Topic Review
Non-Standard Calculus
In mathematics, non-standard calculus is the modern application of infinitesimals, in the sense of non-standard analysis, to infinitesimal calculus. It provides a rigorous justification that were previously considered merely heuristic. Nonrigourous calculations with infinitesimals were widely used before Karl Weierstrass sought to replace them with the (ε, δ)-definition of limit starting in the 1870s. (See history of calculus.) For almost one hundred years thereafter, mathematicians like Richard Courant viewed infinitesimals as being naive and vague or meaningless. Contrary to such views, Abraham Robinson showed in 1960 that infinitesimals are precise, clear, and meaningful, building upon work by Edwin Hewitt and Jerzy Łoś. According to Howard Keisler, "Robinson solved a three hundred year old problem by giving a precise treatment of infinitesimals. Robinson's achievement will probably rank as one of the major mathematical advances of the twentieth century."
  • 408
  • 27 Oct 2022
Topic Review
SYmbolic LinK (SYLK)
Symbolic Link (SYLK) is a Microsoft file format typically used to exchange data between applications, specifically spreadsheets. SYLK files conventionally have a .slk suffix. Composed of only displayable ANSI characters, it can be easily created and processed by other applications, such as databases. Microsoft does not publish a SYLK specification. Variants of the format are supported by Multiplan, Microsoft Excel, Microsoft Works, OpenOffice.org, and Gnumeric. The format was introduced in the 1980s and has not evolved since 1986. A commonly encountered (and spurious) 'occurrence' of the SYLK file happens when a comma-separated value (CSV) format is saved with an unquoted first field name of 'ID', that is the first two characters match the first two characters of the SYLK file format. Microsoft Excel (at least to Office 2016) will then emit misleading error messages relating to the format of the file, such as "The file you are trying to open, 'x.csv', is in a different format than specified by the file extension...". SYLK is known to cause security issues, as it allows an attacker to run arbitrary code, offers the opportunity to disguise the attack vector under the benign-looking appearance of a CSV file, and is still enabled by default on recent (2016) versions of Microsoft Excel.
  • 408
  • 01 Nov 2022
Topic Review
DrunkChain: Blockchain-Based IoT System
Traffic accidents present significant risks to human life, leading to a high number of fatalities and injuries. According to the World Health Organization’s 2022 worldwide status report on road safety, there were 27,582 deaths linked to traffic-related events, including 4448 fatalities at the collision scenes. Drunk driving is one of the leading causes contributing to the rising count of deadly accidents.
  • 408
  • 16 Jun 2023
Topic Review
Object Detection of Remote Sensing Image
Remote sensing image object detection tasks play a pivotal role in the realm of airborne and satellite remote sensing imagery, representing invaluable applications. Remote sensing technology has witnessed remarkable progress, enabling the capture of copious details that inherently reflect the contours, hues, textures, and other distinctive attributes of terrestrial targets. It has emerged as an indispensable avenue for acquiring comprehensive knowledge about the Earth’s surface. The primary objective of remote sensing image object detection is to precisely identify and locate objects of interest within the vast expanse of remote sensing images. This task finds extensive implementation across significant domains, including military reconnaissance, urban planning, environmental monitoring, soil science, and maritime vessel surveillance. With the incessant advancement of observational techniques, the availability of high-quality remote sensing image datasets, encompassing richer and more intricate information, has unlocked immense developmental potential for the ongoing pursuit of remote sensing image object detection.
  • 408
  • 23 Oct 2023
Topic Review
Counterfeit Attack Modes in Microelectronics
As the global supply chain grows more intricate and the prevalence of counterfeit components surges, it becomes paramount to verify the authenticity of electrical chips. The infiltration of counterfeit components, potentially finding their way into electronic equipment, raises concerns as workers contend with mounting client demands. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products.
  • 408
  • 15 Nov 2023
Topic Review
TRACE (Psycholinguistics)
TRACE is a connectionist model of speech perception, proposed by James McClelland and Jeffrey Elman in 1986. It is based on a structure called "the Trace," a dynamic processing structure made up of a network of units, which performs as the system's working memory as well as the perceptual processing mechanism. TRACE was made into a working computer program for running perceptual simulations. These simulations are predictions about how a human mind/brain processes speech sounds and words as they are heard in real time.
  • 407
  • 24 Oct 2022
Topic Review
4Th Dimension
4D (4th Dimension, or Silver Surfer, as it was known during early development) is a relational database management system and IDE developed by Laurent Ribardière. 4D was created in 1984 and had a slightly delayed public release for Macintosh in 1987 with its own programming language. The 4D product line has since expanded to an SQL back-end, integrated compiler, integration of PHP, and several productivity plug-ins and interfaces. Some of the plug-ins created by 4D include 4D Write (a word processor), 4D View (somewhat like a spreadsheet, but with extra functionality) and 4D Internet Commands (which allowed for the addition of Internet-related functionality to a database). There are also over 100 third-party plugins, free and commercial. 4D can also be used as a web server, to run compiled database applications. Today, 4D is published by the France company 4D SAS and has a sales, distribution and support presence in most major markets, with the United States, the United Kingdom, and France being the primary markets. The product is localized in more than a dozen languages.
  • 407
  • 02 Nov 2022
Topic Review
Human Mobility Prediction with Calibration for Noisy Trajectories
Human mobility prediction is a key task in smart cities to help improve urban management effectiveness. However, it remains challenging due to widespread intractable noises in large-scale mobility data. Based on previous research and the statistical analysis of real large-scale data, the researchers observe that there is heterogeneity in the quality of users’ trajectories, that is, the regularity and periodicity of one user's trajectories can be quite different from another. Inspired by this, the researchers propose a trajectory quality calibration framework for quantifying the quality of each trajectory and promoting high-quality training instances to calibrate the final prediction process. The main module of this approach is a calibration network that evaluates the quality of each user's trajectories by learning their similarity between them. It is designed to be model-independent and can be trained in an unsupervised manner. Finally, the mobility prediction model is trained with the instance-weighting strategy, which integrates quantified quality scores into the parameter updating process of the model. Experiments conducted on two citywide mobility datasets demonstrate the effectiveness of the approach when dealing with massive noisy trajectories in the real world.
  • 407
  • 11 Nov 2022
Topic Review
Children's Way
Children's Way is a non-profit organization that teaches children through an online program called Woogi World. Scott Dow is the founder and president of Children's Way. Some notable members of the advisory board for Children's Way include 2000 Olympic Gold Medalist Wrestler Rulon Gardner, entertainer and philanthropist Alan Osmond, and former U.S. Senator Jake Garn.
  • 407
  • 28 Nov 2022
Topic Review
Input Enhancement (Computer Science)
In computer science, input enhancement is the principle that processing a given input to a problem and altering it in a specific way will increase runtime efficiency or space efficiency, or both. The altered input is usually stored and accessed to simplify the problem. By exploiting the structure and properties of the inputs, input enhancement creates various speed-ups in the efficiency of the algorithm.
  • 407
  • 02 Dec 2022
  • Page
  • of
  • 366
ScholarVision Creations