Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
GameMaker Studio
GameMaker Studio (formerly Animo until 1999, Game Maker until 2011, GameMaker until 2012, and GameMaker: Studio until 2017) is a cross-platform game engine developed by YoYo Games. GameMaker accommodates the creation of cross-platform and multi-genre video games using a custom drag-and-drop visual programming language or a scripting language known as Game Maker Language, which can be used to develop more advanced games that could not be created just by using the drag and drop features. GameMaker was originally designed to allow novice computer programmers to be able to make computer games without much programming knowledge by use of these actions. Recent versions of software also focus on appealing to advanced developers.
2.1K
24 Oct 2022
Topic Review
CHCP (DOS Command)
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
2.1K
30 Nov 2022
Topic Review
Tangential Quadrilateral
In Euclidean geometry, a tangential quadrilateral (sometimes just tangent quadrilateral) or circumscribed quadrilateral is a convex quadrilateral whose sides all can be tangent to a single circle within the quadrilateral. This circle is called the incircle of the quadrilateral or its inscribed circle, its center is the incenter and its radius is called the inradius. Since these quadrilaterals can be drawn surrounding or circumscribing their incircles, they have also been called circumscribable quadrilaterals, circumscribing quadrilaterals, and circumscriptible quadrilaterals. Tangential quadrilaterals are a special case of tangential polygons. Other less frequently used names for this class of quadrilaterals are inscriptable quadrilateral, inscriptible quadrilateral, inscribable quadrilateral, circumcyclic quadrilateral, and co-cyclic quadrilateral. Due to the risk of confusion with a quadrilateral that has a circumcircle, which is called a cyclic quadrilateral or inscribed quadrilateral, it is preferable not to use any of the last five names. All triangles can have an incircle, but not all quadrilaterals do. An example of a quadrilateral that cannot be tangential is a non-square rectangle. The section characterizations below states what necessary and sufficient conditions a quadrilateral must satisfy to be able to have an incircle.
2.1K
09 Oct 2022
Topic Review
Turn (Geometry)
A turn is a unit of plane angle measurement equal to 2π radians, 360 degrees or 400 gradians. A turn is also referred to as a cycle (abbreviated cyc), revolution (abbreviated rev), complete rotation (abbreviated rot) or full circle. Subdivisions of a turn include half turns, quarter turns, centiturns, milliturns, points, etc.
2.1K
22 Nov 2022
Topic Review
Calibre
Calibre (/ˈkælɪbər/, stylised calibre) is a cross-platform free and open-source suite of e-book software. Calibre supports organizing existing e-books into virtual libraries, displaying, editing, creating and converting e-books, as well as syncing e-books with a variety of e-readers. Editing books is supported for EPUB and AZW3 formats. Books in other formats like MOBI must first be converted to those formats, if they are to be edited.
2.1K
20 Oct 2022
Topic Review
Multiple Attribute-based Decision-making Models
Sustainability of agricultural practices depends on economic, environmental, and social conditions. The Rajasthan state of India has arid climatic conditions where kharif crops are commonly grown. In this work, the four major criteria are considered such as the farm area, crop yield per unit area, the cost prices, and the market sales price. Merged analytic hierarchy process (AHP) and entropy techniques have been employed to give reasonable weight coefficients for the objective and subjective weights to each criterion. Multiple attribute-based decision-making models (MADM) have been developed using three proven techniques, namely the Exprom2, the technique for order of preference by similarity to ideal solution (TOPSIS), and the VlseKriterijumska Optimizacija I KompromisnoResenje (VIKOR). The crop Pennisetum glaucum emerged as the most productive kharif crop in the arid climatic conditions of Rajasthan, India under the given criteria. The sensitivity analysis of the three methods identifies the most significant criteria and validates that Pennisetum glaucum is the first ranked crop despite the interchange of the weights. The methodology used in this study may be applied across the globe to select appropriate crops for maximizing the profit, optimizing the natural resources, and promoting sustainable agricultural practices. This study may be used to enhance the agricultural gross domestic product (GDP) to make the agriculturalists self-sufficient and to help the state policymakers in making elective regional policies.
2.1K
05 Nov 2020
Topic Review
List of DOS Commands
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
2.0K
14 Oct 2022
Topic Review
Moshi Monsters
Moshi Monsters is a British website aimed at children aged 6-12, with over 80 million registered users in 150 territories worldwide. Users choose from one of six virtual pet monsters (Diavlo, Luvli, Katsuma, Poppet, Furi and Zommer) they can create, name and nurture. Once their pet has been customized, players can navigate their way around Monstro City, take daily puzzle challenges to earn 'Rox' (a virtual currency), play games, personalize their room and communicate with other users in a safe environment (most of the time). Following its online success, Moshi Monsters has expanded commercially with physical products, including toys, Moshi Monsters Magazine (the number-one selling kids' magazine in the UK in 2011), a best-selling DS video game, a number 4 music album, books, membership cards, bath soap, chocolate calendars, trading cards, figures of many Moshlings, mobile games, and a Moshi Monsters feature film. In December 2012, eight Moshi Monster toys were included in McDonald's Happy Meals in the United States and Canada.
2.0K
30 Nov 2022
Topic Review
Human Nutrition
Human nutrition deals with the provision of essential nutrients in food that are necessary to support human life and good health. Poor nutrition is a chronic problem often linked to poverty, food security, or a poor understanding of nutritional requirements. Malnutrition and its consequences are large contributors to deaths, physical deformities, and disabilities worldwide. Good nutrition is necessary for children to grow physically and mentally, and for normal human biological development.
2.0K
25 Oct 2022
Topic Review
Threat (Computer)
In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application. A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event. This is differentiated from a threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. A more comprehensive definition, tied to an Information assurance point of view, can be found in "Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" by NIST of United States Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability. National Information Assurance Glossary defines threat as: Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. ENISA gives a similar definition: Any circumstance or event with the potential to adversely impact an asset [G.3] through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. The Open Group defines threat as: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events,etc.); malicious actors; errors; failures. Factor analysis of information risk defines threat as: threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur. National Information Assurance Training and Education Center gives a more articulated definition of threat: The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i. e. , perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, <peril; asset category>, suggesting the nature of these occurrences but not the details (details are specific to events). 7. The potential violation of security. 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according to a body of knowledge).
2.0K
02 Nov 2022
Topic Review
Karhunen–Loève Theorem
In the theory of stochastic processes, the Karhunen–Loève theorem (named after Kari Karhunen and Michel Loève), also known as the Kosambi–Karhunen–Loève theorem is a representation of a stochastic process as an infinite linear combination of orthogonal functions, analogous to a Fourier series representation of a function on a bounded interval. The transformation is also known as Hotelling transform and eigenvector transform, and is closely related to principal component analysis (PCA) technique widely used in image processing and in data analysis in many fields. Stochastic processes given by infinite series of this form were first considered by Damodar Dharmananda Kosambi. There exist many such expansions of a stochastic process: if the process is indexed over [a, b], any orthonormal basis of L2([a, b]) yields an expansion thereof in that form. The importance of the Karhunen–Loève theorem is that it yields the best such basis in the sense that it minimizes the total mean squared error.
2.0K
08 Nov 2022
Topic Review
FreeNAS
FreeNAS is a free and open-source network-attached storage (NAS) operating system based on FreeBSD and the OpenZFS file system. It is licensed under the terms of the BSD License and runs on commodity x86-64 hardware. FreeNAS supports Windows, macOS and Unix clients and various virtualization hosts such as XenServer and VMware using the SMB, AFP, NFS, iSCSI, SSH, rsync and FTP/TFTP protocols. Advanced FreeNAS features include full-disk encryption and a plug-in architecture for third-party software.
2.0K
27 Oct 2022
Topic Review
Burnin' Rubber (Series)
Burnin' Rubber is a series of vehicular combat racing video games developed by Xform and published by various companies. The series has appeared on AirConsole, Android, Browser, IOS, and Microsoft Windows. The gameplay mainly focuses on the player having to beat a set of challenges ranging from races, boss battles, and time trials. Players can gain various pickups and collectables placed throughout tracks to aid them in the event and unlock new content. The series previous used Adobe Director and Adobe Shockwave Player for its games and has since migrated to Unity. Burnin' Rubber 3 was the first game in the series to introduce the addition of weapons in which the player can add to their vehicles which would become one of the game's main element moving forward. Excluding Burnin' Rubber (2007), the vehicles can receive damage or explode once critical damage levels has been surpassed. The series takes some inspiration from the Burnout series.
2.0K
26 Oct 2022
Topic Review
Bluetooth Low Energy Mesh Networks
Bluetooth Low Energy (BLE) is an increasingly prevalent Wireless Ad-Hoc Network (WAHN) technology for battery-powered Internet of Things (IoT) devices [1]. The BLE standard was introduced by the Bluetooth Special Interest Group (SIG) in Bluetooth version 4.0, and subsequently enhanced in versions 4.2 and 5. Initially, BLE 4.x adopted the legacy Bluetooth Personal Area Network (PAN) model for multi-hop communications and the interconnection of networks. BLE 5 intends to address these inadequacies via the implementation of pure mesh topology to provide enhanced network coverage, inter-network connectivity, and improved security [2].
2.0K
28 Oct 2020
Topic Review
Finale
Finale is the flagship program of a series of proprietary music notation software developed and released by MakeMusic for the Microsoft Windows and macOS operating systems. First released in 1988, version 26 was released in 2018. Finale has been regarded as one of the industry standards for music notation software. Finale is one of a number of types of software used by composers, songwriters and arrangers for creating sheet music, including the score for an entire ensemble (e.g., orchestra, concert band, big band, etc.) and parts for the individual musicians. A scorewriter is to music notation what a word processor is to text, in that they both allow fast corrections (via the "undo" button), flexible editing, easy sharing of content (via the Internet or compact storage media), and production of a clean, uniform layout. In addition, most scorewriters, including Finale, are able to use software-based synthesizers to "play" the sounds of the notated music and record the music—an especially useful feature for novice composers, when no musicians are readily available, or if a composer cannot afford to hire musicians. MakeMusic also offers several less expensive versions of Finale (currently available for Microsoft Windows only), which do not contain all of the main program's features. These include PrintMusic and a freeware program, Finale Notepad, which allows only rudimentary editing. Discontinued versions include Finale Guitar, Notepad Plus, Allegro, SongWriter, and the free Finale Reader.
2.0K
04 Nov 2022
Topic Review
Blood Flow Modeling
Blood flow modeling consists of using computational techniques to investigate the blood flow behavior in a rapid and accurate fashion. This has become an area of extensive research due to the prevalence of cardiovascular diseases, responsible for a critical number of deaths every year worldwide, most of which are associated with atherosclerosis, a disease that causes unusual hemodynamic conditions in arteries. In the present review, the application of computational simulations by using different physiological conditions of blood flow, several rheological models, and boundary conditions, were discussed.
2.0K
10 Apr 2021
Topic Review
History of the Portable Document Format (PDF)
The Portable Document Format was created in the early 1990s by Adobe Systems, introduced at the Windows and OS|2 Conference in January 1993 and remained a proprietary format until it was released as an open standard in 2008. Since then, it is under control of International Organization for Standardization Committee of volunteer industry experts. PDF was developed to share documents, including text formatting and inline images, among computer users of disparate platforms who may not have access to mutually-compatible application software.It was created by a research and developement team called Camelot, led by Adobe's co-founder John Warnock. PDF was one among a number of competing formats such as DjVu, Envoy, Common Ground Digital Paper, Farallon Replica and even Adobe's own PostScript format. In those early years before the rise of the World Wide Web and HTML documents, PDF was popular mainly in desktop publishing workflows. PDF's adoption in the early days of the format's history was slow. Adobe Acrobat, Adobe's suite for reading and creating PDF files, was not freely available; early versions of PDF had no support for external hyperlinks, reducing its usefulness on the Internet; the larger size of a PDF document compared to plain text required longer download times over the slower modems common at the time; and rendering PDF files was slow on the less powerful machines of the day. Adobe distributed its Adobe Reader (now Acrobat Reader) program free of charge from version 2.0 onwards, and continued supporting the original PDF, which eventually became the de facto standard for fixed-format electronic documents. In 2008 Adobe Systems' PDF Reference 1.7 became ISO 32000:1:2008. Thereafter, further development of PDF (including PDF 2.0) is conducted by ISO's TC 171 SC 2 WG 8 with the participation of Adobe Systems and other subject matter experts.
1.9K
14 Oct 2022
Topic Review
Transient Execution CPU Vulnerability
Transient execution CPU vulnerabilities are vulnerabilities in a computer system in which a speculative execution optimization implemented in a microprocessor is exploited to leak secret data to an unauthorized party. The classic example is Spectre that gave its name to this kind of side-channel attack, but since January 2018 many different vulnerabilities have been identified.
1.9K
14 Nov 2022
Topic Review
Historia Animalium (Gessner)
Historia animalium ("History of the Animals"), published at Zurich in 1551–58 and 1587, is an encyclopedic "inventory of renaissance zoology" by Conrad Gessner (1516–1565). Gessner was a medical doctor and professor at the Carolinum in Zürich, the precursor of the University of Zurich. The Historia animalium is the first modern zoological work that attempts to describe all the animals known, and the first bibliography of natural history writings. The five volumes of natural history of animals cover more than 4500 pages.
1.9K
22 Nov 2022
Topic Review
Born–Oppenheimer Approximation
In quantum chemistry and molecular physics, the Born–Oppenheimer (BO) approximation is the best-known mathematical approximation in molecular dynamics. Specifically, it is the assumption that the wave functions of atomic nuclei and electrons in a molecule can be treated separately, based on the fact that the nuclei are much heavier than the electrons. Due to the larger relative mass of a nucleus compared to an electron, the coordinates of the nuclei in a system are approximated as fixed, while the coordinates of the electrons are dynamic. The approach is named after Max Born and J. Robert Oppenheimer who proposed it in 1927, in the early period of quantum mechanics. The approximation is widely used in quantum chemistry to speed up the computation of molecular wavefunctions and other properties for large molecules. There are cases where the assumption of separable motion no longer holds, which make the approximation lose validity (it is said to "break down"), but even then the approximation is usually used as a starting point for more refined methods. In molecular infrared spectroscopy, using the BO approximation means considering molecular energy as a sum of independent terms, e.g.: [math]\displaystyle{ E_\text{total} = E_\text{electronic} + E_\text{vibrational} + E_\text{rotational} + E_\text{nuclear spin}. }[/math] These terms are of different orders of magnitude and the nuclear spin energy is so small that it is often omitted. The electronic energies [math]\displaystyle{ E_\text{electronic} }[/math] consist of kinetic energies, interelectronic repulsions, internuclear repulsions, and electron–nuclear attractions, which are the terms typically included when computing the electronic structure of molecules.
1.9K
16 Nov 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×