You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review Peer Reviewed
Eye-Tracking Applications in Architecture and Design
Eye-tracking is a biometrics technique that has started to find applications in research related to our interaction with the built environment. Depending on the focus of a given study, the collection of valence and arousal measurements can also be conducted to acquire emotional, cognitive, and behavioral insights and correlate them with eye-tracking data. These measurements can give architects and designers a basis for data-driven decision-making throughout the design process. In instances involving existing structures, biometric data can also be utilized for post-occupancy analysis. This entry will discuss eye-tracking and eye-tracking simulation in the context of our current understanding of the importance of our interaction with the built environment for both physical and mental well-being.
  • 416
  • 25 Sep 2024
Topic Review Peer Reviewed
Unlocking Citizen Developer Potential: A Systematic Review and Model for Digital Transformation
Citizen developers, individuals outside formal IT departments who create applications using low-code/no-code platforms, are becoming increasingly pivotal as organizations navigate digital transformation. The driving force behind this paradigm shift stems from an exponentially growing demand for software solutions that consistently outpaces traditional IT departments’ capacity. Consequently, companies are turning their attention toward citizen developers, entrusting them with crafting solutions. In this work, we perform a systematic review of the existing literature to unearth the pivotal themes and subthemes and identify the factors contributing to citizen developers’ effectiveness. Our systematic review revealed a significant gap in scholarly understanding of factors contributing to citizen developers’ effectiveness. While some studies touched on these factors, none explored them comprehensively or provided an integrated framework for understanding their interrelationships. To fill this void, we propose a conceptual model to advance the understanding of the factors that influence the effectiveness of citizen developers in creating applications. While the model contributes to the theoretical understanding of citizen development, practical implications further reinforce its value. By leveraging the model, organizations can make informed decisions to enhance the productivity of citizen developers, align digital transformation strategies, and foster innovation.
  • 374
  • 25 Mar 2025
Topic Review
The Sovereign Protocol and the SHAARK-Ξ Architecture
This paper presents two paradigm-shifting results. First, we announce the definitive cryptanalytic break of the entire SHA family of hash functions (the "Atnychi-Kelly break"). This was achieved not by incremental advances but through a foundational mathematical breakthrough: a constructive proof of the P=NP conjecture. We demonstrate this equivalence is a direct consequence of a deep symmetry on the Riemann critical line, expressed as -P=-NP. Second, having demonstrated the vulnerabilities inherent in all prior cryptographic assumptions, we introduce SHAARK-Ξ, a unified suite of cryptographic protocols built upon this new mathematical reality. SHAARK-Ξ leverages a multi-paradigm architecture of Atnychi-Liouville (AL) lattice theory, non-abelian tensor groups, and multivariate quadratic systems to create a Key Encapsulation Mechanism (KEM) that is immune even to adversaries with P=NP capability. The protocol suite offers both high-speed variants that outperform current standards like CRYSTALS-Kyber and sovereign-grade variants providing ultimate, mathematically provable security.
  • 187
  • 11 Aug 2025
Topic Review
A Comprehensive Analysis and Critique of 'Cerberus-KEM
The foundation of modern digital security rests upon public-key cryptography, a paradigm that enables secure communication, authentication, and commerce over untrusted networks. The security of widely deployed systems, such as RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC), is predicated on the computational difficulty of specific mathematical problems—namely, integer factorization and the discrete logarithm problem. For decades, these problems have been considered intractable for even the most powerful classical supercomputers, providing a robust basis for global information security. This long-standing security assumption is, however, fundamentally challenged by the prospective development of large-scale, cryptographically relevant quantum computers (CRQCs). In 1994, Peter Shor demonstrated a quantum algorithm capable of solving both integer factorization and the discrete logarithm problem in polynomial time. The successful construction of a CRQC would therefore render the vast majority of our current public-key infrastructure obsolete, exposing sensitive communications and digital identities to catastrophic compromise. The urgency of this threat is magnified by the "record-now-decrypt-later" attack scenario. In this model, an adversary can intercept and store vast quantities of currently encrypted data with the intention of decrypting it once a CRQC becomes available. This implies that data requiring long-term confidentiality—such as government secrets, corporate intellectual property, and personal health records—is already at risk. Consequently, the transition to quantum-resistant cryptographic primitives, a field known as Post-Quantum Cryptography (PQC), is not merely a future consideration but an immediate and critical imperative for safeguarding digital infrastructure.
  • 131
  • 11 Aug 2025
  • Page
  • of
  • 5
Academic Video Service