You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Somerset Space Walk
The Somerset Space Walk is a sculpture trail model of the Solar System, located in Somerset, England. The model uses the towpath of the 22-kilometre (14-mile) Bridgwater and Taunton Canal to display a model of the Sun and its planets in their proportionally correct sizes and distances apart. Unusually for a Solar System model, there are two sets of planets, so that the diameter of the orbits is represented. Aware of the inadequacies of printed pictures of the Solar System, the inventor Pip Youngman designed the Space Walk as a way of challenging people's perceptions of space and experiencing the vastness of the Solar System. The model is built to a scale of 1:530,000,000, meaning that one millimetre on the model equates to 530 kilometres. The Sun is sited at Higher Maunsel Lock, and one set of planets is installed in each direction along the canal towards Taunton and Bridgwater; the distance between the Sun and each model of Pluto being 11 kilometres (6.8 mi). For less hardy walkers, the inner planets are within 67 metres (220 ft) of the Sun, and near to the Maunsel Canal Centre (and tea shop) at Lower Maunsel Lock, where a more detailed leaflet about the model is available. The Space Walk was opened on 9 August 1997 by British astronomer Heather Couper. In 2007, a project team from Somerset County Council refurbished some of the models.
  • 545
  • 14 Oct 2022
Topic Review
Plural Quantification
In mathematics and logic, plural quantification is the theory that an individual variable x may take on plural, as well as singular, values. As well as substituting individual objects such as Alice, the number 1, the tallest building in London etc. for x, we may substitute both Alice and Bob, or all the numbers between 0 and 10, or all the buildings in London over 20 stories. The point of the theory is to give first-order logic the power of set theory, but without any "existential commitment" to such objects as sets. The classic expositions are Boolos 1984 and Lewis 1991.
  • 542
  • 08 Oct 2022
Topic Review
Feature Extracted Deep Neural Collaborative Filtering
The electronic publication market is growing along with the electronic commerce market. Electronic publishing companies use recommendation systems to increase sales to recommend various services to consumers. However, due to data sparsity, the recommendation systems have low accuracy. Also, previous deep neural collaborative filtering models utilize various variables of datasets such as user information, author information, and book information, and these models have the disadvantage of requiring significant computing resources and training time for their training.
  • 541
  • 27 Jul 2023
Topic Review
Language Grid
The Language Grid is a multilingual service platform on the Internet mainly for supporting Intercultural collaboration. It enables easy registration and sharing of language resources such as online dictionaries, bilingual corpora, and machine translations.
  • 537
  • 04 Nov 2022
Topic Review
MRCI (Interface)
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 537
  • 15 Nov 2022
Topic Review
Base-16 Floating Point
IBM System/360 computers, and subsequent machines based on that architecture (mainframes), support a hexadecimal floating-point format (HFP). In comparison to IEEE 754 floating-point, the IBM floating-point format has a longer significand, and a shorter exponent. All IBM floating-point formats have 7 bits of exponent with a bias of 64. The normalized range of representable numbers is from 16−65 to 1663 (approx. 5.39761 × 10−79 to 7.237005 × 1075). The number is represented as the following formula: (−1)sign × 0.significand × 16exponent−64.
  • 528
  • 08 Oct 2022
Topic Review
Pointman (User Interface)
Pointman is a seated user interface for controlling one's avatar in a 3D virtual environment. It combines head tracking, a gamepad, and sliding foot pedals to provide positional control over many aspects of the avatar's posture. Pointman was developed by the US Naval Research Laboratory (NRL) to support the use of dismounted infantry simulation for USMC training and mission rehearsal. NRL's goal in developing Pointman was to extend the range and precision of actions supported by virtual simulators, to better represent what infantrymen can do.
  • 526
  • 01 Dec 2022
Topic Review
MDFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 522
  • 18 Nov 2022
Topic Review
Microsoft DoubleGuard
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 508
  • 31 Oct 2022
Topic Review
First Order Arithmetic
In set theory and mathematical logic, first-order arithmetic is a collection of axiomatic systems formalising natural and subsets of the natural numbers. It is a choice for axiomatic theory as a basis for many mathematics, but not all. The primary first-order axiom is Peano arithmetic, created by Giuseppe Peano: Peano arithmetic has a proof-theoretic ordinal of [math]\displaystyle{ \varepsilon_0 = \varphi(1, 0) = \psi_0(\Omega) }[/math].
  • 508
  • 04 Nov 2022
Topic Review
Behavioral Risk Management
Behavioral Risk Management, which extends from the broader field of Risk Management, is the process of managing workplace risk factors pertinent to Organizational Behavior and industrial and organizational psychology. "Behavioral risk management applies to risks connected with the workplace behaviors of employees and organizations that have a negative impact on the productivity of an organization; behavioral healthcare episodes and the cost of treating these episodes; and lifestyle behaviors that lead to preventable healthcare conditions and the cost of treating these conditions." Its focus lies on how behavior affects workplaces and organizations along with how to appropriately mitigate negative effects from inappropriate behavior.
  • 507
  • 20 Oct 2022
Topic Review
DioneOS
DioneOS (pronounced /djoneos/) is a multitasking preemptive, real-time operating system (RTOS). The system is designed for microcontrollers, originally released on 2 February 2011 for the Texas Instruments TI MSP430x, and then on 29 March 2013 for the ARM Cortex-M3. Target microcontroller platforms have limited resources, i.e., system clock frequency of tens of MHz, and memory amounts of tens to a few hundred kilobytes (KB). The RTOS is adapted to such conditions by providing a compact and efficient image. The efficiency term here means minimizing further central processing unit (CPU) load caused by system use. According to this definition, the system is more effective when it consumes less CPU time to execute its internal parts, e.g., managing threads. The DioneOS system is intended for autonomic devices where user interface has limited functions. The core functions provided by the system is an environment for building multitasking firmware by means of standard, well known concepts (e.g. semaphores, timers, etc.). Because of the target domain of application, the system uses a command-line interface and has no graphical user interface.
  • 485
  • 03 Nov 2022
Topic Review
Circle-ellipse Problem
The circle-ellipse problem in software development (sometimes termed the square-rectangle problem) illustrates several pitfalls which can arise when using subtype polymorphism in object modelling. The issues are most commonly encountered when using object-oriented programming (OOP). By definition, this problem is a violation of the Liskov substitution principle, one of the SOLID principles. The problem concerns which subtyping or inheritance relationship should exist between classes which represent circles and ellipses (or, similarly, squares and rectangles). More generally, the problem illustrates the difficulties which can occur when a base class contains methods which mutate an object in a manner which may invalidate a (stronger) invariant found in a derived class, causing the Liskov substitution principle to be violated. The existence of the circle-ellipse problem is sometimes used to criticize object-oriented programming. It may also imply that hierarchical taxonomies are difficult to make universal, implying that situational classification systems may be more practical.
  • 482
  • 18 Oct 2022
Topic Review
Generalized Quantifier
In linguistic semantics, a generalized quantifier (GQ) is an expression that denotes a set of sets. This is the standard semantics assigned to quantified noun phrases. For example, the generalized quantifier every boy denotes the set of sets of which every boy is a member. This treatment of quantifiers has been essential in achieving a compositional semantics for sentences containing quantifiers.
  • 476
  • 23 Nov 2022
Topic Review
MRCI (Microsoft)
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 474
  • 25 Oct 2022
Topic Review
Distributed Denial of Service Attacks
Mobile Edge Computing (MEC) has revolutionized the landscape of the telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range of security challenges, the most prominent of which is Distributed Denial of Service (DDoS) attacks, which threaten the availability and performance of MEC’s services. In most cases, Intrusion Detection Systems (IDSs), a security tool that monitors networks and systems for suspicious activity and notify administrators in real time of potential cyber threats, have relied on shallow Machine Learning (ML) models that are limited in their abilities to identify and mitigate DDoS attacks.
  • 444
  • 07 Feb 2024
Topic Review
DoubleGuard
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 440
  • 16 Nov 2022
Topic Review
ATNYCHI-KELLY BREAK Proof of Comprehensive U.S. Cryptographic Security
ATNYCHI-KELLY BREAK refers to a cryptographic verification framework and national protocol architecture designed to provide layered defense against classical, quantum, physical, and abstract attack vectors. The system—informally titled the "Crown Omega U.S. Stack"—proposes a comprehensive resolution to structural vulnerabilities in modern and post-quantum cryptography through harmonic recursion, axiomatic verification, and hybrid security primitives
  • 272
  • 03 Sep 2025
Topic Review
K-Systems, K-Mathematics, and the Golden Dome
The twenty-first century presents unprecedented challenges to national security. From cyber vulnerabilities to nuclear deterrence, the complexity of today’s threats requires both material defenses and conceptual frameworks that sustain long-term resilience. Among the most ambitious ideas under discussion is the Golden Dome — a proposed large-scale defensive shield against nuclear threats. While the design and implementation of such a system remain firmly in the domain of the U.S. Government, the initiative itself resonates with a deeper truth: resilience requires integration of systems — technological, mathematical, and human. This is where K-Systems and the framework of K-Mathematics (K-Math) enter the conversation, not as replacements or claims of ownership, but as conceptual complements to the national dialogue.
  • 124
  • 02 Sep 2025
Topic Review
White Paper: The K-Crypto Initiative
The United States faces multiple existential threats: a national debt that has reached levels mathematically impossible to repay under the existing financial architecture, a widening economic disparity between classes, and an erosion of collective social unity. These are not temporary cycles that will naturally correct; they represent deep structural fractures that demand a new foundation. The K-Crypto Initiative proposes the creation of a sovereign, digital American currency founded on the SHAARK protocol and k1 physics. This initiative is not another speculative cryptocurrency. Instead, it is designed to be a value-backed, utility-driven currency that operates as the new economic engine for the United States. Unlike digital tokens that rise and fall with speculative bubbles, K-Crypto is tied directly to technological breakthroughs, national productivity, and real-world innovation.
  • 112
  • 02 Sep 2025
  • Page
  • of
  • 48
Academic Video Service