Topic Review
Force4
Force4 is a development system and framework for the rapid development of rich Internet applications for the connection of databases to different presentation technologies. It integrates the creation and reverse engineering of database models, the creation of the necessary objects and access classes and the composing of Rich Internet Applications.
  • 496
  • 20 Oct 2022
Topic Review
Open VOGEL
OpenVOGEL is a collection of free open source computer packages intended for the simulation of aerodynamic problems through the Unsteady Vortex Lattice Method and first order singularity panels (vortex rings, flat doublet panels and flat source/sink panels). The project provides a main application (named Tucan) that integrates all the packages in an interactive and intuitive way for final users. However, any other library can be linked to an external project without the need of a graphical toolkit. A console application has also been developed to provide the same calculation capability as Tucan but without graphical interface. This program extends the service to Linux users, since it is able to run under the Mono runtime without recompilation. All libraries and applicatioms are fully developed in the .NET framework using Visual Studio Express and they are published under General Public License, GPLv3. The OpenVOGEL project comprises the next set of libraries (originally developed by Guillermo Hazebrouck): Additionally, the project relies in the next third party libraries: A feature of the Open VOGEL project is that users can add their own models to the library, and expand that way the general capabilities of the software or adapt it for a specific purpose. In that sense, the software acts as a basic framework for research applications. Any university, research group or individual in the world is authorized to take the source code, modify it and release it under GPLv3 for further use in the aeronautical community. The idea behind this experimental way of working is that those who use the software for practical applications can directly benefit from what researchers are achieving, so that their results can be directly put into practice.
  • 496
  • 10 Nov 2022
Topic Review
Self-Supervised Learning (SSL) in Deep Learning Contexts
Self-supervised learning (SSL) is a potential deep learning (DL) technique that uses massive volumes of unlabeled data to train neural networks. SSL techniques have evolved in response to the poor classification performance of conventional and even modern machine learning (ML) and DL models of enormous unlabeled data produced periodically in different disciplines. However, the literature does not fully address SSL’s practicalities and workabilities necessary for industrial engineering and medicine. Accordingly, this thorough review is administered to identify these prominent possibilities for prediction, focusing on industrial and medical fields. This extensive survey, with its pivotal outcomes, could support industrial engineers and medical personnel in efficiently predicting machinery faults and patients’ ailments without referring to traditional numerical models that require massive computational budgets, time, storage, and effort for data annotation. 
  • 496
  • 18 Mar 2024
Topic Review
Cross-Institutional Credit Transfer Information System
Credit transfer information systems in higher education are not well studied. This entry demonstrates the prototype development of a cross-institutional credit transfer information system (CICIS) for community college transfer (i.e., vertical transfer) students in an Asian educational context. It exhibits credit transfer guidelines and past credit transfer records to enhance the transparency and sustainability of credit transfer information and to facilitate the transfer process of prospective community college transfer students. It also ensures the sustainability of credit transfer information and its application. The four-phase life cycle of the prototyping model was adopted to guide the study.
  • 495
  • 27 Aug 2021
Topic Review
MIDI 1.0
The Musical Instrument Digital Interface (MIDI) specification version 1.0 describes the communications protocol and the message format, as well electrical connector. MIDI 1.0 is a one-way connection from the MIDI Out connector of the sending device to the MIDI In connector of the receiving device, transmitted serially at a rate of 31.25 kbit/s.
  • 495
  • 15 Nov 2022
Topic Review Peer Reviewed
Safeguarding Traditional Crafts in Europe
This entry discusses the challenge of safeguarding crafts in Europe. Safeguarding is defined herein as the systematic process of understanding, representing, preserving, and valorizing crafts following the recommendations of UNESCO and the UN-World Tourism Organization. The abovementioned challenges are discussed through a multidisciplinary prism starting from the scientific challenges in the information and communication technologies sector and expanding the discussion to ethical, legal, and policy-making measures and recommendations to safeguard crafts as a form of tangible and intangible cultural heritage but also as a source of growth and impact for the communities that practice them. To this end, the role of education and training for craft preservation is discussed, considering that the declining number of practitioners and apprentices is considered today the main threat to their preservation.
  • 495
  • 11 Oct 2023
Topic Review
AI-Based Conversational Large Language Models
The demand for psychological counselling has grown significantly in recent years, particularly with the global outbreak of COVID-19, which heightened the need for timely and professional mental health support. Online psychological counselling emerged as the predominant mode of providing services in response to this demand. The Psy-LLM framework, an AI-based assistive tool leveraging large language models (LLMs) for question answering in psychological consultation settings to ease the demand on mental health professions.
  • 495
  • 02 Jan 2024
Topic Review
IoT Blockchain-based Applications Classification According to Performance Requirements
A Distributed Ledger Technology (DLT) is a decentralized log of records, the ledger, managed by multiple, usually autonomous, participants (also called users or subjects), across multiple nodes. A blockchain is a type of DLT where transactions are recorded according to an immutable order obtained by means of cryptographic hash functions that chain the blocks in which transactions are recorded. Since DLT gained attention through the diffusion of the blockchain, it is common practice to use the term blockchain even when talking about other types of DLT.
  • 493
  • 08 Jun 2022
Topic Review
Agent-Based Model in Biology
Agent-based models have many applications in biology, primarily due to the characteristics of the modeling method. Agent-based modeling is a rule-based, computational modeling methodology that focuses on rules and interactions among the individual components or the agents of the system. The goal of this modeling method is to generate populations of the system components of interest and simulate their interactions in a virtual world. Agent-based models start with rules for behavior and seek to reconstruct, through computational instantiation of those behavioral rules, the observed patterns of behavior.
  • 493
  • 24 Oct 2022
Topic Review
Deception Technology
Deception technology is a category of cyber security defense. Deception technology products can detect, analyze, and defend against zero-day and advanced attacks, often in real time. They are automated, accurate, and provide insight into malicious activity within internal networks which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations. Existing defense-in-depth cyber technologies have struggled against the increasing wave of sophisticated and persistent human attackers. These technologies seek primarily to defend a perimeter, but both firewalls and endpoint security cannot defend a perimeter with 100% certainty. Cyber-attackers can penetrate these networks and move unimpeded for months, stealing data and intellectual property. Heuristics may find an attacker within the network, but often generate so many alerts that critical alerts are missed. Since 2014, attacks have accelerated and there is evidence that cyber-attackers are penetrating traditional defenses at a rapidly increasing rate. Deception technology considers the human attacker's point of view and method for exploiting and navigating networks to identify and exfiltrate data. It integrates with existing technologies to provide new visibility into the internal networks, share high probability alerts and threat intelligence with the existing infrastructure.
  • 493
  • 10 Nov 2022
  • Page
  • of
  • 366
ScholarVision Creations