Topic Review
Sobi2
Sobi2 (formerly written as SOBI2) is the abbreviation of Sigsiu Online Business Index 2. Sobi2 is a free of charge open source web directory component and content construction kit (CCK) for the Joomla! content management system (CMS). Sobi2 is written in the programming language PHP, also makes use of Javascript and requires the MySQL database environment for storage. It is best suited for low to medium-level traffic web-sites. Sobi2's development has been discontinued in 2011, when its successor, SobiPro comes out. Sobi2 was listed in the Joomla! Extensions Directory until all extensions for Joomla! 1.5 were removed in 2013. The listing still can be found in the Web Archive. As a component for Joomla! (up to version 1.5), Sobi2 made it possible to run and manage a directory in a Joomla! website. Sobi2 has features that made it stand out from other directory components at that time. It could be used as a web directory or as a directory to physical locations, like golf courses. It has a built-in integration with Google Maps (API key from Google is required). Sobi2 was built with a modular concept, where additional functionality was added via plug-ins. The Joomla extensions directory listed over 80 plug-ins for Sobi2 at that time.
  • 909
  • 25 Oct 2022
Topic Review
Chemical File Format
A chemical file format is a type of data file which is used specifically to depicting molecular data. One of the most widely used is the chemical table file format, which is similar to Structure Data Format (SDF) files. They are text files that represent multiple chemical structure records and associated data fields. The XYZ file format is a simple format that usually gives the number of atoms in the first line, a comment on the second, followed by a number of lines with atomic symbols (or atomic numbers) and cartesian coordinates. The Protein Data Bank Format is commonly used for proteins but is also used for other types of molecules. There are many other types which are detailed below. Various software systems are available to convert from one format to another.
  • 2.0K
  • 25 Oct 2022
Topic Review
Lie's Theorem
In mathematics, specifically the theory of Lie algebras, Lie's theorem states that, over an algebraically closed field of characteristic zero, if [math]\displaystyle{ \pi: \mathfrak{g} \to \mathfrak{gl}(V) }[/math] is a finite-dimensional representation of a solvable Lie algebra, then [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] stabilizes a flag [math]\displaystyle{ V = V_0 \supset V_1 \supset \cdots \supset V_n = 0, \operatorname{codim} V_i = i }[/math]; "stabilizes" means [math]\displaystyle{ \pi(X) V_i \subset V_i }[/math] for each [math]\displaystyle{ X \in \mathfrak{g} }[/math] and i. Put in another way, the theorem says there is a basis for V such that all linear transformations in [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] are represented by upper triangular matrices. This is a generalization of the result of Frobenius that commuting matrices are simultaneously upper triangularizable, as commuting matrices form an abelian Lie algebra, which is a fortiori solvable. A consequence of Lie's theorem is that any finite dimensional solvable Lie algebra over a field of characteristic 0 has a nilpotent derived algebra (see #Consequences). Also, to each flag in a finite-dimensional vector space V, there correspond a Borel subalgebra (that consist of linear transformations stabilizing the flag); thus, the theorem says that [math]\displaystyle{ \pi(\mathfrak{g}) }[/math] is contained in some Borel subalgebra of [math]\displaystyle{ \mathfrak{gl}(V) }[/math].
  • 458
  • 25 Oct 2022
Topic Review
Location-Based Service
A location-based service (LBS) is a general term denoting software services which utilize geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor object search, entertainment, work, personal life, etc. Commonly used examples of location based services include navigation software, social networking services, location-based advertising, and tracking systems. LBS can also include mobile commerce when taking the form of coupons or advertising directed at customers based on their current location. They include personalized weather services and even location-based games. LBS is critical to many businesses as well as government organizations to drive real insight from data tied to a specific location where activities take place. The spatial patterns that location-related data and services can provide is one of its most powerful and useful aspects where location is a common denominator in all of these activities and can be leveraged to better understand patterns and relationships. Banking, surveillance, online commerce, and many weapon systems are dependent on LBS. Access policies are controlled by location data and/or time-of-day constraints, or a combination thereof. As such, an LBS is an information service and has a number of uses in social networking today as information, in entertainment or security, which is accessible with mobile devices through the mobile network and which uses information on the geographical position of the mobile device. This concept of location based systems is not compliant with the standardized concept of real-time locating systems (RTLS) and related local services, as noted in ISO/IEC 19762-5 and ISO/IEC 24730-1. While networked computing devices generally do very well to inform consumers of days old data, the computing devices themselves can also be tracked, even in real-time. LBS privacy issues arise in that context, and are documented below.
  • 2.3K
  • 25 Oct 2022
Topic Review
Forensic Arts
Forensic art is any art used in law enforcement or legal proceedings. Forensic art is used to assist law enforcement with the visual aspects of a case, often using witness descriptions and video footage. It is a highly specialized field that covers a wide range of artistic skills, such as composite drawing, crime scene sketching, image modification and identification, courtroom drawings, demonstrative evidence, and postmortem and facial approximation aids. It is rare for a forensic artist to specialize in more than one of these skills. Many forensic artists do the job as a collateral duty to their "regular" job in law enforcement, such as police officer, crime scene tech, etc. Such forensic artists perform their work while on a fixed salary and are not additionally compensated for artistic duties. There are few full-time forensic artist jobs available. Most full-time artists work in large cities, or in state or federal agencies. "Freelancing" in forensic art is a difficult career path, as ties to law enforcement are a necessary part of the job, and agencies have limited budgets to pay outside contractors. The skill of facial approximation is closely associated and related to forensic anthropology in that an artist specializes in the reconstruction of the remains of a human body. Generally this discipline focuses on the human face for identification purposes. The forensic artist can create a facial approximation in a number of ways to include 2D (drawings), 3D (sculptures) and other methods using new computer technology. Forensic artists generally can add greater character and make their subjects come back to "life".
  • 765
  • 25 Oct 2022
Topic Review
Gambling Mathematics
The mathematics of gambling are a collection of probability applications encountered in games of chance and can be included in game theory. From a mathematical point of view, the games of chance are experiments generating various types of aleatory events, the probability of which can be calculated by using the properties of probability on a finite space of events.
  • 2.2K
  • 25 Oct 2022
Topic Review
Kerberos (Protocol)
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos uses UDP port 88 by default. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades.
  • 1.2K
  • 25 Oct 2022
Topic Review
Standard Portable Intermediate Representation
Standard Portable Intermediate Representation (SPIR) is an intermediate language for parallel compute and graphics by Khronos Group. It is used in multiple execution environments, including the Vulkan graphics API and the OpenCL compute API, to represent a shader or kernel. It is also used as an interchange language for cross compilation. SPIR-V was introduced in 2015 by the Khronos Group, and has since replaced the original SPIR, which was introduced in 2012.
  • 398
  • 25 Oct 2022
Topic Review
Altitude (Triangle)
In geometry, an altitude of a triangle is a line segment through a vertex and perpendicular to (i.e., forming a right angle with) a line containing the base (the side opposite the vertex). This line containing the opposite side is called the extended base of the altitude. The intersection of the extended base and the altitude is called the foot of the altitude. The length of the altitude, often simply called "the altitude", is the distance between the extended base and the vertex. The process of drawing the altitude from the vertex to the foot is known as dropping the altitude at that vertex. It is a special case of orthogonal projection. Altitudes can be used in the computation of the area of a triangle: one half of the product of an altitude's length and its base's length equals the triangle's area. Thus, the longest altitude is perpendicular to the shortest side of the triangle. The altitudes are also related to the sides of the triangle through the trigonometric functions. In an isosceles triangle (a triangle with two congruent sides), the altitude having the incongruent side as its base will have the midpoint of that side as its foot. Also the altitude having the incongruent side as its base will be the angle bisector of the vertex angle. It is common to mark the altitude with the letter h (as in height), often subscripted with the name of the side the altitude is drawn to. In a right triangle, the altitude drawn to the hypotenuse c divides the hypotenuse into two segments of lengths p and q. If we denote the length of the altitude by hc, we then have the relation For acute and right triangles the feet of the altitudes all fall on the triangle's sides (not extended). In an obtuse triangle (one with an obtuse angle), the foot of the altitude to the obtuse-angled vertex falls in the interior of the opposite side, but the feet of the altitudes to the acute-angled vertices fall on the opposite extended side, exterior to the triangle. This is illustrated in the adjacent diagram: in this obtuse triangle, an altitude dropped perpendicularly from the top vertex, which has an acute angle, intersects the extended horizontal side outside the triangle.
  • 769
  • 25 Oct 2022
Topic Review
Juniper M Series
Juniper M series is a line of multiservice edge routers designed and manufactured by Juniper Networks, for enterprise and service provider networks. It spans over M7i, M10i, M40e, M120, and M320 platforms with 5 Gbit/s up to 160 Gbit/s of full-duplex throughput. The M40 router was the first product by Juniper Networks, which was released in 1998. The M-series routers run on JUNOS Operating System.
  • 426
  • 25 Oct 2022
  • Page
  • of
  • 371
Video Production Service