Topic Review
Lists of Mathematics Topics
This article itemizes the various lists of mathematics topics. Some of these lists link to hundreds of articles; some link only to a few. The template to the right includes links to alphabetical lists of all mathematical articles. This article brings together the same content organized in a manner better suited for browsing. The purpose of this list is not similar to that of the Mathematics Subject Classification formulated by the American Mathematical Society. Many mathematics journals ask authors of research papers and expository articles to list subject codes from the Mathematics Subject Classification in their papers. The subject codes so listed are used by the two major reviewing databases, Mathematical Reviews and Zentralblatt MATH. This list has some items that would not fit in such a classification, such as list of exponential topics and list of factorial and binomial topics, which may surprise the reader with the diversity of their coverage.
  • 3.4K
  • 19 Oct 2022
Topic Review
Smart City Applications
Smart city applications are designed to take advantage of the smart city ICT and collected data to provide value-added smart features. These applications use data analytics, intelligent techniques and other advanced technologies to make smart decisions that improve the smart city's operations and quality of life.
  • 3.4K
  • 17 Dec 2021
Topic Review
Cryptography
Cryptography, or cryptology (from Ancient Greek: "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information (plaintext) to unintelligible nonsense text (ciphertext), which can only be read by reversing the process (decryption). The sender of an encrypted (coded) message shares the decryption (decoding) technique only with intended recipients to preclude access from adversaries. The cryptography literature often uses the names "Alice" (or "A") for the sender, "Bob" (or "B") for the intended recipient, and "Eve" (or "E") for the eavesdropping adversary. Since the development of rotor cipher machines in World War I and the advent of computers in World War II, cryptography methods have become increasingly complex and their applications more varied. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary. While it is theoretically possible to break into a well-designed system, it is infeasible in actual practice to do so. Such schemes, if well designed, are therefore termed "computationally secure"; theoretical advances (e.g., improvements in integer factorization algorithms) and faster computing technology require these designs to be continually reevaluated, and if necessary, adapted. Information-theoretically secure schemes that cannot be broken even with unlimited computing power, such as the one-time pad, are much more difficult to use in practice than the best theoretically breakable, but computationally secure, schemes. The growth of cryptographic technology has raised a number of legal issues in the Information Age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation. Cryptography also plays a major role in digital rights management and copyright infringement disputes in regard to digital media.
  • 3.4K
  • 28 Nov 2022
Topic Review
Delphi (IDE)
Delphi is an integrated development environment (IDE) for rapid application development of desktop, mobile, web, and console software, developed by Embarcadero Technologies. It is also an event-driven language. Delphi's compilers use their own Object Pascal dialect of Pascal and generate native code for Microsoft Windows, macOS (IA-32 only), iOS, Android and Linux (x64 only). Since 2016, there have been new releases of Delphi every six months, with new platforms being added approximately every second release. Delphi includes a code editor, a visual designer, an integrated debugger, a source code control component, and support for third-party plugins. The code editor features Code Insight (code completion), Error Insight (real-time error-checking), and refactoring. The visual forms designer has traditionally used Visual Component Library (VCL) for native Windows development, but the FireMonkey (FMX) platform was later added for cross-platform development. Database support in Delphi is very strong. A Delphi project of a million lines to compile in a few seconds – one benchmark gave 170,000 lines per second. Delphi was originally developed by Borland as a rapid application development tool for Windows as the successor of Turbo Pascal. Delphi added full object-oriented programming to the existing language, and since then the language has grown to support generics and anonymous methods, and native Component Object Model (COM) support. In 2006, Borland’s developer tools section was transferred from Borland to a wholly owned subsidiary known as CodeGear, which was sold to Embarcadero Technologies in 2008. In 2015, Embarcadero was purchased by Idera Software, but the Embarcadero mark was retained for the developer tools division. Delphi and its C++ counterpart, C++Builder, are interoperable. They share many core components, notably the IDE, VCL, and much of the runtime library. In addition, they can be used jointly in a project. For example, C++Builder 6 and later can consume Delphi source code and C++ in one project, while packages compiled with C++Builder can be used from within Delphi. In 2007, the products were released jointly as RAD Studio, a shared host for Delphi and C++Builder, which can be purchased with either or both.
  • 3.4K
  • 02 Nov 2022
Topic Review
List of Doom Source Ports
This article is a list of unofficial source ports of the Doom engine, which was originally used in the video game Doom. Most often, the source ports presented here are modifications made by the Doom community, as opposed to the official Doom versions produced by id Software or affiliated companies. The Doom engine's source code was released to the public on December 23, 1997. Although Doom was originally created for MS-DOS, the original source release was for the subsequent Linux version, due to the use of a proprietary sound library in the DOS version. The original purpose of source ports was cross-platform compatibility, but shortly after the release of the Doom source code, programmers were correcting old, unaddressed Doom bugs and deficiencies in their own source ports, and later on introducing their own modifications to enhance game features and alter gameplay. The source code was originally released under a proprietary license that prohibited commercial use and did not require programmers to provide the source code for the modifications they released in executable form, but it was later re-released on October 3, 1999 under the GNU General Public License after requests from the community.
  • 3.4K
  • 06 Feb 2023
Topic Review
2020 Twitter Bitcoin Scam
User:RMCD bot/subject notice On July 15, 2020, between 20:00 and 22:00 UTC, around 130 high-profile Twitter accounts were compromised by outside parties to promote a bitcoin scam. Twitter and other media sources confirmed that the perpetrators had gained access to Twitter's administrative tools so that they could alter the accounts themselves and post the tweets directly. They appeared to have used social engineering to gain access to the tools via Twitter employees. The scam tweets asked individuals to send bitcoin currency to a specific cryptocurrency wallet, with the promise of the Twitter user that money sent would be doubled and returned as a charitable gesture. Within minutes from the initial tweets, more than 320 transactions had already taken place on one of the wallet addresses, and more than US$110,000 of equivalent bitcoin had been deposited in one account before the scam messages were removed by Twitter. In addition, full message history data from eight non-verified accounts was also acquired. Dmitri Alperovitch, the co-founder of cybersecurity company CrowdStrike, described the incident as "the worst hack of a major social media platform yet." The FBI and other law enforcement agencies are investigating the scam and the security used by Twitter. Security researchers expressed concerns that the social engineering used to execute the hack can affect the use of social media in important online discussions, including the lead-up into the 2020 United States presidential election.
  • 3.3K
  • 17 Nov 2022
Topic Review
Blockchain Private Key Generation and Recovery
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application. The blockchain wallet manages user’s digital assets and authenticates a blockchain user by checking the possession of a user’s private key. Mnemonic codes are the most commonly used technique to generate and recover a private key in the blockchain wallet. Various studies have been conducted to improve the private key generation and recovery process.
  • 3.3K
  • 04 Jul 2022
Topic Review
Adaptability Quotient
Adaptability Quotient (AQ) is a metric of adaptability used to measure performance in the workplace and assess individual potential. The earliest article published by Stuart Parkin in 2010 gave rise to the term Adaptability Quotient. This has inspired many others to expand and research the area. A recent deep dive into Adaptability Quotient can be found at SingularityU London Adaptability Webinar: "Developing adaptable workforces, a roadmap to recovery", where Ross Thornley, is joined by Jason Slater from UNIDO and Professor Nicolas Deuschel . Additionally Amin Toufani in 2014, shares his insights during his public lecture at Singularity University. he defines AQ as the ability to realize optimal outcomes based on recent or future change. Ross Thornley and Mike Raven's work at AQai is deepening the scientific research of AQ in the workplace, opening up new frontiers of understanding and links across multiple disciplines. Their A.C.E model is widely seen as the most holistic and comprehensive assessment. AQ is defined as, "Measuring the abilities, characteristics, and environmental factors which impact the successful behaviors and actions of people, and organizations to effectively respond to uncertainty, new information, or changed circumstances.” Decoding AQ 2020, Ross Thornley. (As of 2019), there is a growing body of literature surrounding adaptability, and consequent interest in being able to harness, measure, and quantify adaptability in the workplace. Adaptability was identified as the “new competitive advantage” by the Harvard Business Review in 2011. In 2014, The Flux Report (published by Right Management in the UK) revealed that 91% of HR managers thought that: "People will be recruited on their ability to deal with change and uncertainty" as opposed to other skills. Specifically adaptive performance in the research literature means numerous organizational scholars have recognized that traditional models of performance are static and need to be augmented to include "responsiveness to changing job requirements" — labeled adaptive performance (AP; Allworth & Hesketh, 1999, p. 98; Griffin, Neal, & Parker, 2007; Pulakos, Arad, Donovan, & Plamondon, 2000).
  • 3.3K
  • 28 Nov 2022
Topic Review
Uniform Distribution (Continuous)
In probability theory and statistics, the continuous uniform distribution or rectangular distribution is a family of symmetric probability distributions. The distribution describes an experiment where there is an arbitrary outcome that lies between certain bounds. The bounds are defined by the parameters, a and b, which are the minimum and maximum values. The interval can be either be closed (eg. [a, b]) or open (eg. (a, b)). Therefore, the distribution is often abbreviated U (a, b), where U stands for uniform distribution. The difference between the bounds defines the interval length; all intervals of the same length on the distribution's support are equally probable. It is the maximum entropy probability distribution for a random variable X under no constraint other than that it is contained in the distribution's support.
  • 3.2K
  • 17 Oct 2022
Topic Review
Isosceles Triangle
In geometry, an isosceles triangle (/aɪˈsɒsəliːz/) is a triangle that has at least two sides of equal length. Sometimes it is specified as having exactly two sides of equal length, and sometimes as having at least two sides of equal length, the latter version thus including the equilateral triangle as a special case. Examples of isosceles triangles include the isosceles right triangle, the golden triangle, and the faces of bipyramids and certain Catalan solids. The mathematical study of isosceles triangles dates back to ancient Egyptian mathematics and Babylonian mathematics. Isosceles triangles have been used as decoration from even earlier times, and appear frequently in architecture and design, for instance in the pediments and gables of buildings. The two equal sides are called the legs and the third side is called the base of the triangle. The other dimensions of the triangle, such as its height, area, and perimeter, can be calculated by simple formulas from the lengths of the legs and base. Every isosceles triangle has an axis of symmetry along the perpendicular bisector of its base. The two angles opposite the legs are equal and are always acute, so the classification of the triangle as acute, right, or obtuse depends only on the angle between its two legs.
  • 3.2K
  • 07 Nov 2022
Topic Review
Mortal Kombat
Mortal Kombat is an American media franchise centered on a series of video games, originally developed by Midway Games in 1992. The development of the first game was originally based on an idea that Ed Boon and John Tobias had of making a video game starring Jean-Claude Van Damme, but as that idea fell through, a fantasy-themed fighting game was created instead, nonetheless paying homage to him with nut-cracking movie star character Johnny Cage, whose initials and personal style echo Van Damme's. Mortal Kombat was the first ever fighting game to introduce a secret fighter, reached if the player fulfilled a set of requirements. The original game has spawned many sequels and spin-offs consisting of several action-adventure games, as well as a comic book series and a card game. Film producer Lawrence Kasanoff licensed the rights to the game in the early 1990s and produced the first hit movie ever made from a video game. Lawrence also produced the second movie, animated TV series, live-action TV series films, the first one million platinum-selling album and a live-action tour. Mortal Kombat has become the most successful fighting franchise in the history of video games and one of the highest-grossing media franchises of all time. The series has a reputation for high levels of graphic violence, including, most notably, its Fatalities (finishing moves allowing the player to finish off their defeated opponent). Controversies surrounding Mortal Kombat, in part, led to the creation of the ESRB video game rating system. Early games in this series were also noted for their realistic digitized sprites and an extensive use of palette swapping to create new characters. Following Midway's bankruptcy, the Mortal Kombat development team was acquired by Warner Bros. Entertainment and turned into NetherRealm Studios.
  • 3.1K
  • 19 Oct 2022
Topic Review
Encyclopaedia Metallum
Encyclopaedia Metallum: The Metal Archives (commonly known as Metal Archives per the URL or just MA) is a website which lists bands from various forms of heavy metal music. Encyclopaedia Metallum was described by Matt Sullivan of Nashville Scene as "the Internet's central database for all that is 'tr00' in the metal world." Terrorizer described the site as "a fully-exhaustive list of pretty much every metal band ever, with full discographies, an active forum and an interlinking members list that shows the ever-incestuous beauty of the metal scene". Nevertheless, there are exceptions for bands which fall under disputed genres not accepted by the website. Encyclopaedia Metallum attempts to provide comprehensive information on each band, such as a discography, logos, pictures, lyrics, line-ups, biography, trivia and user-submitted reviews. The site also provides a system for submitting bands to the archives. The website is free of advertisements and is run completely independently.
  • 3.1K
  • 02 Dec 2022
Topic Review
Windows 10 Version History (Version 1903)
The Windows 10 May 2019 Update (also known as version 1903 and codenamed "19H1") is the seventh major update to Windows 10 and the first to use a more descriptive codename (including the year and the order released) instead of the "Redstone" or "Threshold" codename. It carries the build number 10.0.18362.
  • 3.1K
  • 16 Nov 2022
Topic Review
Single-Letter Second-Level Domain
Single-letter second-level domains are domain names in which the second-level domain consists of only one letter, such as x.com. In 1993, the Internet Assigned Numbers Authority (IANA) explicitly reserved all single-letter and single-digit second-level domain names in the top-level domains com, net, and org, and grandfathered those that had already been assigned. In December 2005, ICANN considered auctioning these domains.
  • 3.1K
  • 03 Nov 2022
Topic Review
Forensic Photography
Forensic photography may refer to the visual documentation of different aspects that can be found at a crime scene. It may include the documentation of the crime scene, or physical evidence that is either found at a crime scene or already processed in a laboratory. Forensic photography differs from other variations of photography because crime scene photographers usually have a very specific purpose for capturing each image. As a result, the quality of forensic documentation may determine the result of an investigation, in that with the absence of good documentation, investigators may find it impossible to conclude what did or did not happen. Crime scenes can be major sources of physical evidence that is used to associate or link suspects to scenes, victims to scenes, and suspects to victims. Locard's exchange principle is a major concept that helps determine these relationships of evidence. It is the basic tenet of why crime scenes should be investigated. Anything found at a crime scene can be used as physical evidence as long as it is relevant to the case, which is why the documentation of a crime scene and physical evidence in its true form is key for the interpretation of the investigation. Knowing that crucial information for an investigation can be found at a crime scene, forensic photography is a form of documentation that is essential for retaining the quality of discovered physical evidence. Such physical evidence to be documented include those found at the crime scene, in the laboratory, or for the identification of suspects. All forensic photography must consider three elements at a crime scene: the subject, the scale, and a reference object. Also, the overall forensic photographs must be shown a neutral and accurate representation.
  • 3.0K
  • 21 Nov 2022
Topic Review
High-level Architecture
The high-level architecture (HLA) is a general purpose architecture for distributed computer simulation systems. Using HLA, computer simulations can interact (that is, to communicate data, and to synchronize actions) with other computer simulations regardless of the computing platforms. The interaction between simulations is managed by a run-time infrastructure (RTI). HLA is an interoperability standard for distributed simulation used to support analysis, engineering and training in a number of different domains in both military and civilian applications and is the standard technical architecture for all US Department of Defense simulations.
  • 3.0K
  • 04 Oct 2022
Topic Review
List of International Mathematical Olympiad Participants
The International Mathematical Olympiad (IMO) is an annual international high school mathematics competition focused primarily on pre-collegiate mathematics, and is the oldest of the international science olympiads. The awards for exceptional performance include medals for roughly the top half participants, and honorable mentions for participants who solve at least one problem perfectly. This is a list of participants who have achieved notability. This includes participants that went on to become notable mathematicians, participants who won medals at an exceptionally young age, or participants who scored highly.
  • 3.0K
  • 26 Oct 2022
Topic Review
Halt and Catch Fire
In computer engineering, Halt and Catch Fire, known by the assembly mnemonic HCF, is an idiom referring to a computer machine code instruction that causes the computer's central processing unit (CPU) to cease meaningful operation, typically requiring a restart of the computer. It originally referred to a fictitious instruction in IBM System/360 computers, making a joke about its numerous non-obvious instruction mnemonics. With the advent of the MC6800, a design flaw was discovered by the programmers. Due to incomplete opcode decoding, two illegal opcodes, 0x9D and 0xDD, will cause the program counter on the processor to increment endlessly, which renders the processor useless. Those codes have been unofficially named HCF. During the design process of MC6802, engineers originally planned to remove this instruction, but kept it as-is for testing purposes. As a result, HCF was officially recognized as a real instruction. Later, HCF became a humorous catch-all term for instructions that may freeze a processor, including intentional instructions for testing purposes, and unintentional illegal instructions. Some are considered hardware defects, and if the system is shared, a malicious user can execute it to launch a denial-of-service attack. In the case of real instructions, the implication of this expression is that, whereas in most cases in which a CPU executes an unintended instruction (a bug in the code) the computer may still be able to recover, in the case of an HCF instruction there is, by definition, no way for the system to recover without a restart. The expression "catch fire" is a facetious exaggeration of the speed with which the CPU chip would be switching some bus circuits, causing them to overheat and burn.
  • 3.0K
  • 04 Nov 2022
Topic Review
Intraretinal Fluid Pattern Characterization
The accumulation of fluids in the retinal layers is one of the main causes of blindness in developed countries. The main strategy for its study and diagnosis is through the use of Optical Coherence Tomography (OCT) images. This allows experts to observe the layers of the retina in a cross-sectional view. Commonly, for the analysis of these accumulations by means of computer diagnostic support systems, precise segmentation strategies are employed.
  • 3.0K
  • 22 Apr 2021
Topic Review
Acronis True Image
Acronis True Image is a software product produced by Acronis that provides data protection for personal users including, backup, archive, access and recovery for Windows, macOS, iOS, and Android operating systems. As disk imaging software, True Image can restore the previously captured image to another disk, replicating the structure and contents to the new disk, also allowing disk cloning and partition resizing, even if the new disk is of a different capacity. The backups are in a proprietary format which saves using a .tib filename format. Acronis was launched in 2003 and in December 2014 claimed to have over 5 million consumer and 500,000 businesses users.
  • 2.9K
  • 15 Nov 2022
  • Page
  • of
  • 47
ScholarVision Creations