Topic Review
Principles of Grid Generation
Grids or meshes are geometrical shapes (formed after discretisation of the geometric domain) which are small-sized discrete cells that cover the physical domain, whose objective is to identify the discrete volumes or elements where conservation laws can be applied. They have applications in the fields of computational fluid dynamics (CFD), geography, designing and many more places where numerical solutions to the partial differential equations (PDEs) are required. Numerical grid generation is the crucial initial step involved in computing numerical solutions to the equations that describe a physical process. The accuracy of the solution depends upon the quality of the grid generated. A well-constructed grid can improve the quality of solution whereas, deviations from the numerical solution can be observed with a poorly constructed grid. Techniques for creating the cell forms the basis of grid generation. Various methods for the grid generation are discussed below.
  • 1.5K
  • 28 Oct 2022
Topic Review
Image Derivatives
Image derivatives can be computed by using small convolution filters of size 2 x 2 or 3 x 3, such as the Laplacian, Sobel, Roberts and Prewitt operators. However, a larger mask will generally give a better approximation of the derivative and examples of such filters are Gaussian derivatives and Gabor filters. Sometimes high frequency noise needs to be removed and this can be incorporated in the filter so that the Gaussian kernel will act as a band pass filter. The use of Gabor filters in image processing has been motivated by some of its similarities to the perception in the human visual system. The pixel value is computed as a convolution where [math]\displaystyle{ \mathbf{d} }[/math] is the derivative kernel and [math]\displaystyle{ G }[/math] is the pixel values in a region of the image and [math]\displaystyle{ \ast }[/math] is the operator that performs the convolution.
  • 806
  • 28 Oct 2022
Topic Review
Ada Semantic Interface Specification
The Ada Semantic Interface Specification (ASIS) is a layered, open architecture providing vendor-independent access to the Ada Library Environment. It allows for the static analysis of Ada programs and libraries. It is an open, published interface library that consists of the Ada environment and their tools and applications. As explained by the ASIS Working Group: “ASIS is an interface between an Ada environment as defined by ISO/IEC 8652:1995 (the Ada Reference Manual) and any tool requiring information from this environment” (SIGAda, 2020) It is exclusively used for programming language applications and static analysis on Ada programs, therefore giving the relevant information and access to Computer-aided software engineering (CASE) and applicable developers. ASIS also has the ability in utilizing the relevant software engineering tools whilst also embodying an easy understanding of the complexities of an Ada environment display. In addition, it provides procedures, functions and relevant information that can be significantly used to access exclusive information found in reference manuals and the Abstract Syntax Tree (AST). Which in return will advance ASIS to the capability of being portable to transport and retain information and terminology of Ada tools. “ASIS consists of 21 packages, 2 are optional and within these packages define 349 queries”. ASIS will also consist of a package which within it includes child packages that include “Errors Compilation units, Ada environments, implementation, exceptions, elements, iterator, declarations, expressions, clauses, definitions, statements, text and Ids”. Overall ASIS is simply a straightforward way to collect data from an ADA program and increases any of the Ada tools portability.
  • 387
  • 28 Oct 2022
Topic Review
Copy and Paste Programming
Copy-and-paste programming, sometimes referred to as just 'pasting', is the production of highly repetitive computer programming code, as produced by copy and paste operations. It is primarily a pejorative term; those who use the term are often implying a lack of programming competence. It may also be the result of technology limitations (e.g., an insufficiently expressive development environment) as subroutines or libraries would normally be used instead. However, there are occasions when copy and paste programming is considered acceptable or necessary, such as for boilerplate, loop unrolling (when not supported automatically by the compiler), or certain programming idioms, and it is supported by some source code editors in the form of snippets.
  • 1.0K
  • 28 Oct 2022
Topic Review
Context of Computational Complexity
In computational complexity theory and analysis of algorithms, a number of metrics are defined describing the resources, such as time or space, that a machine needs to solve a particular problem. Interpreting these metrics meaningfully requires context, and this context is frequently implicit and depends on the field and the problem under consideration. This article describes a number of important pieces of context and how they affect metrics.
  • 371
  • 28 Oct 2022
Topic Review
Shibboleth Single Sign-on Architecture
Shibboleth is a single sign-on log-in system for computer networks and the Internet. It allows people to sign in using just one identity to various systems run by federations of different organizations or institutions. The federations are often universities or public service organizations. The Shibboleth Internet2 middleware initiative created an architecture and open-source implementation for identity management and federated identity-based authentication and authorization (or access control) infrastructure based on Security Assertion Markup Language (SAML). Federated identity allows the sharing of information about users from one security domain to the other organizations in a federation. This allows for cross-domain single sign-on and removes the need for content providers to maintain user names and passwords. Identity providers (IdPs) supply user information, while service providers (SPs) consume this information and give access to secure content.
  • 756
  • 28 Oct 2022
Topic Review
FileMaker Pro
FileMaker Pro is a cross-platform relational database application from Claris International, a subsidiary of Apple Inc. It integrates a database engine with a graphical user interface (GUI) and security features, allowing users to modify the database by dragging new elements into layouts, screens, or forms. FileMaker evolved from a DOS application, but was then developed primarily for the Apple Macintosh and released in April 1985. It was succeeded by FileMaker Pro in 1990. Since 1992 it has been available for Microsoft Windows and for the classic Mac OS and macOS, and can be used in a cross-platform environment. FileMaker server briefly ran on Linux, but Linux support was abandoned with FileMaker 7, thereafter only running on Windows or macOS servers. A client version was released for iOS devices in July 2010. It is available in desktop, server, iOS and web-delivery configurations. In 2016, FileMaker Cloud was introduced, including a Linux server (CentOS), which was offered exclusively through the Amazon Marketplace. In November 2019, FileMaker Cloud was reintroduced as a software as a service product offered directly from Claris for FileMaker Pro 18.0.3 using FileMaker Server Cloud 2.18 service on Amazon Servers, but managed by Claris instead of through the Amazon Market Place, and making use of the new FileMaker ID authentication.
  • 1.4K
  • 28 Oct 2022
Topic Review
IoT Sensor Data Processing
In IoT sensor networks, wireless communication protocols are popularly used for the information exchange process. These communication protocols work as unlicensed frequency bands that ease the flexibility and scalability of sensor deployments. However, the utilization of communication protocols for wireless sensor network (WSN) under unlicensed frequency bands causes uncontrollable interference. The interference signals may lead to improper data transmission and sensor data with noise, missing values, outliers and redundancy. 
  • 603
  • 28 Oct 2022
Topic Review
Computational Resource for Drug Discovery
Computational Resources for Drug Discovery (CRDD) is one of the important silico modules of Open Source for Drug Discovery (OSDD). The CRDD web portal provides computer resources related to drug discovery on a single platform. It provides computational resources for researchers in computer-aided drug design, a discussion forum, and resources to maintain Wikipedia related to drug discovery, predict inhibitors, and predict the ADME-Tox property of molecules One of the major objectives of CRDD is to promote open source software in the field of chemoinformatics and pharmacoinformatics.
  • 569
  • 27 Oct 2022
Topic Review
Forensic Search
Forensic search is an emerging field of computer forensics. Forensic search focuses on user created data such as email files, cell phone records, office documents, PDFs and other files that are easily interpreted by a person. Forensic search differs from computer forensic analysis in that it does not seek to review or analyze the lower level system files such as the registry, link files or disk level issues more commonly associated with traditional computer forensic analysis.
  • 557
  • 27 Oct 2022
  • Page
  • of
  • 371
Video Production Service