Topic Review
Efficient and Effective Rankings
In the simple words of Peter Drucker, efficiency is doing things right while effectiveness is doing the right things. Efficient and Effective Rankings are ranking classifications for Decision-Making Units (DMUs) based on a combination of the efficiency score (obtained by parametric or non-parametric Data Envelopment Analysis frontier estimations) with a multiple effectiveness measure (often obtained using a Multicriteria Decision Analysis). This study aims at providing a non-compensatory ranking classification combining Conditional Frontier Analysis with the PROMETHEE II methodology for the multidimensional efficiency and effectiveness analysis of Police. The results on Pernambuco (Brazil) Police departments offer interesting perspectives for public administrations concerning prioritizations of units based on the mitigation of resources and strategic objectives.
  • 1.0K
  • 30 Apr 2021
Topic Review
Associative Classification Method
Machine learning techniques are ever prevalent as datasets continue to grow daily. Associative classification (AC), which combines classification and association rule mining algorithms, plays an important role in understanding big datasets that generate a large number of rules. Clustering, on the other hand, can contribute by reducing the rule space to produce compact models. 
  • 1.0K
  • 20 Sep 2022
Topic Review
Converse (Logic)
In logic and mathematics, the converse of a categorical or implicational statement is the result of reversing its two constituent statements. For the implication P → Q, the converse is Q → P. For the categorical proposition All S are P, the converse is All P are S. Either way, the truth of the converse is generally independent from that of the original statement.
  • 1.0K
  • 27 Oct 2022
Topic Review
Intel Active Management Technology
Intel Active Management Technology (AMT) is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a microprocessor subsystem not exposed to the user, in order to monitor, maintain, update, upgrade and repair them. Out-of-band (OOB) or hardware-based management is different from software-based (or in-band) management and software management agents. Hardware-based management works at a different level from software applications, and uses a communication channel (through the TCP/IP stack) that is different from software-based communication (which is through the software stack in the operating system). Hardware-based management does not depend on the presence of an OS or locally installed management agent. Hardware-based management has been available on Intel/AMD based computers in the past, but it has largely been limited to auto-configuration using DHCP or BOOTP for dynamic IP address allocation and diskless workstations, as well as wake-on-LAN (WOL) for remotely powering on systems. AMT is not intended to be used by itself; it is intended to be used with a software management application. It gives a management application (and thus, the system administrator who uses it) access to the PC down the wire, in order to remotely do tasks that are difficult or sometimes impossible when working on a PC that does not have remote functionalities built into it. AMT is designed into a service processor located on the motherboard, and uses TLS-secured communication and strong encryption to provide additional security. AMT is built into PCs with Intel vPro technology and is based on the Intel Management Engine (ME). AMT has moved towards increasing support for DMTF Desktop and mobile Architecture for System Hardware (DASH) standards and AMT Release 5.1 and later releases are an implementation of DASH version 1.0/1.1 standards for out-of-band management. AMT provides similar functionality to IPMI, although AMT is designed for client computing systems as compared with the typically server-based IPMI. Currently, AMT is available in desktops, servers, ultrabooks, tablets, and laptops with Intel Core vPro processor family, including Intel Core i5, Core i7, Core i9 and Intel Xeon E3-1000, Xeon E, Xeon W-1000 product family. Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017. Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. Some manufacturers, like Purism and System76 are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).
  • 1.0K
  • 31 Oct 2022
Topic Review
Artificial Intelligence in Translational Medicine
Between preclinical and clinical research, translational research is benefitting from computer-based approaches like Artificial Intelligence, resulting in breakthroughs for advancing human health. 
  • 1.0K
  • 17 Dec 2021
Topic Review
Cyber-Physical System
Cyber-Physical System (CPS) is a symbol of the fourth industrial revolution (4IR) by integrating physical and computational processes which can associate with humans in various ways. In short, the relationship between Cyber networks and the physical component is known as CPS, which is assisting to incorporate the world and influencing our ordinary life significantly. In terms of practical utilization of CPS interacting abundant difficulties. CPS is involved in modern society very vastly with many uptrend perspectives. All the new technologies by using CPS are accelerating our journey of innovation. Researchers have explained the research areas of 14 important domains of Cyber-Physical Systems (CPS) including aircraft transportation systems, battlefield surveillance, chemical production, energy, agriculture (food supply), healthcare, education, industrial automation, manufacturing, mobile devices, robotics, transportation, and vehicular. 
  • 1.0K
  • 11 May 2023
Topic Review
Office Online
Office Online (known before 2014 as Office Web Apps and as of July 2019 as Office) is an online office suite offered by Microsoft, which allows users to create and edit files using lightweight Microsoft Office web apps: Word, Excel, PowerPoint and OneNote. The offering also includes Outlook.com, People, Calendar and OneDrive, all of which are accessible from a unified app switcher. Users can install the on-premises version of this service, called Office Online Server, in private clouds in conjunction with SharePoint, Microsoft Exchange Server and Microsoft Lync Server.
  • 1.0K
  • 25 Nov 2022
Topic Review
Persona Q: Shadow of the Labyrinth
Persona Q: Shadow of the Labyrinth is a role-playing video game developed by Atlus for the Nintendo 3DS . It is part of the Persona series, itself part of the larger Megami Tensei franchise. It was published across all territories in 2014: released in June in Japan, November in North America and Europe, and December in Australia. Atlus published the game in Japan and North America, while NIS America published it in the PAL region. The story of Persona Q is a crossover between Persona 3 and Persona 4, whose characters are drawn from their respective time periods by an unknown force and sent into a replica of Persona 4's Yasogami High School in another world. Meeting with Zen and Rei, two people whose memories were taken, the groups must unite and explore four labyrinths in the school to recover treasures hidden within. These treasures can restore Zen and Rei's memories which might help them find a way to escape. The gameplay fuses elements of the Persona and Etrian Odyssey series, and focuses on first-person dungeon crawling through labyrinths and combat using the characters' "Persona" abilities against hostiles known as Shadows. Development on the game began after Atlus's success with collaborating with an external developer on the 2012 fighting game Persona 4 Arena. It was based on the wish to create a collaborative spin-off with the Etrian Odyssey development team and fan demands for a Persona game on the 3DS. The Persona Q development team was made up of staff from both Etrian Odyssey IV and the main Persona series. Series character designer Shigenori Soejima created the cast's new deformed "chibi" appearances, while the music was composed by Atsushi Kitajoh and Toshiki Konishi with supervision by series composer Shoji Meguro. First announced in 2013 alongside the console port of Persona 4 Arena Ultimax, Persona 4 and Persona 5, it was the first Persona game to be developed for a Nintendo platform. It released to strong sales and positive reviews from critics, with several enjoying the game's comedic writing, presentation, and blend between Persona and Etrian Odyssey's gameplay styles. A sequel, Persona Q2, was released for the 3DS in Japan in November 2018 and worldwide in June 2019.
  • 1.0K
  • 24 Oct 2022
Topic Review
Sierpinski Number
In number theory, a Sierpiński number is an odd natural number k such that [math]\displaystyle{ k \times 2^n + 1 }[/math] is composite for all natural numbers n. In 1960, Wacław Sierpiński proved that there are infinitely many odd integers k which have this property. In other words, when k is a Sierpiński number, all members of the following set are composite: If the form is instead [math]\displaystyle{ k \times 2^n - 1 }[/math], then k is a Riesel number.
  • 1.0K
  • 02 Dec 2022
Topic Review
ACID (Computer Science)
In computer science, ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties of database transactions intended to guarantee validity even in the event of errors, power failures, etc. In the context of databases, a sequence of database operations that satisfies the ACID properties (and these can be perceived as a single logical operation on the data) is called a transaction. For example, a transfer of funds from one bank account to another, even involving multiple changes such as debiting one account and crediting another, is a single transaction. In 1983, Andreas Reuter and Theo Härder coined the acronym ACID as shorthand for Atomicity, Consistency, Isolation, and Durability, building on earlier work by Jim Gray who enumerated Atomicity, Consistency, and Durability but left out Isolation when characterizing the transaction concept. These four properties describe the major guarantees of the transaction paradigm, which has influenced many aspects of development in database systems. According to Gray and Reuter, IMS supported ACID transactions as early as 1973 (although the term ACID came later).
  • 1.0K
  • 23 Nov 2022
  • Page
  • of
  • 366
ScholarVision Creations