Topic Review
Internet of Things (IoT)
The Internet of Things (IoT) is an extensive network of heterogeneous devices that provides an array of innovative applications and services. IoT networks enable the integration of data and services to seamlessly interconnect the cyber and physical systems.
  • 1.2K
  • 18 Feb 2022
Topic Review
PDP-10
Digital Equipment Corporation (DEC)'s PDP-10, later marketed as the DECsystem-10, is a mainframe computer family manufactured beginning in 1966 and discontinued in 1983. 1970s models and beyond were marketed under the DECsystem-10 name, especially as the TOPS-10 operating system became widely used. The PDP-10's architecture is almost identical to that of DEC's earlier PDP-6, sharing the same 36-bit word length and slightly extending the instruction set (but with improved hardware implementation). Some aspects of the instruction set are unusual, most notably the byte instructions, which operate on bit fields of any size from 1 to 36 bits inclusive, according to the general definition of a byte as a contiguous sequence of a fixed number of bits. The PDP-10 was found in many university computing facilities and research labs during the 1970s, the most notable being Harvard University's Aiken Computation Laboratory, MIT's AI Lab and Project MAC, Stanford's SAIL, Computer Center Corporation (CCC), ETH (ZIR), and Carnegie Mellon University. Its main operating systems, TOPS-10 and TENEX, were used to build out the early ARPANET. For these reasons, the PDP-10 looms large in early hacker folklore. Projects to extend the PDP-10 line were eclipsed by the success of the unrelated VAX superminicomputer, and the cancellation of the PDP-10 line was announced in 1983. By late 1980 DEC reportedly had sold "about 1500 DECsystem-10s."
  • 1.2K
  • 04 Nov 2022
Topic Review
Effect of Surjection on Inheritance
Consider a biological evolutionary process.  We assume some (non-empty) finite set of offspring.  Assume each offspring is assigned as coming from a single set of parents in the previous generation.  There may be more than one offspring from each of set of parents.  This form of mathematical arrangement is called a surjection.   We have briefly described the mechanics of genetics; but we have also described much of mathematical anthropology.   The finding that a process is a surjection does not just describe the algebra, it also predicts important results.  If we have found an inheritance process is a surjection, then each of the offspring is unique, but all of the acts of parental pairs must occur through identical (including isomorphic) means of reproduction; in fact here they require mathematical groups.  We demonstrate from published surveys that all offspring are unique.  Mathematical groups occur in both applications, determining the choices behind parental actions.  The surjection requirements are met in genetics because the mathematics are determined by the mathematical groups determined by quantum mechanics.  In culture theory, similar (and in some cases, isomorphic) groups occur.  Quantum mechanics is usually discussed for very small objects with incredibly short process intervals.  Here, the intervals of reproduction are observable within normal human perception, and for human cultural systems require decades of time for one generation system to be replaced by another.  In genetics, counting of the number of offspring from each pair of “parents” is the actual number of offspring surviving from each pair to reproduce.  Each human culture has its own means of assigning offspring to parental pairs, which may include their surviving genetic offspring, but also may use culturally designated devices such as adoption.  Since surjection also requires that distributions might be forecasted using the Stirling Number of the Second Kind, that result allows culture theory to predict the numbers of offspring per assigned couple, and the percentage of adults engaging in that reproduction.  
  • 1.2K
  • 23 Dec 2020
Topic Review
Coverage Path Planning Methods Focusing on Energy Efficient
The coverage path planning (CPP) algorithms aim to cover the total area of interest with minimum overlapping. The goal of the CPP algorithms is to minimize the total covering path and execution time. Significant research has been done in robotics, particularly for multi-unmanned unmanned aerial vehicles (UAVs) cooperation and energy efficiency in CPP problems.
  • 1.2K
  • 10 Feb 2022
Topic Review
Blockchain Technology and Its Components
The Internet of Things (IoT) is a recent technology that uses smart connected systems to create a global network of physical devices that exchange and communicate data with each other. Blockchain is essentially a system for recording data that makes it much more difficult to change or hack. Blockchain uses a distributed networking system of machines that replicate and create a chain of data. This chain of data can be considered a ledger, with each of these becoming a block. This chain of data is turned into a block which is linked to the previous block creating a chain of blocks, hence the name blockchain.
  • 1.2K
  • 23 Jun 2022
Topic Review
Theoretical Background of Predictive Maintenance Models
Predictive Maintenance (PdM) is one of the most important applications of advanced data science in Industry 4.0, aiming to facilitate manufacturing processes. To build PdM models, sufficient data, such as condition monitoring and maintenance data of the industrial application, are required. Collecting maintenance data is complex and challenging as it requires human involvement and expertise. Due to time constraints, motivating workers to provide comprehensive labeled data is very challenging, and thus maintenance data are mostly incomplete or even completely missing. In addition to these aspects, a lot of condition monitoring data-sets exist, but only very few labeled small maintenance data-sets can be found.
  • 1.2K
  • 13 May 2022
Topic Review
Multiple Traveling Salesperson Problems
Multiple traveling salesperson problems (mTSP) are a collection of problems that generalize the classical traveling salesperson problem (TSP). In a nutshell, an mTSP variant seeks a minimum-cost collection of m paths that visit all vertices of a given weighted complete graph. Conceptually, mTSP lies between TSP and vehicle routing problems (VRP).
  • 1.2K
  • 20 Jul 2023
Topic Review
UCSC Genome Browser
The UCSC Genome Browser is an on-line, and downloadable, genome browser hosted by the University of California, Santa Cruz (UCSC). It is an interactive website offering access to genome sequence data from a variety of vertebrate and invertebrate species and major model organisms, integrated with a large collection of aligned annotations. The Browser is a graphical viewer optimized to support fast interactive performance and is an open-source, web-based tool suite built on top of a MySQL database for rapid visualization, examination, and querying of the data at many levels. The Genome Browser Database, browsing tools, downloadable data files, and documentation can all be found on the UCSC Genome Bioinformatics website.
  • 1.2K
  • 09 Oct 2022
Topic Review
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing. A 2 TBps attack was reported in mid-August 2020 directed towards critical infrastructure, such as finance, amidst the COVID-19 pandemic. It is estimated that these attacks will double, reaching over 15 million, in the next 2 years. A number of mitigation schemes have been designed and developed since its inception but the increasing complexity demands advanced solutions based on emerging technologies. Blockchain has emerged as a promising and viable technology for DDoS mitigation. The inherent and fundamental characteristics of blockchain such as decentralization, internal and external trustless attitude, immutability, integrity, anonymity and verifiability have proven to be strong candidates, in tackling this deadly cyber threat. This survey discusses different approaches for DDoS mitigation using blockchain in varied domains to date. The paper aims at providing a comprehensive review, highlighting all necessary details, strengths, challenges and limitations of different approaches. It is intended to serve as a single platform to understand the mechanics of current approaches to enhance research and development in the DDoS mitigation domain.
  • 1.2K
  • 07 Feb 2021
Topic Review
ArchiCAD
ARCHICAD is an architectural BIM CAD software for Macintosh and Windows developed by the Hungarian company Graphisoft. ARCHICAD offers computer aided solutions for handling all common aspects of aesthetics and engineering during the whole design process of the built environment — buildings, interiors, urban areas, etc. Development of ARCHICAD started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, ARCHICAD became regarded by some as the first implementation of BIM. ARCHICAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model. Today, it has over 120,000 users.
  • 1.2K
  • 11 Nov 2022
  • Page
  • of
  • 365
Video Production Service