Topic Review
List of Academic Journals by Preprint Policy
This is a list of academic journals by their submission policies regarding the use of preprints prior to publication, such as the arXiv, and bioRxiv. Journals focusing on physics and mathematics are excluded because they routinely accept manuscripts that have been posted to preprint servers. Publishers' policies on self-archiving (including preprint versions) can also be found at SHERPA/RoMEO.
  • 2.2K
  • 29 Dec 2022
Topic Review
Yahoo! Messenger Protocol
The Yahoo! Messenger Protocol (YMSG) is the underlying network protocol used by the Yahoo! Messenger instant messaging client. Yahoo! Instant Messager supports many features beyond just messaging, including off-line messaging, file transfer, chat, conferencing, voice chat, webcams and avatars.
  • 2.2K
  • 07 Nov 2022
Topic Review
Matching Theory (Economics)
In economics, matching theory, also known as search and matching theory, is a mathematical framework attempting to describe the formation of mutually beneficial relationships over time. Matching theory has been especially influential in labor economics, where it has been used to describe the formation of new jobs, as well as to describe other human relationships like marriage. Matching theory evolved from an earlier framework called 'search theory'. Where search theory studies the microeconomic decision of an individual searcher, matching theory studies the macroeconomic outcome when one or more types of searchers interact. It offers a way of modeling markets in which frictions prevent instantaneous adjustment of the level of economic activity. Among other applications, it has been used as a framework for studying frictional unemployment. One of the founders of matching theory is Dale T. Mortensen of Northwestern University. A textbook treatment of the matching approach to labor markets is Christopher A. Pissarides' book Equilibrium Unemployment Theory. Mortensen and Pissarides, together with Peter A. Diamond, were awarded the 2010 Nobel Prize in Economics for 'fundamental contributions to search and matching theory'.
  • 2.2K
  • 09 Nov 2022
Topic Review
Petya and NotPetya
Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system. Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global cyberattack, primarily targeting Ukraine . The new variant propagates via the EternalBlue exploit, which is generally believed to have been developed by the United States . National Security Agency (NSA), and was used earlier in the year by the WannaCry ransomware. Kaspersky Lab referred to this new version as NotPetya to distinguish it from the 2016 variants, due to these differences in operation. In addition, although it purports to be ransomware, this variant was modified so that it is unable to actually revert its own changes. The NotPetya attacks have been blamed on the Russian government, specifically the Sandworm hacking group within the GRU Russian military intelligence organization, by security researchers, Google, and several governments.
  • 2.2K
  • 19 Oct 2022
Topic Review
Windows 10 Version History (Version 1809)
The Windows 10 October 2018 Update (also known as version 1809 and codenamed "Redstone 5") is the sixth major update to Windows 10 and the fifth in a series of updates under the Redstone codenames. It carries the build number 10.0.17763.
  • 2.2K
  • 08 Nov 2022
Topic Review
Promoting Traditional Craftsmanship Through Digital Technology
Τhe success of assisting Cultural Heritage (CH) valorization through digital technologies (availability, accessibility, and engaging and interactive presentations) is due to the captivating content of stories, memories, and meaning that CH offers. Traditional Crafts (TCs) have a paramount cultural value and offer a thematic thesaurus of stories and narratives related to the origins of modern societies, history, and culture, the origins of industrial development and design, economic factors and societal outcomes, as well as, personal and family memories, all of which general audiences can relate to.
  • 2.2K
  • 30 Mar 2022
Topic Review
VGA-Compatible Text Mode
VGA-compatible text mode was introduced in 1987 by IBM as part of the VGA standard for its IBM PS/2 computers. Its use on IBM PC compatibles was widespread through the 1990s and persists today for some applications on modern desktop computers. The main features of VGA text mode are colored (programmable 16 color palette) characters and their background, blinking, various shapes of the cursor (block/underline/hidden static/blinking), and loadable fonts (with various glyph sizes). The Linux console traditionally uses hardware VGA-compatible text modes, and the Win32 console environment has an ability to switch the screen to text mode for some text window sizes.
  • 2.2K
  • 24 Oct 2022
Topic Review
Food Science
Food science is the basic science and applied science of food; its scope starts at overlap with agricultural science and nutritional science and leads through the scientific aspects of food safety and food processing, informing the development of food technology. Food science brings together multiple scientific disciplines. It incorporates concepts from fields such as chemistry, physics, physiology, microbiology, and biochemistry. Food technology incorporates concepts from chemical engineering, for example. Activities of food scientists include the development of new food products, design of processes to produce these foods, choice of packaging materials, shelf-life studies, sensory evaluation of products using survey panels or potential consumers, as well as microbiological and chemical testing. Food scientists may study more fundamental phenomena that are directly linked to the production of food products and its properties.
  • 2.2K
  • 12 Oct 2022
Topic Review
A discrete quantum momentum operator
We introduce finite-differences derivatives intended to be exact when applied to the real exponential function. We want to recover the known results of continuous calculus with our finite differences derivatives but in a discrete form. The purpose of this work is to have a discrete momentum operator suitable for use as an operator in discrete quantum mechanics theory.
  • 2.2K
  • 24 Aug 2021
Topic Review
Napoleon's Theorem
In geometry, Napoleon's theorem states that if equilateral triangles are constructed on the sides of any triangle, either all outward or all inward, the lines connecting the centres of those equilateral triangles themselves form an equilateral triangle. The triangle thus formed is called the inner or outer Napoleon triangle. The difference in area of these two triangles equals the area of the original triangle. The theorem is often attributed to Napoleon Bonaparte (1769–1821). Some have suggested that it may date back to W. Rutherford's 1825 question published in The Ladies' Diary, four years after the French emperor's death, but the result is covered in three questions set in an examination for a Gold Medal at the University of Dublin in October, 1820, whereas Napoleon died the following May.
  • 2.2K
  • 24 Oct 2022
Topic Review
Health Service Executive Ransomware Attack
On 14 May 2021, the Health Service Executive (HSE) of Ireland suffered a major ransomware cyberattack which caused all of its IT systems nationwide to be shut down. It was the most significant cybercrime attack on an Irish state agency and the largest known attack against a health service computer system. Bloomberg News reported that the attackers used the Conti ransomware. The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia. The same group is believed to have attacked the Department of Health with a similar cyberattack. On 19 May, the Financial Times reviewed private data for twelve individuals which had appeared online as a result of the breach. On 28 May, the HSE confirmed confidential medical information for 520 patients, as well as corporate documents were published online. On 23 June, it was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use. By September, over 95% of all servers and devices had been restored.
  • 2.1K
  • 05 Dec 2022
Topic Review
Requirements Engineering in OTF-Computing
The idea of On-The-Fly (OTF) Computing is to compose and provide software services ad hoc, based on requirement descriptions in natural language. Since non-technical users write  their software requirements themselves and in unrestricted natural language, deficits occur such as inaccuracy and incompleteness. These deficits are usually tackled by natural language processing methods, which have to face specific challenges in OTF Computing because maximum automation is the goal there. In the following, we present current automatic approaches for solving inaccuracies and incompleteness in natural language requirement descriptions.
  • 2.1K
  • 30 Oct 2020
Topic Review
Mathematical Physics
Mathematical physics refers to the development of mathematical methods for application to problems in physics. The Journal of Mathematical Physics defines the field as "the application of mathematics to problems in physics and the development of mathematical methods suitable for such applications and for the formulation of physical theories". An alternative definition would also include those mathematics that are inspired by physics (also known as physical mathematics).
  • 2.1K
  • 27 Oct 2022
Topic Review
Messaging Apps
Messaging apps (a.k.a. social messaging or chat applications) are apps and platforms that enable instant messaging. Messaging apps are online messaging services used primarily via mobile platforms. Many such apps have developed into broad platforms enabling status updates, chatbots, payments and conversational commerce (e-commerce via chat). They are normally centralised networks run by the servers of the platform's operators, unlike peer-to-peer protocols like XMPP. Some examples of popular messaging apps include WhatsApp, Facebook Messenger, China's WeChat and QQ Messenger, Telegram, Viber, Line, and Snapchat. The popularity of certain apps greatly differ between different countries. Certain apps have emphasis on certain uses - for example Skype focuses on video calling, Slack focuses on messaging and file sharing for work teams, and Snapchat focuses on image messages. Some social networking services offer messaging services as a component of their overall platform, such as Facebook's Facebook Messenger, while others have a direct messaging function as an additional adjunct component of their social networking platforms, like Instagram, Reddit, Tumblr, TikTok, Clubhouse and Twitter, either directly or through chat rooms. Messaging apps are the most widely used smartphone apps, with in 2018 over 1.3 billion monthly users of WhatsApp and Facebook Messenger, 980 million monthly active users of WeChat and 843 million monthly active users of QQ Mobile.
  • 2.1K
  • 09 Nov 2022
Topic Review
Dead Space (Video Game)
Dead Space is a 2008 survival horror video game developed by EA Redwood Shores and published by Electronic Arts for the PlayStation 3, Xbox 360 and Microsoft Windows. Released in October 2008, the title was the first in the Dead Space franchise and drew inspiration from other works of horror, notably Resident Evil 4 and the Silent Hill series. Set on a mining spaceship overrun by monsters called Necromorphs, the player controls engineer Isaac Clarke from the third-person perspective as he navigates the spaceship, fights Necromorphs, and struggles with increasing psychosis. The player explores areas on the station through the narrative, solving environmental puzzles while finding ammunition and equipment to survive. Isaac wields engineering equipment as weapons. Dead Space was pitched in early 2006 and fit Electronic Arts' priority of creating new intellectual properties. A prototype of the game was developed for the original Xbox console and lasted 18 months. The team aimed for realism and innovation in design. In the pursuit of these goals, the team removed set spawn points for enemies and omitted the heads-up display in favor of presenting information in the world. Immersive and frightening sound design was a large priority during production, and the score by Jason Graves was noted by critics cause of evoke tension and unease. Dead Space debuted weak in sales but eventually sold over a million copies worldwide. The game was met with universal acclaim: reviewers praised its atmosphere, gameplay and sound design. It won and was nominated for multiple industry awards and has been ranked by journalists as one of the greatest video games ever made. To following of the game success, spawned an adaptation for mobile phones, two numbered sequels (released in 2011 and 2013), several spin-off titles, and other related media, including a comic book prequel and an animated film. A remake of Dead Space is currently in development by EA's Motive Studios that set for release in early 2023.
  • 2.1K
  • 14 Oct 2022
Topic Review
Outlier Detection
Outlier detection is a statistical procedure that aims to find suspicious events or items that are different from the normal form of a dataset. It has drawn considerable interest in the field of data mining and machine learning. Outlier detection is important in many applications, including fraud detection in credit card transactions and network intrusion detection. There are two general types of outlier detection: global and local. Global outliers fall outside the normal range for an entire dataset, whereas local outliers may fall within the normal range for the entire dataset, but outside the normal range for the surrounding data points. 
  • 2.1K
  • 07 Feb 2021
Topic Review
Lemniscatic Elliptic Function
In mathematics, a lemniscatic elliptic function is an elliptic function related to the arc length of a lemniscate of Bernoulli studied by Giulio Carlo de' Toschi di Fagnano in 1718. It has a square period lattice and is closely related to the Weierstrass elliptic function when the Weierstrass invariants satisfy g2 = 1 and g3 = 0. In the lemniscatic case, the minimal half period ω1 is real and equal to where Γ is the gamma function. The second smallest half period is pure imaginary and equal to iω1. In more algebraic terms, the period lattice is a real multiple of the Gaussian integers. The constants e1, e2, and e3 are given by The case g2 = a, g3 = 0 may be handled by a scaling transformation. However, this may involve complex numbers. If it is desired to remain within real numbers, there are two cases to consider: a > 0 and a < 0. The period parallelogram is either a square or a rhombus.
  • 2.1K
  • 24 Oct 2022
Topic Review
Visual Basic
User:RMCD bot/subject notice Visual Basic (also referred to as Classic Visual Basic) is a third-generation event-driven programming language from Microsoft known for its Component Object Model (COM) programming model first released in 1991 and declared legacy during 2008. Microsoft intended Visual Basic to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. A programmer can create an application using the components provided by the Visual Basic program itself. Over time the community of programmers developed third-party components. Programs written in Visual Basic can also make use of the Windows API, which requires external functions declarations. The final release was version 6 in 1998 (now known simply as Visual Basic). On April 8, 2008, Microsoft stopped supporting Visual Basic 6.0 IDE. The Microsoft Visual Basic team still maintains compatibility for Visual Basic 6.0 applications through its "It Just Works" program on supported Windows operating systems. In 2014, some software developers still preferred Visual Basic 6.0 over its successor, Visual Basic .NET. In 2014 some developers lobbied for a new version of the VB6 programming environment. In 2016, Visual Basic 6.0 won the technical impact award at The 19th Annual D.I.C.E. Awards. Visual Basic 6.0 was selected as the most dreaded programming language by respondents of Stack Overflow's annual developer survey in 2016, 2017, and 2018. A dialect of Visual Basic, Visual Basic for Applications (VBA), is used as a macro or scripting language within several Microsoft and ISV applications, including Microsoft Office.
  • 2.1K
  • 17 Nov 2022
Topic Review
Storm Botnet
The Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware) was a remotely controlled network of "zombie" computers (or "botnet") that had been linked by the Storm Worm, a Trojan horse spread through e-mail spam. At its height in September 2007, the Storm botnet was running on anywhere from 1 million to 50 million computer systems, and accounted for 8% of all malware on Microsoft Windows computers. It was first identified around January 2007, having been distributed by email with subjects such as "230 dead as storm batters Europe," giving it its well-known name. The botnet began to decline in late 2007, and by mid-2008 had been reduced to infecting about 85,000 computers, far less than it had infected a year earlier. As of December 2012, the original creators of Storm have not been found. The Storm botnet has displayed defensive behaviors that indicated that its controllers were actively protecting the botnet against attempts at tracking and disabling it, by specifically attacking the online operations of some security vendors and researchers who had attempted to investigate it. Security expert Joe Stewart revealed that in late 2007, the operators of the botnet began to further decentralize their operations, in possible plans to sell portions of the Storm botnet to other operators. It was reportedly powerful enough to force entire countries off the Internet, and was estimated to be capable of executing more instructions per second than some of the world's top supercomputers. The United States Federal Bureau of Investigation considered the botnet a major risk to increased bank fraud, identity theft, and other cybercrimes.
  • 2.1K
  • 11 Oct 2022
Topic Review
Google Data Centers
Google Data Centers are the large data center facilities Google uses to provide their services, which combine large drives, computer nodes organized in aisles of racks, internal and external networking, environmental controls (mainly cooling and dehumidification), and operations software (especially as concerns load balancing and fault tolerance). There is no official data on how many servers are in Google data centers, but Gartner estimated in a July 2016 report that Google at the time had 2.5 million servers. This number is changing as the company expands capacity and refreshes its hardware.
  • 2.1K
  • 11 Nov 2022
  • Page
  • of
  • 47
ScholarVision Creations