Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Hottest
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Type:
All
Topic Review
Biography
Topic Review
Magnus Expansion
In mathematics and physics, the Magnus expansion, named after Wilhelm Magnus (1907–1990), provides an exponential representation of the solution of a first-order homogeneous linear differential equation for a linear operator. In particular, it furnishes the fundamental matrix of a system of linear ordinary differential equations of order n with varying coefficients. The exponent is aggregated as an infinite series, whose terms involve multiple integrals and nested commutators.
455
21 Oct 2022
Topic Review
The Methods of Fall Detection
Falls by an older person are a significant public health issue because they can result in disabling fractures and cause severe psychological problems that diminish a person’s level of independence. Falls can be fatal, particularly for the elderly. Fall Detection Systems (FDS) are automated systems designed to detect falls experienced by older adults or individuals. Early or real-time detection of falls may reduce the risk of major problems.
455
09 Jun 2023
Topic Review
Ensemble Learning
Machine learning models are used to create and enhance various disease prediction frameworks. Ensemble learning is a machine learning technique that combines multiple classifiers to improve performance by making more accurate predictions than a single classifier. Although numerous studies have employed ensemble approaches for disease prediction, there is a lack of thorough assessment of commonly used ensemble approaches against highly researched diseases.
455
29 Jun 2023
Topic Review
Conflict Prediction in Sub-Saharan Africa
This entry offers policymakers and researchers pragmatic and sustainable approaches to identify and mitigate conflict threats by looking beyond p-values and plausible instruments. We argue that predicting conflict successfully depends on the choice of algorithms, which, if chosen accurately, can reduce economic and social instabilities caused by post-conflict reconstruction. After collating data with variables linked to conflict, we used a grid level dataset of 5928 observations spanning 48 countries across sub-Saharan Africa to predict civil conflict. The goals of the study were to assess the performance of supervised classification machine learning (ML) algorithms in comparison with logistic model, assess the implication of selecting a specific performance metric on policy initiatives, and evaluate the value of interpretability of the selected model. After comparing class imbalance resampling methods, the synthetic minority over-sampling technique (SMOTE) was employed to improve out-of-sample prediction for the trained model. The results indicate that if our selected performance metric is recall, gradient tree boosting is the best algorithm; however, if precision or F1 score is the selected metric, then the multilayer perceptron algorithm produces the best model.
454
09 Jul 2021
Topic Review
DOLLx8
Digital One Line Link (DOLLx8) is a technology architecture that consists of data communication protocol, synchronous serial data bus and a communication system for embedded systems and electronics. DOLLx8 use ASCII characters in its data protocol, differential signaling in the bus system, where the communication consists of an active long-distance technology based on system logic where handling of the communication is done automatically by the microcontroller and its internal embedded Real-time operating system (RTOS) and software. A traditional local area network (LAN) is based on Ethernet, a network system used in personal computers where one PC is able to talk to another PCs. In embedded systems, RS-232 TTL (Transistor-Transistor Logic) has dominated the market over a longer period of time as the most common communication standard that also works as an internal embedded network system. With the use of MAX 232 integrated circuit (IC), the RS-232 TTL may connect to an external RS-232 connection where the immediate advantage of using MAX 232 is that there is no need of using positive and negative power supply. It is also possible to connect to USB via RS-232 to USB converter, and even if the original standard for RS-232 was basically a point-to-point system for the serial port on PCs, it is still possible to use RS-232 in small local area network using micro-controller and source code to control the signals and data transmission. A DOLLx8 embedded network uses its own specific interface system named DOLLx8 Dataport that via DOLLx8 eMaster unit connects to external RS-232 and from there to USB directly, but requires the installation of a separate DOLLx8 driver. DOLLx8 runs on its own internal clock system that allows the DOLLx8 Dataport bus speed to be independent of the RS-232 baud speed set on the PC side, and can thus be determined by the user. With DOLLx8, USB works as a virtual communication port and can be set to a maximum speed of 128,000 kbps.
454
20 Oct 2022
Topic Review
Facebook Messenger Rooms
Facebook Messenger (also known as Messenger) is an American messaging app and platform developed by Facebook, Inc. Originally developed as Facebook Chat in 2008, the company revamped its messaging service in 2010, and subsequently released standalone iOS and Android apps in August 2011 and standalone Facebook Portal hardware for Messenger-based calling in Q4 2018. Later on, Facebook has launched a dedicated website interface (Messenger.com), and separated the messaging functionality from the main Facebook app, allowing users to use the web interface or download one of the standalone apps. In April 2020, Facebook officially released Messenger for Desktop, which is supported on Windows 10 and macOS and distributed on Microsoft Store and App Store respectively. Users can send messages and exchange photos, videos, stickers, audio, and files, as well as react to other users' messages and interact with bots. The service also supports voice and video calling. The standalone apps support using multiple accounts, conversations with optional end-to-end encryption, and playing games.
454
31 Oct 2022
Topic Review
Conservation and Restoration OpenLab
Open laboratories (OpenLabs) in Cultural Heritage institutions are an effective way to provide visibility into the behind-the-scenes processes and promote documentation data collected and produced by domain specialists. Cultural Heritage (CH) institutions have been adopting new practices to improve their services and meet the preferences and needs of potential audiences. One such practice is the transformation of conservation and restoration (CnR) laboratories into OpenLabs, which allow visitors to see the various processes that take place “behind the scenes” .
454
19 May 2023
Topic Review
Enhancing Social Media Platforms with Machine Learning
Network analysis aids management in reducing overall expenditures and maintenance workload. Social media platforms frequently use neural networks to suggest material that corresponds with user preferences. Machine learning is one of many methods for social network analysis. Machine learning algorithms operate on a collection of observable features that are taken from user data. Machine learning and neural network-based systems represent a topic of study that spans several fields. Computers can now recognize the emotions behind particular content uploaded by users to social media networks thanks to machine learning.
454
19 Jun 2023
Topic Review
Transformer Framework and YOLO Framework for Object Detection
Object detection for remote sensing is a fundamental task in image processing of remote sensing; as one of the core components, small or tiny object detection plays an important role.
454
25 Aug 2023
Topic Review
A Generative Adversarial Network Technique for Ransomware Behavior Prediction
The ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique attack patterns for each new target, particularly in the pre-encryption phase where evasiveness is prioritized.
454
30 Oct 2023
Page
of
366
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Michael McAleer
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×