Topic Review
Pointman (User Interface)
Pointman is a seated user interface for controlling one's avatar in a 3D virtual environment. It combines head tracking, a gamepad, and sliding foot pedals to provide positional control over many aspects of the avatar's posture. Pointman was developed by the US Naval Research Laboratory (NRL) to support the use of dismounted infantry simulation for USMC training and mission rehearsal. NRL's goal in developing Pointman was to extend the range and precision of actions supported by virtual simulators, to better represent what infantrymen can do.
  • 281
  • 01 Dec 2022
Topic Review
DioneOS
DioneOS (pronounced /djoneos/) is a multitasking preemptive, real-time operating system (RTOS). The system is designed for microcontrollers, originally released on 2 February 2011 for the Texas Instruments TI MSP430x, and then on 29 March 2013 for the ARM Cortex-M3. Target microcontroller platforms have limited resources, i.e., system clock frequency of tens of MHz, and memory amounts of tens to a few hundred kilobytes (KB). The RTOS is adapted to such conditions by providing a compact and efficient image. The efficiency term here means minimizing further central processing unit (CPU) load caused by system use. According to this definition, the system is more effective when it consumes less CPU time to execute its internal parts, e.g., managing threads. The DioneOS system is intended for autonomic devices where user interface has limited functions. The core functions provided by the system is an environment for building multitasking firmware by means of standard, well known concepts (e.g. semaphores, timers, etc.). Because of the target domain of application, the system uses a command-line interface and has no graphical user interface.
  • 280
  • 03 Nov 2022
Topic Review
MRCI (Interface)
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 280
  • 15 Nov 2022
Topic Review
EFx Factory
The EFx Factory (Architectural-Guidance Software Factory) is a pioneering Architectural Guidance Software Factory from Microsoft, and one of the first implementations of a software factory to be built. The ‘EFx Factory’ implements the .NET Distributed Architecture for Service-Oriented applications and services. The factory is based upon an Architectural Application Framework called Enterprise Framework that describes a physical Microsoft .NET architecture leveraging Microsoft Enterprise Library and other service-oriented patterns from Microsoft patterns & practices. The EFX Factory was designed and built by development consultants within Microsoft Consulting Services in response to customer demand for an implementation of the .NET Architecture, best practices for .NET development, and guidance on best use of Enterprise Library and a number of other application blocks freely available from Microsoft.
  • 280
  • 30 Nov 2022
Topic Review
Base-16 Floating Point
IBM System/360 computers, and subsequent machines based on that architecture (mainframes), support a hexadecimal floating-point format (HFP). In comparison to IEEE 754 floating-point, the IBM floating-point format has a longer significand, and a shorter exponent. All IBM floating-point formats have 7 bits of exponent with a bias of 64. The normalized range of representable numbers is from 16−65 to 1663 (approx. 5.39761 × 10−79 to 7.237005 × 1075). The number is represented as the following formula: (−1)sign × 0.significand × 16exponent−64.
  • 277
  • 08 Oct 2022
Topic Review
Behavioral Risk Management
Behavioral Risk Management, which extends from the broader field of Risk Management, is the process of managing workplace risk factors pertinent to Organizational Behavior and industrial and organizational psychology. "Behavioral risk management applies to risks connected with the workplace behaviors of employees and organizations that have a negative impact on the productivity of an organization; behavioral healthcare episodes and the cost of treating these episodes; and lifestyle behaviors that lead to preventable healthcare conditions and the cost of treating these conditions." Its focus lies on how behavior affects workplaces and organizations along with how to appropriately mitigate negative effects from inappropriate behavior.
  • 277
  • 20 Oct 2022
Topic Review
Maintenance Philosophy
Maintenance Philosophy is the mix of strategies that ensure an item works as expected when needed.
  • 274
  • 04 Nov 2022
Topic Review
Comparison of Streaming Media Systems
This is a comparison of streaming media systems. A more complete list of streaming media systems is also available.
  • 269
  • 18 Oct 2022
Topic Review
Industry 4.0 in Malaysian SMEs
The implementation of Industry 4.0 is relatively low in Malaysian manufacturing small- and medium-sized enterprises (SMEs). SMEs are facing various challenges, including the need for education and training, budget constraints, and a lack of experience and knowledge among workers.
  • 264
  • 29 Dec 2023
Topic Review
First Order Arithmetic
In set theory and mathematical logic, first-order arithmetic is a collection of axiomatic systems formalising natural and subsets of the natural numbers. It is a choice for axiomatic theory as a basis for many mathematics, but not all. The primary first-order axiom is Peano arithmetic, created by Giuseppe Peano: Peano arithmetic has a proof-theoretic ordinal of [math]\displaystyle{ \varepsilon_0 = \varphi(1, 0) = \psi_0(\Omega) }[/math].
  • 260
  • 04 Nov 2022
Topic Review
Visiting Heritage Sites in AR and VR
Advances in digitization technologies have made possible the digitization of entire archaeological sites through a combination of technologies, including aerial photogrammetry, terrestrial photogrammetry, and terrestrial laser scanning. At the same time, the evolution of computer algorithms for data processing and the increased processing power made possible the combination of data from multiple scans to create a synthetic representation of large-scale sites.  This route was opened by the gaming industry. In terms of research, the exploitation of these new assets in conjunction with new visual rendering technologies, such as virtual and augmented reality, can create new dimensions for education and leisure.
  • 254
  • 25 Jan 2024
Topic Review
Circle-ellipse Problem
The circle-ellipse problem in software development (sometimes termed the square-rectangle problem) illustrates several pitfalls which can arise when using subtype polymorphism in object modelling. The issues are most commonly encountered when using object-oriented programming (OOP). By definition, this problem is a violation of the Liskov substitution principle, one of the SOLID principles. The problem concerns which subtyping or inheritance relationship should exist between classes which represent circles and ellipses (or, similarly, squares and rectangles). More generally, the problem illustrates the difficulties which can occur when a base class contains methods which mutate an object in a manner which may invalidate a (stronger) invariant found in a derived class, causing the Liskov substitution principle to be violated. The existence of the circle-ellipse problem is sometimes used to criticize object-oriented programming. It may also imply that hierarchical taxonomies are difficult to make universal, implying that situational classification systems may be more practical.
  • 253
  • 18 Oct 2022
Topic Review
DoubleGuard
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 253
  • 16 Nov 2022
Topic Review
MRCI (Microsoft)
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 250
  • 25 Oct 2022
Topic Review
Security and Trust Management in the IoV
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a mobile and wireless network. Numerous vehicles, users, things, and networks allow nodes to communicate information with their surroundings via various communication channels. IoV aims to enhance the comfort of driving, improve energy management, secure data transmission, and prevent road accidents.
  • 234
  • 18 Jan 2024
Topic Review
Distributed Denial of Service Attacks
Mobile Edge Computing (MEC) has revolutionized the landscape of the telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range of security challenges, the most prominent of which is Distributed Denial of Service (DDoS) attacks, which threaten the availability and performance of MEC’s services. In most cases, Intrusion Detection Systems (IDSs), a security tool that monitors networks and systems for suspicious activity and notify administrators in real time of potential cyber threats, have relied on shallow Machine Learning (ML) models that are limited in their abilities to identify and mitigate DDoS attacks.
  • 210
  • 07 Feb 2024
Topic Review
Attack Investigation
Attack investigation is an important research field in forensics analysis. Many existing supervised attack investigation methods rely on well-labeled data for effective training. While the unsupervised approach based on BERT can mitigate the issues, the high degree of similarity between certain real-world attacks and normal behaviors makes it challenging to accurately identify disguised attacks.
  • 178
  • 08 Jan 2024
Topic Review
Benefits of CCTV Installation for Dubai’s Luxury Apartments
From advanced technology to cost-effective solutions, a professional security system ensures residents enjoy peace of mind in a secure, modern environment. Embracing smart living with CCTV installation in Dubai is a step toward redefining luxury and safety in the UAE.
  • 7
  • 19 Nov 2024
  • Page
  • of
  • 47
ScholarVision Creations