You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Upper Tract Urothelial Carcinoma
Upper tract urothelial carcinoma (UTUC) is a rare malignancy, occurring in 5–10% of patients diagnosed with UC, and involves the renal pelvis, calyces, or ureters. UTUC can be sporadic or hereditary as a clinical manifestation of Lynch syndrome. Therapeutic management of these patients is challenging. Following risk stratification of localized disease, patients with low-grade UTUC may undergo kidney-sparing surgery or radical nephroureterectomy (RNU) and/or chemoablation with mitomycin-c instillation to reduce recurrence.
  • 664
  • 27 Jun 2023
Topic Review
Malicious PDF Document Detection Methods
In network attacks based on malicious documents, the PDF document type accounts for a large proportion. Traditional PDF document detection technology usually builds a rule or feature library for specific vulnerabilities and therefore is only fit for single detection targets and lacks anti-detection ability.
  • 664
  • 15 Sep 2023
Topic Review
Web Cryptography API
The Web Cryptography API is the World Wide Web Consortium’s (W3C) recommendation for a low-level interface that would increase the security of web applications by allowing them to perform cryptographic functions without having to access raw keying material. This agnostic API would perform basic cryptographic operations, such as hashing, signature generation and verification and encryption as well as decryption from within a web application.
  • 638
  • 14 Oct 2022
Topic Review
Data Lake, Spark and Hive
Big data are a large number of datasets that are difficult to store and process using existing database management tools. Big data have some characteristics, denoted by 5Vs: volume, velocity, veracity, variety, and value. Volume refers to the size of the data, velocity refers to the speed of the data from the sources to the destination (data flow), variety refers to different format types of the data, veracity refers to the quality of the data, and value refers to the importance of the data collected without analysis and insight. Lastly, the characteristics have become more than ten, like volatility and visualization value. 
  • 633
  • 29 Feb 2024
Topic Review
Simple API for Grid Applications
The Simple API for Grid Applications (SAGA) is a family of related standards specified by the Open Grid Forum to define an application programming interface (API) for common distributed computing functionality.
  • 630
  • 14 Nov 2022
Topic Review
Organizational Ambidexterity in Quality Dimensions and Triple Helix
Organizational ambidexterity is a concept for an organization that can balance profitability with innovation and development. Numerous historical studies have examined the triple helix, particularly those with industrial elements as the focus of inquiry, because the triple helix itself has three dimensions, namely university, industry, and government. As a multidimensional notion, quality dimensions might signify different things to different people, according to the relevant literature.
  • 593
  • 18 Nov 2022
Topic Review
Timeline of Computing 2000–09
This article presents a detailed timeline of events in the history of computing from 2000 to 2009. For narratives explaining the overall developments, see the History of computing.
  • 579
  • 14 Nov 2022
Topic Review
OptiDJS+
The continuously evolving world of cloud computing presents new challenges in resource allocation as dispersed systems struggle with overloaded conditions. In this regard, OptiDJS+ is a cutting-edge enhanced dynamic Johnson sequencing algorithm made to successfully handle resource scheduling challenges in cloud computing settings. With a solid foundation in the dynamic Johnson sequencing algorithm, OptiDJS+ builds upon it to suit the demands of modern cloud infrastructures. OptiDJS+ makes use of sophisticated optimization algorithms, heuristic approaches, and adaptive mechanisms to improve resource allocation, workload distribution, and task scheduling. To obtain the best performance, this strategy uses historical data, dynamic resource reconfiguration, and adaptation to changing workloads. 
  • 564
  • 01 Mar 2024
Topic Review
Boston Computer Society
The Boston Computer Society (BCS) was an organization of personal computer users, based in Boston, Massachusetts, United States , that ran from 1977 to 1996. At one point, it was the largest such group in the world, with regular user group meetings, many publications, permanent offices in Boston, and hosting major product announcements, including the East Coast release of the Apple Macintosh in 1984.
  • 559
  • 19 Oct 2022
Topic Review
Mobile Government Services Adoption in the Egyptian Context
Customers are increasingly using mobile devices to locate merchants, conduct product research, make purchases, and manage their accounts. Mobile value-added services (VAS) is a term for services that are not included in standard phone plans and that must be purchased or downloaded separately by the end user. 
  • 552
  • 23 Oct 2023
Topic Review
10 Benefits of Incorporating Webinars into Your Curriculum
Webinars have become an essential tool in modern education. They offer a flexible and engaging way to deliver content to students, regardless of their location. By incorporating webinars into your curriculum, you can enhance student learning, improve teaching methods, and boost overall educational outcomes.
  • 545
  • 12 Sep 2024
Topic Review
Source Location Privacy Protection Techniques
Internet of Things (IoT) research has been considered as a paramount domain while enhancing current technologies such as wireless sensor networks (WSNs). Enhanced source location privacy and prolonged network lifetime are imperative for WSNs.
  • 520
  • 10 Jan 2024
Topic Review
Scientific Community Metaphor
In computer science, the scientific community metaphor is a metaphor used to aid understanding scientific communities. The first publications on the scientific community metaphor in 1981 and 1982 involved the development of a programming language named Ether that invoked procedural plans to process goals and assertions concurrently by dynamically creating new rules during program execution. Ether also addressed issues of conflict and contradiction with multiple sources of knowledge and multiple viewpoints.
  • 482
  • 18 Oct 2022
Topic Review
Regenerating Code in Cloud Storage System
Cloud storage is an indispensable part of cloud computing solutions and the security of its stored data has become a key issue in the research and application of cloud storage systems.
  • 480
  • 26 Sep 2023
Topic Review
Random Neighbor-Based Differential Evolution
Symmetry in a differential evolution (DE) transforms a solution without impacting the family of solutions. For symmetrical problems in differential equations, DE is a strong evolutionary algorithm that provides a powerful solution to resolve global optimization problems. DE/best/1 and DE/rand/1 are the two most commonly used mutation strategies in DE. The former provides better exploitation while the latter ensures better exploration. DE/Neighbor/1 is an improved form of DE/rand/1 to maintain a balance between exploration and exploitation which was used with a random neighbor-based differential evolution (RNDE) algorithm.
  • 465
  • 03 Nov 2023
Topic Review
Video Blockchain
Researchers explore video blockchain for establishing connectivity among vehicles in a smart city through utilizing blockchain technology.
  • 459
  • 17 Nov 2023
Topic Review
Performance Analysis of Wired Software-Defined Networking Networks
The Software-Defined Networking (SDN) paradigm is one that is utilized frequently in data centers. Software-Defined Wireless Networking, often known as SDWN, refers to an environment in which concepts from SDN are implemented in wireless networks. The SDWN is struggling with challenges of scalability and performance as a result of the growing number of wireless networks in its coverage area. It is thought that SDN techniques, such as Mininet-Wi-Fi and Ryu Controller for wireless networks, can overcome the problems with scalability and performance. 
  • 419
  • 21 Nov 2023
Topic Review
Parallelization Strategies for Graph-Code-Based Similarity Search
The volume of multimedia assets in collections is growing exponentially, and the retrieval of information is becoming more complex. The indexing and retrieval of multimedia content is generally implemented by employing feature graphs. Feature graphs contain semantic information on multimedia assets. Machine learning can produce detailed semantic information on multimedia assets, reflected in a high volume of nodes and edges in the feature graphs. Graph Codes provide fast and effective multimedia indexing and retrieval, even in billion-scale use cases.
  • 412
  • 19 Jan 2024
Topic Review
Architecting Computational Systems: From Intuition to Theory
This paper presents a synthetic exploration of theoretical computer science, tracing a coherent intellectual lineage from the abstract foundations of language to the concrete applications of modern cryptography. We begin by establishing the Chomsky Hierarchy as a fundamental framework for classifying computational problems, detailing the generative power of formal grammars and their direct correspondence with a taxonomy of abstract machines. This leads to an examination of the universal Turing machine and the profound implications of the Church-Turing thesis, which defines the absolute boundaries of what is algorithmically computable. We explore these limits through a deep analysis of undecidability, using Hilbert's Tenth Problem as a case study that connects number theory to the Halting Problem. Contrasting the unsolvable with the solvable, we then analyze canonical algorithms for graph traversal and optimization, highlighting the spectrum of computational complexity. The paper then descends to the logical bedrock of computation—Boolean algebra and bitwise operations—before culminating in an analysis of applied cryptography. Here, we demonstrate how principles of modular arithmetic and computational hardness, embodied in functions like SHA-256, are leveraged to build secure systems, thus completing the journey from abstract theory to tangible security.
  • 102
  • 11 Sep 2025
Topic Review Peer Reviewed
Sensing, Feeling, and Origins of Cognition
Cognition is often modeled in terms of abstract reasoning and neural computation, yet a growing body of theoretical and experimental work suggests that the roots of cognition lie in fundamental embodied regulatory processes. This article presents a theory of cognition grounded in sensing, feeling, and affect—capacities that precede neural systems and are observable in even the simplest living organisms. Based on the info-computational framework, this entry outlines how cognition and proto-subjectivity co-emerge in biological systems. Embodied appraisal—the system’s ability to evaluate internal and external conditions in terms of valence (positive/negative; good/bad)—and the capacity to regulate accordingly are described as mutually constitutive processes observable at the cellular level. This concept reframes cognition not as abstract symbolic reasoning but as value-sensitive, embodied information dynamics resulting from self-regulating engagement with the environment that spans scales from unicellular organisms to complex animals. In this context, information is physically instantiated, and computation is the dynamic, self-modifying process by which organisms regulate and organize themselves. Cognition thus emerges from the dynamic coupling of sensing, internal evaluation, and adaptive morphological (material shape-based) activity. Grounded in findings from developmental biology, bioelectric signaling, morphological computation, and basal cognition, this account situates intelligence as an affect-driven regulatory capacity intrinsic to biological life. While focused on biological systems, this framework also offers conceptual insights for developing more adaptive and embodied forms of artificial intelligence. Future experiments with minimal living systems or synthetic agents may help operationalize and test the proposed mechanisms of proto-subjectivity and affect regulation.
  • 54
  • 11 Oct 2025
  • Page
  • of
  • 7
Academic Video Service