You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Unbalanced Oil and Vinegar
In cryptography, the Unbalanced Oil and Vinegar (UOV) scheme is a modified version of the Oil and Vinegar scheme designed by J. Patarin. Both are digital signature schemes. They belong to the group of multivariate cryptography. The security of this signature scheme is based on an NP-hard mathematical problem. To create and validate signatures a minimal quadratic equations system must be solved. Solving m equations with n variables is an NP-hard problem, which means the problem is almost certainly difficult to solve efficiently in the worst case, even when using a quantum computer. While the problem is easy if m is either much much larger or much much smaller than n, importantly for cryptographic purposes, the problem is thought to be difficult in the average case when m and n are nearly equal, even when using a quantum computer. As a result, a number of signature schemes have been devised based on multivariate equations with the goal of achieving quantum resistant signatures.
  • 808
  • 17 Nov 2022
Topic Review
Fuzzy Control
Fuzzy logic is derived from fuzzy set theory dealing with reasoning that is approximate rather than precisely deduced from classical predicate logic. It can be thought of as the application side of fuzzy set theory dealing with well thought out real world expert values for a complex problem (Klir 1997). Degrees of truth are often confused with probabilities. However, they are conceptually distinct; fuzzy truth represents membership in vaguely defined sets, not likelihood of some event or condition. To illustrate the difference, consider this scenario: Bob is in a house with two adjacent rooms: the kitchen and the dining room. In many cases, Bob's status within the set of things "in the kitchen" is completely plain: he's either "in the kitchen" or "not in the kitchen". What about when Bob stands in the doorway? He may be considered "partially in the kitchen". Quantifying this partial state yields a fuzzy set membership. With only his big toe in the dining room, we might say Bob is 99% "in the kitchen" and 1% "in the dining room", for instance. No event (like a coin toss) will resolve Bob to being completely "in the kitchen" or "not in the kitchen", as long as he's standing in that doorway. Fuzzy sets are based on vague definitions of sets, not randomness. Fuzzy logic allows for set membership values to range (inclusively) between 0 and 1, and in its linguistic form, imprecise concepts like "slightly", "quite" and "very". Specifically, it allows partial membership in a set. It is related to fuzzy sets and possibility theory. It was introduced in 1965 by Lotfi Zadeh at the University of California, Berkeley. Fuzzy logic is controversial in some circles, despite wide acceptance and a broad track record of successful applications. It is rejected by some control engineers for validation and other reasons, and by some statisticians who hold that probability is the only rigorous mathematical description of uncertainty. Critics also argue that it cannot be a superset of ordinary set theory since membership functions are defined in terms of conventional sets.
  • 807
  • 02 Nov 2022
Topic Review
Nepal Risk Reduction Consortium
The Nepal Risk Reduction Consortium (NRRC) was launched by the Government of Nepal (GoN) and a group of international organizations working to promote the UN International Strategy for Disaster Reduction (ISDR) in 2009. It exists to bridge the spectrum of development and humanitarian partners in order to support the Government of Nepal in taking action to implement long-term Disaster risk reduction (DRR). The founding members of the NRRC were the Asian Development Bank (ADB), the International Federation of the Red Cross and Red Crescent Societies (IFRC), the United Nations Development Programme (UNDP), the UN Office for the Coordination of Humanitarian Affairs (OCHA), the UN International Strategy for Disaster Reduction (ISDR) and the World Bank. Since 2009, new NRRC members have included AusAid, the Department for International Development (DFID), the Humanitarian Aid Department of the European Commission (ECHO), the embassy of Japan, the US Embassy and the World Health Organization (WHO). The NRRC has developed a Disaster Risk Reduction Action Plan that builds on the GoN National Strategy for Disaster Risk Management (NSDRM). Based on consultations with key stakeholders to identify disaster risk reduction priorities that are urgent and viable, five flagship areas were identified and proposed. Consortium members act as coordinators of these flagship areas together with the relevant Government Ministry. Location: P.O. Box 107 Kathmandu, Nepal
  • 805
  • 01 Nov 2022
Topic Review
Osiris
Osiris Serverless Portal System (usually abbreviated as Osiris sps or Osiris) is a freeware program used to create web portals distributed via peer-to-peer networking (P2P) and autonomous from centralized servers. It is available for Microsoft Windows and Linux operating systems. Unlike common tools used to publish information on the Internet, such as content management systems, Internet forums or blogs based on a centralized system, the data of an Osiris portal are shared (via P2P) between all its participants. Because all the contents necessary for navigation are replicated on every computer, the portal can be used without a central server. Thus, the portal is always accessible because it is immune to denial of service attacks, Internet service provider limitations (such as traffic shaping and censorship) and hardware failure. In this way, a web portal can be operated at very low costs and free from external control.
  • 805
  • 14 Oct 2022
Topic Review
Student Accessibility Services in Higher Education Institutions
The Convention on the Rights of Persons with Disabilities (CRPD) highlights the right of people with disabilities to access education without discrimination and equal opportunities. In general terms, accessibility in education means that a person with disabilities must be able to "acquire the same information, engage in the same interactions, and enjoy the same services, in an equally effective and equally integrated manner, with substantially equivalent ease of use, as a person without disabilities". In higher education institutions (HEIs), this implies, as broadly as possible, environments (including virtual), processes, access to information, objects, tools, devices, communication, goods, and services, by considering universal design principles and reasonable adjustments.
  • 803
  • 07 Apr 2022
Topic Review
Cybersecurity in Smart Cities
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT, are combined to exchange real-time information, making the everyday lives of their residents more convenient.  Cybersecurity for smart cities includes a combination of technologies that have emerged to address the highly complex challenges of insecure devices and networks, which can lead to unbounded attacks. 
  • 799
  • 17 Apr 2023
Topic Review
Linear Difference Equation
In mathematics and in particular dynamical systems, a linear difference equation:ch. 17:ch. 10 or linear recurrence relation sets equal to 0 a polynomial that is linear in the various iterates of a variable—that is, in the values of the elements of a sequence. The polynomial's linearity means that each of its terms has degree 0 or 1. Usually the context is the evolution of some variable over time, with the current time period or discrete moment in time denoted as t, one period earlier denoted as t − 1, one period later as t + 1, etc. An nth order linear difference equation is one that can be written in terms of parameters a1, …, an and b as or equivalently as The equation is called homogeneous if b = 0 and nonhomogeneous if b ≠ 0. Since the longest time lag between iterates appearing in the equation is n, this is an nth order equation, where n could be any positive integer. When the longest lag is specified numerically so n does not appear notationally as the longest time lag, n is occasionally used instead of t to index iterates. In the most general case the coefficients ai and b could themselves be functions of t; however, this article treats the most common case, that of constant coefficients. If the coefficients ai are polynomials in t the equation is called a linear recurrence equation with polynomial coefficients. The solution of such an equation is a function of t, and not of any iterate values, giving the value of the iterate at any time. To find the solution it is necessary to know the specific values (known as initial conditions) of n of the iterates, and normally these are the n iterates that are oldest. The equation or its variable is said to be stable if from any set of initial conditions the variable's limit as time goes to infinity exists; this limit is called the steady state. Difference equations are used in a variety of contexts, such as in economics to model the evolution through time of variables such as gross domestic product, the inflation rate, the exchange rate, etc. They are used in modeling such time series because values of these variables are only measured at discrete intervals. In econometric applications, linear difference equations are modeled with stochastic terms in the form of autoregressive (AR) models and in models such as vector autoregression (VAR) and autoregressive moving average (ARMA) models that combine AR with other features.
  • 797
  • 25 Nov 2022
Topic Review
DNIX
DNIX (original spelling: D-Nix) is a discontinued Unix-like real-time operating system from the Swedish company Dataindustrier AB (DIAB). A version named ABCenix was developed for the ABC 1600 computer from Luxor. Daisy Systems also had a system named Daisy DNIX on some of their computer-aided design (CAD) workstations. It was unrelated to DIAB's product.
  • 792
  • 01 Nov 2022
Topic Review
Set (Command)
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 791
  • 10 Nov 2022
Topic Review
Power Set
In mathematics, the power set (or powerset) of any set S is the set of all subsets of S, including the empty set and S itself, variously denoted as P(S), 𝒫(S), ℘(S) (using the "Weierstrass p"), P(S), ℙ(S), or, identifying the powerset of S with the set of all functions from S to a given set of two elements, 2S. In axiomatic set theory (as developed, for example, in the ZFC axioms), the existence of the power set of any set is postulated by the axiom of power set. Any subset of P(S) is called a family of sets over S.
  • 787
  • 04 Nov 2022
Topic Review
MimoLive
mimoLive is a live video production software developed and published by Boinx Software International GmbH, a German software company that specializes in applications for macOS and iOS. First launched in 2016, mimolive is the successor of BoinxTV first launched in 2008. It is geared towards professional video live switching and broadcasting software.
  • 786
  • 16 Nov 2022
Topic Review
Flexible Unit Systems Update System
Research on flexible unit systems (FUS) with the context of descriptive, predictive, and prescriptive analysis have remarkably progressed in recent times, and is now reinforced in the current Industry 4.0 era with the increased focus on the integration of distributed and digitalized systems.
  • 782
  • 21 Mar 2021
Topic Review
DNS Zone Transfer
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers. A zone transfer uses the Transmission Control Protocol (TCP) for transport, and takes the form of a client–server transaction. The client requesting a zone transfer may be a secondary server requesting data from a primary server, historically referred to as master and slave. The portion of the database that is replicated is a zone.
  • 781
  • 18 Oct 2022
Topic Review
CLARIN
CLARIN is a European research network working in the field of archiving and processing of language-related resources in the humanities and social sciences. CLARIN is an acronym for Common Language Resources and Technology Infrastructure. CLARIN is a community of scholars of various disciplines and a network of institutions. The scholars use CLARIN as a forum for joined developments and exchange of resources. They also exchange information on standards and procedures for long time archiving of research data. The institutions of CLARIN offer services in the same field. On the European level, CLARIN is an independent body operating under European law as a European Research Infrastructure Community (ERIC). CLARIN ERIC represents the CLARIN community in the public and coordinates individual efforts in the field. CLARIN is listed in the Registry of Research Data Repositories re3data.org. For published literature on CLARIN, see (and please cite!) the following publications:
  • 771
  • 18 Oct 2022
Topic Review
Efficient Fingerprinting Attack on Web Applications
Website fingerprinting is valuable for many security solutions as it provides insights into applications that are active on the network.
  • 765
  • 25 Jul 2023
Topic Review
XEDIT
XEDIT is a visual editor for VM/CMS using block mode IBM 3270 terminals. (Line-mode terminals are also supported.) XEDIT is much more line-oriented than modern PC and Unix editors. For example, XEDIT supports automatic line numbers, and many of the commands operate on blocks of lines. A pair of features allows selective line and column editing. The ALL command, for example, hides all lines not matching the described pattern, and the COL (Column) command allows hiding those columns not specified. Hence changing, for example, the word NO as it appears only in columns 24 thru 28, to YES, and only on lines with the word FLEXIBLE, is doable. Another feature is a command line which allows the user to type arbitrary editor commands. Because IBM 3270 terminals do not transmit data to the computer until certain special keys are pressed [such as , a program function key (PFK), or a program access key (PAK), XEDIT is less interactive than many PC and Unix editors. For example, continuous spell-checking as the user types is problematic.
  • 764
  • 28 Sep 2022
Topic Review
Gremlin (Programming Language)
Gremlin is a graph traversal language and virtual machine developed by Apache TinkerPop of the Apache Software Foundation. Gremlin works for both OLTP-based graph databases as well as OLAP-based graph processors. Gremlin's automata and functional language foundation enable Gremlin to naturally support imperative and declarative querying, host language agnosticism, user-defined domain specific languages, an extensible compiler/optimizer, single- and multi-machine execution models, hybrid depth- and breadth-first evaluation, as well as Turing Completeness. As an explanatory analogy, Apache TinkerPop and Gremlin are to graph databases what the JDBC and SQL are to relational databases. Likewise, the Gremlin traversal machine is to graph computing as what the Java virtual machine is to general purpose computing.
  • 757
  • 10 Oct 2022
Topic Review
Modern Greek on Social Web
Mining social web text has been at the heart of the Natural Language Processing and Data Mining research community in the last 15 years. Though most of the reported work is on widely spoken languages, such as English, the significance of approaches that deal with less commonly spoken languages, such as Greek, is evident for reasons of preserving and documenting minority languages, cultural and ethnic diversity, and identifying intercultural similarities and differences. 
  • 754
  • 01 Jun 2021
Topic Review
Distributed Ledger Technology Law
Distributed ledger technology law ("DLT law") (also called Blockchain law,, Lex Cryptographia or Algorithmic legal order ) is not yet defined and recognized but an emerging field of law due to the recent dissemination of distributed ledger technology application in business and governance environment.
  • 754
  • 14 Oct 2022
Topic Review
List of Xbox Games on Windows Phone
This is a list of released Xbox Live enabled games for Windows Phone.
  • 752
  • 02 Nov 2022
  • Page
  • of
  • 48
Academic Video Service