Biography
Margaret Jarman Hagood
Margaret Loyd Jarman "Marney" Hagood (1907–1963) was an American sociologist and demographer who "helped steer sociology away from the armchair and toward the calculator".[1] She wrote the books Mothers of the South (1939) and Statistics for Sociologists (1941), and later became president of the Population Association of America and of the Rural Sociological Society. Hagood was born on Octo
  • 413
  • 08 Dec 2022
Topic Review
L-System
An L-system or Lindenmayer system is a parallel rewriting system and a type of formal grammar. An L-system consists of an alphabet of symbols that can be used to make strings, a collection of production rules that expand each symbol into some larger string of symbols, an initial "axiom" string from which to begin construction, and a mechanism for translating the generated strings into geometric structures. L-systems were introduced and developed in 1968 by Aristid Lindenmayer, a Hungarian theoretical biologist and botanist at the University of Utrecht. Lindenmayer used L-systems to describe the behaviour of plant cells and to model the growth processes of plant development. L-systems have also been used to model the morphology of a variety of organisms and can be used to generate self-similar fractals.
  • 690
  • 08 Dec 2022
Biography
Bashir Rameyev
Bashir Iskandarovich Rameyev (Russian: Баши́р Исканда́рович Раме́ев; 1 May 1918 – 16 May 1994) was a Soviet inventor and scientist, one of the founders of Soviet computing, author of 23 patents,[1] including the first patent in the field of electronic computers officially registered in the USSR—a patent for the Automatic Electronic Digital Machine (1948).[2] Rame
  • 461
  • 07 Dec 2022
Topic Review
Colon Cancer Diagnosis
Researchers presents a comprehensive survey on the diagnosis of colon cancer. This covers many aspects related to colon cancer, such as its symptoms and grades as well as the available imaging modalities (particularly, histopathology images used for analysis) in addition to common diagnosis systems. Furthermore, the most widely used datasets and performance evaluation metrics are discussed. Researchers provide a comprehensive review of the current studies on colon cancer, classified into deep-learning (DL) and machine-learning (ML) techniques, and researchers identify their main strengths and limitations. These techniques provide extensive support for identifying the early stages of cancer that lead to early treatment of the disease and produce a lower mortality rate compared with the rate produced after symptoms develop. In addition, these methods can help to prevent colorectal cancer from progressing through the removal of pre-malignant polyps, which can be achieved using screening tests to make the disease easier to diagnose. Finally, the existing challenges and future research directions that open the way for future work in this field are presented.
  • 529
  • 07 Dec 2022
Biography
Grigore Rosu
Grigore Roșu is a computer science professor at the University of Illinois at Urbana-Champaign and a researcher in the Information Trust Institute.[1] He is known for his contributions in runtime verification, K framework,[2] matching logic,[3] and automated coinduction.[4] Rosu received a B.A. in Mathematics in 1995 and an M.S. in Fundamentals of Computing in 1996, both from the University
  • 583
  • 06 Dec 2022
Topic Review
Information Technology (Intermediary Guidelines (Amendment) Rules) 2018
The draft Information Technology [Intermediary Guidelines (Amendment) Rules] 2018 seeks to amend India 's Intermediary Guidelines Rules 2011 by making intermediaries legally required to provide time-bound assistance to any government agency, provide traceability requirements, as well as deploy "technology-based automated tools to identify and remove public access to unlawful information". Intermediaries with more than 5,000,000 users must set up a company in India. The changes also include prohibited hosting of another category of content, i.e. ‘public health or safety’. The draft Rules have been framed under Section 79 of the Information Technology Act, 2000 which covers intermediary liability. The Indian Government’s Ministry of Electronics and Information Technology (MeitY) had invited comments on proposed amendments early in 2019. The amendments were seen by many to "overstep the aforesaid intention sparking concerns of violating free speech and privacy rights of individuals." It is seen that "the guidelines suffer with excessive delegation of powers and shift the burden of responsibility of identification of unlawful content from a government/ judiciary to intermediaries." A total of 171 comments were received by MeitY; all of the comments were published for counter comments. On 21 October 2019, MeitY asked the court for three months’ time for finalisation of the Intermediary Rules, 2018.
  • 714
  • 06 Dec 2022
Topic Review
State-of-the-Art on Recommender Systems for E-Learning
Recommender systems (RSs) are increasingly recognized as intelligent software for predicting users’ opinions on specific items. Various RSs have been developed in different domains, such as e-commerce, e-government, e-resource services, e-business, e-library, e-tourism, and e-learning, to make excellent user recommendations. In e-learning technology, RSs are designed to support and improve the learning practices of a student or an organization.
  • 516
  • 06 Dec 2022
Biography
Rebekah Jones
Rebekah D. Jones (born July 1989) is an American geographer, specializing in using geographic information system (GIS) data science to track hurricanes and climatology. She used geographic information system software to create the Florida Department of Health COVID-19 dashboard, but was fired from her job in May 2020, which she said was due to her refusal to hide COVID-19 data. Jones is often re
  • 847
  • 06 Dec 2022
Topic Review
Operating-System-Level Virtualization
Operating-system-level virtualization, also known as containerization, refers to an operating system feature in which the kernel allows the existence of multiple isolated user-space instances. Such instances, called containers, partitions, virtual environments (VEs) or jails (FreeBSD jail or chroot jail), may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside a container can only see the container's contents and devices assigned to the container. On Unix-like operating systems, this feature can be seen as an advanced implementation of the standard chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides resource-management features to limit the impact of one container's activities on other containers. System-level-virtualization is frequently implemented in remote access applications with dynamic cloud access, allowing for simultaneous two-way data streaming over closed networks.
  • 1.3K
  • 06 Dec 2022
Topic Review
Web Desktop
A web desktop or webtop is a desktop environment embedded in a web browser or similar client application. A webtop integrates web applications, web services, client–server applications, application servers, and applications on the local client into a desktop environment using the desktop metaphor. Web desktops provide an environment similar to that of Windows, Mac, or a graphical user interface on Unix and Linux systems. It is a virtual desktop running in a web browser. In a webtop the applications, data, files, configuration, settings, and access privileges reside remotely over the network. Much of the computing takes place remotely. The browser is primarily used for display and input purposes. In popular use, web desktops are sometimes referred to incorrectly as a web operating system or simply a Web OS.
  • 906
  • 06 Dec 2022
  • Page
  • of
  • 371
Video Production Service