Topic Review
Tracerpt
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 957
  • 21 Nov 2022
Topic Review
Sierpinski Number
In number theory, a Sierpiński number is an odd natural number k such that [math]\displaystyle{ k \times 2^n + 1 }[/math] is composite for all natural numbers n. In 1960, Wacław Sierpiński proved that there are infinitely many odd integers k which have this property. In other words, when k is a Sierpiński number, all members of the following set are composite: If the form is instead [math]\displaystyle{ k \times 2^n - 1 }[/math], then k is a Riesel number.
  • 957
  • 02 Dec 2022
Topic Review
Perl 6 Rules
Perl 6 rules are the regular expression, string matching and general-purpose parsing facility of Perl 6, and are a core part of the language. Since Perl's pattern-matching constructs have exceeded the capabilities of formal regular expressions for some time, Perl 6 documentation refers to them exclusively as regexes, distancing the term from the formal definition. Perl 6 provides a superset of Perl 5 features with respect to regexes, folding them into a larger framework called rules, which provide the capabilities of a parsing expression grammar, as well as acting as a closure with respect to their lexical scope. Rules are introduced with the rule keyword, which has a usage quite similar to subroutine definitions. Anonymous rules can be introduced with the regex (or rx) keyword, or simply be used inline as regexes were in Perl 5 via the m (matching) or s (substitution) operators.
  • 955
  • 22 Nov 2022
Topic Review
Finger-Vein-Based Identity Recognition
Finger vein recognition is a relatively new method of biometric authentication. It matches the vascular pattern in an individual’s finger to previously obtained data.
  • 955
  • 19 May 2021
Topic Review
Network Function Virtualization and Service Function Chaining Frameworks
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastructure, thereby reducing both capital and operational costs. With network function virtualisation (NFV), network functions (NFs) such as firewalls, traffic load balancers, content filters, and intrusion detection systems (IDS) are either instantiated on virtual machines (VMs) or lightweight containers, often chained together to create a service function chain (SFC). 
  • 955
  • 01 Mar 2022
Topic Review
Caduceus as a Symbol of Medicine
The caduceus is the traditional symbol of Hermes and features two snakes winding around an often winged staff. It is often used as a symbol of medicine, especially in the United States, despite its ancient and consistent associations with trade, liars, thieves, eloquence, negotiation, alchemy, and wisdom. The modern use of the caduceus as a symbol of medicine became established in the United States in the late 19th and early 20th century as a result of well-documented mistakes, misunderstandings of symbology and classical culture. The correct symbol for medicine is the Rod of Asclepius, which has only one snake and no wings.
  • 954
  • 02 Nov 2022
Topic Review
Wi-Fi
Indoor positioning poses a number of challenges as several effects, such as signal attenuation, signal fluctuations, interference, and multipath occur in signal propagation. The severity depends on the method and technology adopted to perform user localization. Wi-Fi is a popular method because of its ubiquity with already available public and private infrastructure in many environments and the ability for mobile clients, such as smartphones, to receive these signals.
  • 952
  • 14 Jan 2021
Topic Review
Machine Learning Algorithms in Manufacturing
The quality-control process in manufacturing must ensure the product is free of defects and performs according to the customer’s expectations. Maintaining the quality of a firm’s products at the highest level is very important for keeping an edge over the competition. To maintain and enhance the quality of their products, manufacturers invest a lot of resources in quality control and quality assurance. During the assembly line, parts will arrive at a constant interval for assembly. The quality criteria must first be met before the parts are sent to the assembly line where the parts and subparts are assembled to get the final product. Once the product has been assembled, it is again inspected and tested before it is delivered to the customer. Because manufacturers are mostly focused on visual quality inspection, there can be bottlenecks before and after assembly. The manufacturer may suffer a loss if the assembly line is slowed down by this bottleneck. To improve quality, state-of-the-art sensors are being used to replace visual inspections and machine learning is used to help determine which part will fail.
  • 951
  • 19 Oct 2022
Topic Review
Suitability of NB-IoT
Narrow-Band Internet of Things (NB-IoT) shares among the challenges faced by Internet of Things (IoT) and its applications in industrial settings are set to bring in the fourth industrial revolution. The industrial environment consisting of high profile manufacturing plants and a variety of equipment is inherently characterized by high reflectiveness, causing significant multi-path components that affect the propagation of wireless communications—a challenge among others that needs to be resolved. The suitability of NB-IoT for industrial applications is therewith explained.
  • 952
  • 19 Aug 2021
Topic Review
Collaborative Cybersecurity Networked Organisations
The requirements to the governance of collaborative networked organisations (CNOs) can be structured in 33 categories: Geographical Representation or exclusion; Supply chain security; Involvement of external stakeholders; Standards and methodologies; Representation on senior governance bodies; Decision making principles; Auditing; Dispute/conflict management arrangements; Confidentiality & Security; IPR management; Ethics code; Use of slave labour or labour of minors; Green policies; Gender policies and representation; Transparency; Accountability ; Anti-corruption/ integrity policies; Innovation; Adaptiveness; Cohesion; Trust; Sustainability; Resilience; Communication and engagement; Knowledge management; Long-term perspective on collaboration; Interoperability; Leadership; Organisational culture; Competences; Risk management; Evidence-based decision-making; and Competitiveness. As a result of a comprehensive study for CNOs in the field of cybersecurity these governance issues have been structured in two groups (of governance objectives and CNO features) and four tiers in terms of priority. While the governance categories are universally applicable, their prioritisation is relevant for CNOs in the field of cybersecurity.
  • 949
  • 28 Oct 2020
  • Page
  • of
  • 371
Video Production Service