Topic Review
Global Buddhist Network
The Global Buddhist Network (GBN), previously known as the Dhammakaya Media Channel (DMC) is a Thai online television channel concerned with Buddhism. The channel's taglines were "The secrets of life revealed" and "The only one", but these were later replaced by "Channel for the path to the cessation of suffering and attainment of Dhamma". The channel features many types of programs with Buddhist content, and has programs in several languages. The channel started in 2002, as a means to reach remote provinces in Thailand. Controversially, the channel made international headlines in 2012 when it featured a teaching on the afterlife of Steve Jobs. On 26 December 2016, Thai authorities withdrew the permit for the satellite channel permanently, during the legal investigations into the temple by the Thai junta. In April 2017, it was reported, however, that the channel's programming had continued, but broadcast through the Internet only. In its online format, the channel has been renamed Global Buddhist Network.
  • 646
  • 03 Nov 2022
Topic Review
3D Object Detection with Differential Point Clouds
3D object detection based on point clouds has many applications in natural scenes, especially in autonomous driving. Point cloud data provide reliable geometric and depth information. 
  • 645
  • 24 Dec 2022
Topic Review
Kune
Kune is a free/open source distributed social network focused on collaboration rather than just on communication. That is, it focuses on online real-time collaborative editing, decentralized social networking and web publishing, while focusing on workgroups rather than just on individuals. It aims to allow for the creation of online spaces for collaborative work where organizations and individuals can build projects online, coordinate common agendas, set up virtual meetings, publish on the web, and join organizations with similar interests. It has a special focus on Free Culture and social movements needs. Kune is a project of the Comunes Collective.
  • 645
  • 31 Oct 2022
Topic Review
Database Administration and Automation
Database administration is the function of managing and maintaining database management systems (DBMS) software. Mainstream DBMS software such as Oracle, IBM DB2 and Microsoft SQL Server need ongoing management. As such, corporations that use DBMS software often hire specialized information technology personnel called Database Administrators or DBAs.
  • 644
  • 17 Oct 2022
Topic Review
Monocular Depth Estimation with Deep Learning
Significant advancements in robotics engineering and autonomous vehicles have improved the requirement for precise depth measurements. Depth estimation (DE) is a traditional task in computer vision that can be appropriately predicted by applying numerous procedures.  This is vital in disparate applications such as augmented reality and target tracking. Conventional monocular DE (MDE) procedures are based on depth cues for depth prediction. Various deep learning techniques have demonstrated their potential applications in managing and supporting the traditional ill-posed problem.
  • 644
  • 12 Aug 2022
Topic Review
NS320xx
The NS32000, sometimes known as the 32k, is a series of microprocessors produced by National Semiconductor. The first member of the family, the 32016, came to market in 1982, making it the first 32-bit general-purpose microprocessor on the market. However, the 32016 contained a large number of bugs and often could not be run at its rated speed. These problems, and the presence of the similar Motorola 68000, led to almost no use in the market. Several improved versions followed, including 1985's 32032 which was essentially a bug-fixed 32016 with an external 32-bit data bus possible due to improvements in chip carriers that were becoming common in the market. However, it offered only about 50% better speed than the 32016, and was outperformed by the 32-bit Motorola 68020, released a year prior. The 32532, released in 1987, outperformed the competing Motorola 68030 by almost two times, but by this time most interest in microprocessors had turned to RISC platforms and this otherwise excellent design saw almost no use as well. National was working on further improvements in the 32732, but eventually gave up attempting to compete in the central processing unit (CPU) space. Instead, the basic 32000 architecture was combined with several support systems and relaunched as the Swordfish microcontroller. This had some success in the market before it was replaced by the CompactRISC architecture in mid-1990s.
  • 644
  • 21 Nov 2022
Topic Review
Panjab Digital Library
The Panjab Digital Library is a voluntary organization digitizing and preserving the cultural heritage of Panjab since 2003. With over 45 million digitized pages, it is the biggest resource of digital material on Panjab. There are many historically significant documents stored and made available online. Its scope covers Sikh and Punjabi culture. The library funded by The Nanakshahi Trust was launched online in August 2009. Its base office is located at Chandigarh, India. The library's mission is to locate, digitize, preserve, collect and make accessible the accumulated wisdom of the Panjab region, without distinction as to script, language, religion, nationality, or other physical condition.
  • 644
  • 03 Nov 2022
Topic Review
Health Risk Assessment
A health risk assessment (also referred to as a health risk appraisal and health & well-being assessment) is a questionnaire about a person's medical history, demographic characteristics and lifestyle. It is one of the most widely used screening tools in the field of health promotion and is often the first step in multi-component health promotion programs.
  • 643
  • 07 Nov 2022
Topic Review
Trusted System
In the security engineering subspecialty of computer science, a trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system is one whose failure would break a security policy (if a policy exists that the system is trusted to enforce). The word "trust" is critical, as it does not carry the meaning that might be expected in everyday usage. A trusted system is one that the user feels safe to use, and trusts to perform tasks without secretly executing harmful or unauthorized programs; trusted computing refers to whether programs can trust the platform to be unmodified from the expected, and whether or not those programs are innocent ormalicious or whether they execute tasks that are undesired by the user. A trusted system can also be seen as a level-based security system where protection is provided and handle]]d according to different levels. This is commonly found in the military, where information is categorized as unclassified (U), confidential (C), Secret (S), Top secret (TS), and beyond. These also enforce the policies of no read-up and no write-down.
  • 643
  • 28 Sep 2022
Topic Review
Epileptic seizures and deep learning
Chronic diseases are growing exponentially. Today, there are over 900 million individuals suffering with some chronic diseases around the world. For this reason, e-health systems are being developed to design a better quality of life for patients. For instance, we have systems for detection of epilepsy, monitoring of vital signs, control of diabetes, among others. Deep learning has being an important technique embedded in these systems to predict and sort the data without the need of a 24-hour monitoring specialist. However, by combining e-health systems and deep learning techniques also brings several challenges that need to be overcome. 
  • 643
  • 05 Nov 2022
  • Page
  • of
  • 366
ScholarVision Creations