Topic Review
Google+
Google Plus (stylized as Google+) is an Internet-based social network that is owned and operated by Google. The service, Google's fourth foray into social networking, experienced strong growth in its initial years, although usage statistics have varied, depending on how the service is defined. Three Google executives have overseen the service, which has undergone substantial changes leading to a redesign in November 2015. On October 8, 2018, Google announced that it was shutting down Google+ for consumers, citing low user engagement and a software error, first reported by The Wall Street Journal , that potentially exposed the data of hundreds of thousands of users. Google indicated that Google+ would operate until August 2019, allowing users to download and migrate their information.
  • 2.7K
  • 12 Oct 2022
Topic Review
Urban Land Use Planning
Urbanization is persistent globally and has increasingly significant spatial and environmental consequences. It is especially challenging in developing countries due to the increasing pressure on the limited resources, and damage to the bio-physical environment.
  • 2.7K
  • 13 Oct 2021
Topic Review
Tudor Rose
The Tudor rose (sometimes called the Union rose) is the traditional floral heraldic emblem of England and takes its name and origins from the House of Tudor, which united the House of Lancaster and the House of York. The Tudor rose consists of five white inner petals, representing the House of York, and five red outer petals to represent the House of Lancaster.
  • 2.7K
  • 16 Nov 2022
Topic Review
Acronis True Image
Acronis True Image is a software product produced by Acronis that provides data protection for personal users including, backup, archive, access and recovery for Windows, macOS, iOS, and Android operating systems. As disk imaging software, True Image can restore the previously captured image to another disk, replicating the structure and contents to the new disk, also allowing disk cloning and partition resizing, even if the new disk is of a different capacity. The backups are in a proprietary format which saves using a .tib filename format. Acronis was launched in 2003 and in December 2014 claimed to have over 5 million consumer and 500,000 businesses users.
  • 2.7K
  • 15 Nov 2022
Topic Review
HVAC Systems of Smart Building
Early fault detection and diagnosis in heating, ventilation and air conditioning (HVAC) systems may reduce the damage of equipment, improving the reliability and safety of smart buildings, generating social and economic benefits. Data models for fault detection and diagnosis are increasingly used for extracting knowledge in the supervisory tasks. This article proposes an autonomic cycle of data analysis tasks (ACODAT) for the supervision of the building’s HVAC systems. Data analysis tasks incorporate data mining models for extracting knowledge from the system monitoring, analyzing abnormal situations and automatically identifying and taking corrective actions. This article shows a case study of a real building’s HVAC system, for the supervision with our ACODAT, where the HVAC subsystems have been installed over the years, providing a good example of a heterogeneous facility. The proposed supervisory functionality of the HVAC system is capable of detecting deviations, such as faults or gradual increment of energy consumption in similar working conditions. The case study shows this capability of the supervisory autonomic cycle, usually a key objective for smart buildings.
  • 2.7K
  • 01 Jun 2021
Topic Review
HBase Storage Architecture
HBase is the top option for storing huge data. HBase has been selected for several purposes, including its scalability, efficiency, strong consistency support, and the capacity to support a broad range of data models.
  • 2.7K
  • 21 Feb 2021
Topic Review
Single-Speed Bicycle
A single-speed bicycle is a type of bicycle with a single gear ratio. These bicycles are without derailleur gears, hub gearing or other methods for varying the gear ratio of the bicycle. There are many types of modern single speed bicycles; BMX bicycles, most bicycles designed for children, cruiser type bicycles, classic commuter bicycles, unicycles, bicycles designed for track racing, fixed-gear road bicycles, and single-speed mountain and cyclocross bikes. Although most fixed-gear bicycles (fixies) are technically single speed, the term single-speed generally refers to a single gear ratio bicycle with a freewheel mechanism to allow it to coast.
  • 2.7K
  • 20 Oct 2022
Topic Review
Lists of Mathematics Topics
This article itemizes the various lists of mathematics topics. Some of these lists link to hundreds of articles; some link only to a few. The template to the right includes links to alphabetical lists of all mathematical articles. This article brings together the same content organized in a manner better suited for browsing. The purpose of this list is not similar to that of the Mathematics Subject Classification formulated by the American Mathematical Society. Many mathematics journals ask authors of research papers and expository articles to list subject codes from the Mathematics Subject Classification in their papers. The subject codes so listed are used by the two major reviewing databases, Mathematical Reviews and Zentralblatt MATH. This list has some items that would not fit in such a classification, such as list of exponential topics and list of factorial and binomial topics, which may surprise the reader with the diversity of their coverage.
  • 2.7K
  • 19 Oct 2022
Topic Review
Social Hacking
Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of “social engineering”. Although the practice involves exercising control over human behaviour rather than computers, the term "social hacking" is also used in reference to online behaviour and increasingly, social media activity. The technique can be used in multiple ways that affect public perception and conversely, increase public awareness of social hacking activity. However, while awareness helps reduce the volume of hacks being carried out, technology has allowed for attack tools to become more sophisticated.
  • 2.7K
  • 20 Oct 2022
Topic Review
Chaotic Image Encryption
Chaos is the characteristic of a system whose current state is guaranteed to be highly sensitive to the previous state (spatial chaos), the initial conditions (temporal chaos), or both (spatio-temporal chaos). Such a sensitivity makes the output or the behavior of a chaotic system difficult to predict. Chaos theory justifies and formulates the apparent disorder of chaotic systems on the basis of orderly patterns, structured feedback loops, iterative repetitions, self-organization, self-similarity, fractals, etc. Chaotic maps, attractors, and sequences all refer to the mathematical structures used for this formulation. Chaotic systems, maps, attractors, and sequences have been of great interest to the research community. They have been used for security purposes in a broad variety of applications ranging from smart grids to communication systems. Especially, chaotic encryption has been used for encrypting a variety of content types in addition to images.
  • 2.7K
  • 27 Jul 2022
  • Page
  • of
  • 371
ScholarVision Creations