which portion of a recording to replay by clicking on the relevant portion of a page on-screen, once it has been synced to the Livescribe Desktop software. Jim Marggraff, inventor of the LeapFrog FLY Pentop computer and creator of the LeapPad Learning System, left Leapfrog in 2005 to form Livescribe. In November 2015, Livescribe announced its acquisition by Anoto for $15m.
  • 822
  • 17 Oct 2022
Topic Review
Hypercycle
In chemistry, a hypercycle is an abstract model of organization of self-replicating molecules connected in a cyclic, autocatalytic manner. It was introduced in an ordinary differential equation (ODE) form by the Nobel Prize winner Manfred Eigen in 1971 and subsequently further extended in collaboration with Peter Schuster. It was proposed as a solution to the error threshold problem encountered during modelling of replicative molecules that hypothetically existed on the primordial Earth (see: abiogenesis). As such, it explained how life on Earth could have begun using only relatively short genetic sequences, which in theory were too short to store all essential information. The hypercycle is a special case of the replicator equation. The most important properties of hypercycles are autocatalytic growth competition between cycles, once-for-ever selective behaviour, utilization of small selective advantage, rapid evolvability, increased information capacity, and selection against parasitic branches.
  • 822
  • 19 Oct 2022
Topic Review
BMDFM
Binary Modular Dataflow Machine (BMDFM) is software that enables running an application in parallel on shared memory symmetric multiprocessing (SMP) computers using the multiple processors to speed up the execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static and mainly dynamic scheduling of the dataflow instruction sequences derived from the formerly sequential program. BMDFM dynamic scheduling subsystem performs a symmetric multiprocessing (SMP) emulation of a tagged-token dataflow machine to provide the transparent dataflow semantics for the applications. No directives for parallel execution are needed.
  • 821
  • 02 Dec 2022
Topic Review
Incompatible Timesharing System
Incompatible Timesharing System (ITS) is a time-sharing operating system developed principally by the MIT Artificial Intelligence Laboratory, with help from Project MAC. The name is the jocular complement of the MIT Compatible Time-Sharing System (CTSS). ITS, and the software developed on it, were technically and culturally influential far beyond their core user community. Remote "guest" or "tourist" access was easily available via the early ARPAnet, allowing many interested parties to informally try out features of the operating system and application programs. The wide-open ITS philosophy and collaborative online community were a major influence on the hacker culture, as described in Steven Levy's book Hackers, and were the direct forerunners of the free and open-source software, open-design, and Wiki movements.
  • 820
  • 04 Nov 2022
Topic Review
Ex-tangential Quadrilateral
In Euclidean geometry, an ex-tangential quadrilateral is a convex quadrilateral where the extensions of all four sides are tangent to a circle outside the quadrilateral. It has also been called an exscriptible quadrilateral. The circle is called its excircle, its radius the exradius and its center the excenter (E in the figure). The excenter lies at the intersection of six angle bisectors. These are the internal angle bisectors at two opposite vertex angles, the external angle bisectors (supplementary angle bisectors) at the other two vertex angles, and the external angle bisectors at the angles formed where the extensions of opposite sides intersect (see the figure to the right, where four of these six are dotted line segments). The ex-tangential quadrilateral is closely related to the tangential quadrilateral (where the four sides are tangent to a circle). Another name for an excircle is an escribed circle, but that name has also been used for a circle tangent to one side of a convex quadrilateral and the extensions of the adjacent two sides. In that context all convex quadrilaterals have four escribed circles, but they can at most have one excircle.
  • 817
  • 08 Oct 2022
Topic Review
Albert Odyssey (Super Famicom Game)
Albert Odyssey (アルバートオデッセイ, Arubaato Odessei) is a tactical role-playing video game developed and published by Sunsoft and released for the Super Nintendo Entertainment System in Japan in March 1993. The game features strategy-based combat in addition to traditional role-playing game elements in two-dimensional environments. It is the first game in the Albert Odyssey series, and was followed by two sequels, Albert Odyssey 2: Jashin no Taidou in 1994, and Albert Odyssey in 1996. On June 12, 1996, Albert Odyssey was made available as a full game download on the Satellaview add-on as BS Albert Odyssey (BSアルバートオデッセイ, BS Arubaato Odessei), and the original Albert Odyssey was re-released for Satellaview in March 1998. Players assume the role of Albert, the young heroic swordsman who lives in a fantasy world filled with monsters and mythical creatures. While much of the world remains in relative peace following a great war many years before, a military faction led by the dark magician Globus has emerged to conquer the newly pacified nations and expand their empire. With the help of Albert's friends as well as hired mercenaries, the player must travel the world and eventually confront Golbus and his forces to prevent another large-scale conflict.
  • 816
  • 10 Oct 2022
Topic Review
Applications of Artificial Intelligence to Legal Informatics
Artificial intelligence and law (AI and law) is a subfield of artificial intelligence (AI) mainly concerned with applications of AI to legal informatics problems and original research on those problems. It is also concerned to contribute in the other direction: to export tools and techniques developed in the context of legal problems to AI in general. For example, theories of legal decision making, especially models of argumentation, have contributed to knowledge representation and reasoning; models of social organization based on norms have contributed to multi-agent systems; reasoning with legal cases has contributed to case-based reasoning; and the need to store and retrieve large amounts of textual data has resulted in contributions to conceptual information retrieval and intelligent databases.
  • 816
  • 31 Oct 2022
Topic Review
Computer (Job Description)
The term "computer", in use from the early 17th century (the first known written reference dates from 1613), meant "one who computes": a person performing mathematical calculations, before electronic computers became commercially available. Alan Turing described the "human computer" as someone who is "supposed to be following fixed rules; he has no authority to deviate from them in any detail." Teams of people, often women from the late nineteenth century onwards, were used to undertake long and often tedious calculations; the work was divided so that this could be done in parallel. The same calculations were frequently performed independently by separate teams to check the correctness of the results. Since the end of the 20th century, the term "human computer" has also been applied to individuals with prodigious powers of mental arithmetic, also known as mental calculators.
  • 816
  • 01 Nov 2022
Topic Review
Health Service Executive Cyberattack
On 14 May 2021, the Health Service Executive (HSE) of the Republic of Ireland suffered a major ransomware cyberattack that caused all of its IT systems nationwide to be shut down. It was the most significant cybercrime attack on an Irish state agency. Bloomberg News reported that the attackers used the Conti ransomware. The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia. The same group is believed to have attacked the Department of Health with a similar cyberattack. On 19 May, the Financial Times reviewed private data for twelve individuals which had appeared online as a result of the breach, with admission records and test results present in one case.
  • 814
  • 27 Oct 2022
Topic Review
Distributed Agile Software Development
Distributed Agile Software Development is a research area that considers the effects of applying the principles of Agile software development to software development in a globally distributed development setting. The goal of applying these principles is overcoming challenges in projects which are geographically distributed. The principles of Agile software development provide structures to promote better communication, which is an important factor in successfully working in a distributed setting. However, not having face-to-face interaction takes away one of the core principles of Agile. This makes Distributed Agile Software Development more challenging than Agile Software Development in general.
  • 812
  • 11 Nov 2022
Topic Review
Cloud Digital Forensics
Cloud computing technology is rapidly becoming ubiquitous and indispensable. Despite the multiple advantages the cloud offers, organizations remain cautious about migrating their data and applications to the cloud due to fears of data breaches and security compromises.
  • 811
  • 18 Jan 2024
  • Page
  • of
  • 48
Academic Video Service