Topic Review
Health Software
Medical software is any software item or system used within a medical context, such as reducing the paperwork, tracking patient activity.  standalone software used for diagnostic or therapeutic purposes; software embedded in a medical device (often referred to as "medical device software"); software that drives a medical device or determines how it is used; software that acts as an accessory to a medical device; software used in the design, production, and testing of a medical device; or software that provides quality control management of a medical device.
  • 777
  • 20 Oct 2022
Topic Review
MLT (Hacktivist)
MLT, real name Matt Telfer, is a former grey hat computer hacker and member of TeaMp0isoN. MLT was arrested in May 2012 in relation to his activities within TeaMp0isoN, a computer-hacking group which claimed responsibility for many high-profile attacks, including website defacements of the United Nations , Facebook, NATO, BlackBerry, T-Mobile USA and several other large sites in addition to high-profile denial-of-service attacks and leaks of confidential data.
  • 777
  • 18 Nov 2022
Topic Review
List of Fictional Colors
Fictional colors are the imaginary perceptions of colors that do not exist for humans. They may include colors as perceived by fictional aliens, or colors that are imagined to be perceptible by humans under imaginary circumstances, based on real or imaginary electromagnetic radiation or imaginary alternate forms of radiation.
  • 778
  • 27 Nov 2022
Topic Review
Yuktibhāṣā
Yuktibhāṣā (Malayalam: യുക്തിഭാഷ, lit. 'Rationale'), also known as Gaṇita-yukti-bhāṣā:xxi and Gaṇitanyāyasaṅgraha (Compendium of Astronomical Rationale), is a major treatise on mathematics and astronomy, written by the India n astronomer Jyesthadeva of the Kerala school of mathematics around 1530. The treatise, written in Malayalam, is a consolidation of the discoveries by Madhava of Sangamagrama, Nilakantha Somayaji, Parameshvara, Jyeshtadeva, Achyuta Pisharati, and other astronomer-mathematicians of the Kerala school. It also exists in a Sanskrit version, with unclear author and date, composed as a rough translation of the Malayalam original. The work contains proofs and derivations of the theorems that it presents. Modern historians used to assert, based on the works of Indian mathematics that first became available, that early Indian scholars in astronomy and computation lacked in proofs, but Yuktibhāṣā demonstrates otherwise. Some of its important topics include the infinite series expansions of functions; power series, including of π and π/4; trigonometric series of sine, cosine, and arctangent; Taylor series, including second and third order approximations of sine and cosine; radii, diameters and circumferences; and tests of convergence. Yuktibhāṣā mainly gives rationale for the results in Nilakantha's Tantra Samgraha. It is considered an early text on the ideas of calculus, predating Newton and Leibniz by centuries. The treatise was largely unnoticed outside India, as it was written in the local language of Malayalam. In modern times, due to wider international cooperation in mathematics, the wider world has taken notice of the work. For example, both Oxford University and the Royal Society of Great Britain have given attribution to pioneering mathematical theorems of Indian origin that predate their Western counterparts.
  • 776
  • 21 Nov 2022
Topic Review
Learning for Unmanned Ground Vehicles
The problem of autonomous navigation of a ground vehicle in unstructured environments is both challenging and crucial for the deployment of this type of vehicle in real-world applications. We present a review on the recent contributions in the roboticsliterature adopting learning-based methods to solve the problem of environment perception andinterpretation with the final aim of the autonomous context-aware navigation of ground vehicles inunstructured environments.
  • 776
  • 29 Apr 2021
Topic Review
Swarm Robotics
Swarm robotics is a dynamic research field that integrates two important concepts: Swarm Intelligence (SI) and Multi-Robotics System (MRS).
  • 775
  • 02 Jun 2022
Topic Review
Timeline of Computing 1950–79
This article presents a detailed timeline of events in the history of computing from 1950 to 1979. For narratives explaining the overall developments, see the History of computing.
  • 774
  • 17 Oct 2022
Topic Review
Toons Mag
Toons Mag is a cartoon magazine that offers a global online platform for publishing editorial cartoons, comics, caricatures, illustrations, and related news. It is a multilingual publication and organizer of an international cartoon contest and exhibitions. It was founded in 2009 by cartoonist Arifur Rahman, based in Drøbak, Norway.
  • 773
  • 24 Oct 2022
Topic Review
GSOAP
gSOAP is a C and C++ software development toolkit for SOAP/XML web services and generic XML data bindings. Given a set of C/C++ type declarations, the compiler-based gSOAP tools generate serialization routines in source code for efficient XML serialization of the specified C and C++ data structures. Serialization takes zero-copy overhead.
  • 773
  • 04 Nov 2022
Topic Review
Blockchain-Enabled Vehicular Ad Hoc Networks
Within the paradigm of distributed ledger technology (DLT), the communication models and practices for vehicular ad hoc networks (VANETs) have been revolutionized. VANETs introduce a network of self-organizing vehicles that act as mobile nodes. They confine the communication between vehicles and roadside units as V2V and V2R. They assists drivers in avoiding collisions, picking the shortest route on the basis of traffic optimization, identifying tolls and the nearest fuel stations, and in enhancing the safety of assets and lives. They facilitate the communication of vehicles across the network for real-time data transmission. They improve the road safety mechanism and provide instant alerts or information in order to concern the authorities in cases of emergency situations, such as rollovers, accidents, etc. The existing architecture of VANETs also exposes vulnerabilities, such as data sniffing, impersonation, and ransomware attacks.
  • 773
  • 07 Apr 2022
  • Page
  • of
  • 366
ScholarVision Creations