Topic Review
A Proactive Protection by Computational Intelligence Methods
A combination of computational intelligence methods: identifying anomalies in network traffic by evaluating its self-similarity, detecting and classifying cyberattacks in anomalies, and taking effective protection measures using Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) cells.
  • 408
  • 25 Oct 2022
Topic Review
Sign Language Recognition Method
Technologies for pattern recognition are used in various fields. One of the most relevant and important directions is the use of pattern recognition technology, such as gesture recognition, in socially significant tasks, to develop automatic sign language interpretation systems in real time. More than 5% of the world’s population—about 430 million people, including 34 million children—are deaf-mute and not always able to use the services of a living sign language interpreter. Almost 80% of people with a disabling hearing loss live in low- and middle-income countries. The development of low-cost systems of automatic sign language interpretation, without the use of expensive sensors and unique cameras, would improve the lives of people with disabilities, contributing to their unhindered integration into society. 
  • 1.3K
  • 25 Oct 2022
Topic Review
Sobi2
Sobi2 (formerly written as SOBI2) is the abbreviation of Sigsiu Online Business Index 2. Sobi2 is a free of charge open source web directory component and content construction kit (CCK) for the Joomla! content management system (CMS). Sobi2 is written in the programming language PHP, also makes use of Javascript and requires the MySQL database environment for storage. It is best suited for low to medium-level traffic web-sites. Sobi2's development has been discontinued in 2011, when its successor, SobiPro comes out. Sobi2 was listed in the Joomla! Extensions Directory until all extensions for Joomla! 1.5 were removed in 2013. The listing still can be found in the Web Archive. As a component for Joomla! (up to version 1.5), Sobi2 made it possible to run and manage a directory in a Joomla! website. Sobi2 has features that made it stand out from other directory components at that time. It could be used as a web directory or as a directory to physical locations, like golf courses. It has a built-in integration with Google Maps (API key from Google is required). Sobi2 was built with a modular concept, where additional functionality was added via plug-ins. The Joomla extensions directory listed over 80 plug-ins for Sobi2 at that time.
  • 936
  • 25 Oct 2022
Topic Review
Chemical File Format
A chemical file format is a type of data file which is used specifically to depicting molecular data. One of the most widely used is the chemical table file format, which is similar to Structure Data Format (SDF) files. They are text files that represent multiple chemical structure records and associated data fields. The XYZ file format is a simple format that usually gives the number of atoms in the first line, a comment on the second, followed by a number of lines with atomic symbols (or atomic numbers) and cartesian coordinates. The Protein Data Bank Format is commonly used for proteins but is also used for other types of molecules. There are many other types which are detailed below. Various software systems are available to convert from one format to another.
  • 2.2K
  • 25 Oct 2022
Topic Review
Lie's Theorem
In mathematics, specifically the theory of Lie algebras, Lie's theorem states that, over an algebraically closed field of characteristic zero, if [math]\displaystyle{ \pi: \mathfrak{g} \to \mathfrak{gl}(V) }[/math] is a finite-dimensional representation of a solvable Lie algebra, then [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] stabilizes a flag [math]\displaystyle{ V = V_0 \supset V_1 \supset \cdots \supset V_n = 0, \operatorname{codim} V_i = i }[/math]; "stabilizes" means [math]\displaystyle{ \pi(X) V_i \subset V_i }[/math] for each [math]\displaystyle{ X \in \mathfrak{g} }[/math] and i. Put in another way, the theorem says there is a basis for V such that all linear transformations in [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] are represented by upper triangular matrices. This is a generalization of the result of Frobenius that commuting matrices are simultaneously upper triangularizable, as commuting matrices form an abelian Lie algebra, which is a fortiori solvable. A consequence of Lie's theorem is that any finite dimensional solvable Lie algebra over a field of characteristic 0 has a nilpotent derived algebra (see #Consequences). Also, to each flag in a finite-dimensional vector space V, there correspond a Borel subalgebra (that consist of linear transformations stabilizing the flag); thus, the theorem says that [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] is contained in some Borel subalgebra of [math]\displaystyle{ \mathfrak{gl}(V) }[/math].
  • 476
  • 25 Oct 2022
Topic Review
Location-Based Service
A location-based service (LBS) is a general term denoting software services which utilize geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor object search, entertainment, work, personal life, etc. Commonly used examples of location based services include navigation software, social networking services, location-based advertising, and tracking systems. LBS can also include mobile commerce when taking the form of coupons or advertising directed at customers based on their current location. They include personalized weather services and even location-based games. LBS is critical to many businesses as well as government organizations to drive real insight from data tied to a specific location where activities take place. The spatial patterns that location-related data and services can provide is one of its most powerful and useful aspects where location is a common denominator in all of these activities and can be leveraged to better understand patterns and relationships. Banking, surveillance, online commerce, and many weapon systems are dependent on LBS. Access policies are controlled by location data and/or time-of-day constraints, or a combination thereof. As such, an LBS is an information service and has a number of uses in social networking today as information, in entertainment or security, which is accessible with mobile devices through the mobile network and which uses information on the geographical position of the mobile device. This concept of location based systems is not compliant with the standardized concept of real-time locating systems (RTLS) and related local services, as noted in ISO/IEC 19762-5 and ISO/IEC 24730-1. While networked computing devices generally do very well to inform consumers of days old data, the computing devices themselves can also be tracked, even in real-time. LBS privacy issues arise in that context, and are documented below.
  • 2.4K
  • 25 Oct 2022
Topic Review
Forensic Arts
Forensic art is any art used in law enforcement or legal proceedings. Forensic art is used to assist law enforcement with the visual aspects of a case, often using witness descriptions and video footage. It is a highly specialized field that covers a wide range of artistic skills, such as composite drawing, crime scene sketching, image modification and identification, courtroom drawings, demonstrative evidence, and postmortem and facial approximation aids. It is rare for a forensic artist to specialize in more than one of these skills. Many forensic artists do the job as a collateral duty to their "regular" job in law enforcement, such as police officer, crime scene tech, etc. Such forensic artists perform their work while on a fixed salary and are not additionally compensated for artistic duties. There are few full-time forensic artist jobs available. Most full-time artists work in large cities, or in state or federal agencies. "Freelancing" in forensic art is a difficult career path, as ties to law enforcement are a necessary part of the job, and agencies have limited budgets to pay outside contractors. The skill of facial approximation is closely associated and related to forensic anthropology in that an artist specializes in the reconstruction of the remains of a human body. Generally this discipline focuses on the human face for identification purposes. The forensic artist can create a facial approximation in a number of ways to include 2D (drawings), 3D (sculptures) and other methods using new computer technology. Forensic artists generally can add greater character and make their subjects come back to "life".
  • 811
  • 25 Oct 2022
Topic Review
Gambling Mathematics
The mathematics of gambling are a collection of probability applications encountered in games of chance and can be included in game theory. From a mathematical point of view, the games of chance are experiments generating various types of aleatory events, the probability of which can be calculated by using the properties of probability on a finite space of events.
  • 2.3K
  • 25 Oct 2022
Topic Review
Kerberos (Protocol)
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos uses UDP port 88 by default. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades.
  • 1.3K
  • 25 Oct 2022
Topic Review
Standard Portable Intermediate Representation
Standard Portable Intermediate Representation (SPIR) is an intermediate language for parallel compute and graphics by Khronos Group. It is used in multiple execution environments, including the Vulkan graphics API and the OpenCL compute API, to represent a shader or kernel. It is also used as an interchange language for cross compilation. SPIR-V was introduced in 2015 by the Khronos Group, and has since replaced the original SPIR, which was introduced in 2012.
  • 429
  • 25 Oct 2022
  • Page
  • of
  • 371
ScholarVision Creations