Topic Review
Magnus Expansion
In mathematics and physics, the Magnus expansion, named after Wilhelm Magnus (1907–1990), provides an exponential representation of the solution of a first-order homogeneous linear differential equation for a linear operator. In particular, it furnishes the fundamental matrix of a system of linear ordinary differential equations of order n with varying coefficients. The exponent is aggregated as an infinite series, whose terms involve multiple integrals and nested commutators.
  • 455
  • 21 Oct 2022
Topic Review
The Methods of Fall Detection
Falls by an older person are a significant public health issue because they can result in disabling fractures and cause severe psychological problems that diminish a person’s level of independence. Falls can be fatal, particularly for the elderly. Fall Detection Systems (FDS) are automated systems designed to detect falls experienced by older adults or individuals. Early or real-time detection of falls may reduce the risk of major problems.
  • 455
  • 09 Jun 2023
Topic Review
Ensemble Learning
Machine learning models are used to create and enhance various disease prediction frameworks. Ensemble learning is a machine learning technique that combines multiple classifiers to improve performance by making more accurate predictions than a single classifier. Although numerous studies have employed ensemble approaches for disease prediction, there is a lack of thorough assessment of commonly used ensemble approaches against highly researched diseases. 
  • 455
  • 29 Jun 2023
Topic Review
Conflict Prediction in Sub-Saharan Africa
This entry offers policymakers and researchers pragmatic and sustainable approaches to identify and mitigate conflict threats by looking beyond p-values and plausible instruments. We argue that predicting conflict successfully depends on the choice of algorithms, which, if chosen accurately, can reduce economic and social instabilities caused by post-conflict reconstruction. After collating data with variables linked to conflict, we used a grid level dataset of 5928 observations spanning 48 countries across sub-Saharan Africa to predict civil conflict. The goals of the study were to assess the performance of supervised classification machine learning (ML) algorithms in comparison with logistic model, assess the implication of selecting a specific performance metric on policy initiatives, and evaluate the value of interpretability of the selected model. After comparing class imbalance resampling methods, the synthetic minority over-sampling technique (SMOTE) was employed to improve out-of-sample prediction for the trained model. The results indicate that if our selected performance metric is recall, gradient tree boosting is the best algorithm; however, if precision or F1 score is the selected metric, then the multilayer perceptron algorithm produces the best model. 
  • 454
  • 09 Jul 2021
Topic Review
DOLLx8
Digital One Line Link (DOLLx8) is a technology architecture that consists of data communication protocol, synchronous serial data bus and a communication system for embedded systems and electronics. DOLLx8 use ASCII characters in its data protocol, differential signaling in the bus system, where the communication consists of an active long-distance technology based on system logic where handling of the communication is done automatically by the microcontroller and its internal embedded Real-time operating system (RTOS) and software. A traditional local area network (LAN) is based on Ethernet, a network system used in personal computers where one PC is able to talk to another PCs. In embedded systems, RS-232 TTL (Transistor-Transistor Logic) has dominated the market over a longer period of time as the most common communication standard that also works as an internal embedded network system. With the use of MAX 232 integrated circuit (IC), the RS-232 TTL may connect to an external RS-232 connection where the immediate advantage of using MAX 232 is that there is no need of using positive and negative power supply. It is also possible to connect to USB via RS-232 to USB converter, and even if the original standard for RS-232 was basically a point-to-point system for the serial port on PCs, it is still possible to use RS-232 in small local area network using micro-controller and source code to control the signals and data transmission. A DOLLx8 embedded network uses its own specific interface system named DOLLx8 Dataport that via DOLLx8 eMaster unit connects to external RS-232 and from there to USB directly, but requires the installation of a separate DOLLx8 driver. DOLLx8 runs on its own internal clock system that allows the DOLLx8 Dataport bus speed to be independent of the RS-232 baud speed set on the PC side, and can thus be determined by the user. With DOLLx8, USB works as a virtual communication port and can be set to a maximum speed of 128,000 kbps.
  • 454
  • 20 Oct 2022
Topic Review
Facebook Messenger Rooms
Facebook Messenger (also known as Messenger) is an American messaging app and platform developed by Facebook, Inc. Originally developed as Facebook Chat in 2008, the company revamped its messaging service in 2010, and subsequently released standalone iOS and Android apps in August 2011 and standalone Facebook Portal hardware for Messenger-based calling in Q4 2018. Later on, Facebook has launched a dedicated website interface (Messenger.com), and separated the messaging functionality from the main Facebook app, allowing users to use the web interface or download one of the standalone apps. In April 2020, Facebook officially released Messenger for Desktop, which is supported on Windows 10 and macOS and distributed on Microsoft Store and App Store respectively. Users can send messages and exchange photos, videos, stickers, audio, and files, as well as react to other users' messages and interact with bots. The service also supports voice and video calling. The standalone apps support using multiple accounts, conversations with optional end-to-end encryption, and playing games.
  • 454
  • 31 Oct 2022
Topic Review
Conservation and Restoration OpenLab
Open laboratories (OpenLabs) in Cultural Heritage institutions are an effective way to provide visibility into the behind-the-scenes processes and promote documentation data collected and produced by domain specialists. Cultural Heritage (CH) institutions have been adopting new practices to improve their services and meet the preferences and needs of potential audiences. One such practice is the transformation of conservation and restoration (CnR) laboratories into OpenLabs, which allow visitors to see the various processes that take place “behind the scenes” .
  • 454
  • 19 May 2023
Topic Review
Enhancing Social Media Platforms with Machine Learning
Network analysis aids management in reducing overall expenditures and maintenance workload. Social media platforms frequently use neural networks to suggest material that corresponds with user preferences. Machine learning is one of many methods for social network analysis. Machine learning algorithms operate on a collection of observable features that are taken from user data. Machine learning and neural network-based systems represent a topic of study that spans several fields. Computers can now recognize the emotions behind particular content uploaded by users to social media networks thanks to machine learning.
  • 454
  • 19 Jun 2023
Topic Review
Transformer Framework and YOLO Framework for Object Detection
Object detection for remote sensing is a fundamental task in image processing of remote sensing; as one of the core components, small or tiny object detection plays an important role. 
  • 454
  • 25 Aug 2023
Topic Review
A Generative Adversarial Network Technique for Ransomware Behavior Prediction
The ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique attack patterns for each new target, particularly in the pre-encryption phase where evasiveness is prioritized. 
  • 454
  • 30 Oct 2023
  • Page
  • of
  • 366
ScholarVision Creations