source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Paraboloidal%20coordinates | Paraboloidal coordinates are three-dimensional orthogonal coordinates that generalize two-dimensional parabolic coordinates. They possess elliptic paraboloids as one-coordinate surfaces. As such, they should be distinguished from parabolic cylindrical coordinates and parabolic rotational coordinates, both of which are... |
https://en.wikipedia.org/wiki/Oblate%20spheroidal%20coordinates | Oblate spheroidal coordinates are a three-dimensional orthogonal coordinate system that results from rotating the two-dimensional elliptic coordinate system about the non-focal axis of the ellipse, i.e., the symmetry axis that separates the foci. Thus, the two foci are transformed into a ring of radius in the x-y plan... |
https://en.wikipedia.org/wiki/Ellipsoidal%20coordinates | Ellipsoidal coordinates are a three-dimensional orthogonal coordinate system that generalizes the two-dimensional elliptic coordinate system. Unlike most three-dimensional orthogonal coordinate systems that feature quadratic coordinate surfaces, the ellipsoidal coordinate system is based on confocal quadrics.
Basic ... |
https://en.wikipedia.org/wiki/Conical%20coordinates | Conical coordinates, sometimes called sphero-conal or sphero-conical coordinates, are a three-dimensional orthogonal coordinate system consisting of
concentric spheres (described by their radius ) and by two families of perpendicular elliptic cones, aligned along the - and -axes, respectively. The intersection between... |
https://en.wikipedia.org/wiki/Micro-operation | In computer central processing units, micro-operations (also known as micro-ops or μops, historically also as micro-actions) are detailed low-level instructions used in some designs to implement complex machine instructions (sometimes termed macro-instructions in this context).
Usually, micro-operations perform basic ... |
https://en.wikipedia.org/wiki/Metalink | Metalink is an extensible metadata file format that describes one or more computer files available for download. It specifies files appropriate for the user's language and operating system; facilitates file verification and recovery from data corruption; and lists alternate download sources (mirror URIs).
The metadata... |
https://en.wikipedia.org/wiki/Inauthentic%20text | An inauthentic text is a computer-generated expository document meant to appear as genuine, but which is actually meaningless. Frequently they are created in order to be intermixed with genuine documents and thus manipulate the results of search engines, as with Spam blogs. They are also carried along in email in ord... |
https://en.wikipedia.org/wiki/Microsoft%20Fingerprint%20Reader | Microsoft Fingerprint Reader was a device sold by Microsoft, primarily for homes and small businesses. The underlying software providing the biometrics was developed by Digital Persona.
Fingerprint readers are more secure, reliable and convenient than a normal traditional password, although they have been subject t... |
https://en.wikipedia.org/wiki/ClamTk | ClamTk is a free software graphical interface for the ClamAV command line antivirus software program, for Linux desktop users. It provides both on-demand and scheduled scanning. The project was started by Dave Mauroni in February 2004 and remains under development.
ClamTk was originally written using the Tk widget too... |
https://en.wikipedia.org/wiki/Enterprise%20Distributed%20Object%20Computing | The UML profile for Enterprise Distributed Object Computing (EDOC) is a standard of the Object Management Group in support of open distributed computing using model-driven architecture and service-oriented architecture. Its aim is to simplify the development of component based (EDOC) systems by providing a UML-based m... |
https://en.wikipedia.org/wiki/Reglet | A reglet is found on the exterior of a building along a masonry wall, chimney or parapet that meets the roof. It is a groove cut within a mortar joint that receives counter-flashing meant to cover surface flashing used to deflect water infiltration. Reglet can also refer to the counter-flashing itself when it is applie... |
https://en.wikipedia.org/wiki/Korea%20Atomic%20Energy%20Research%20Institute | The Korea Atomic Energy Research Institute (KAERI) in Daejeon, South Korea was established in 1959 as the sole professional research-oriented institute for nuclear power in South Korea, and has rapidly built a reputation for research and development in various fields.
History
KAERI was established in 1959 as the Atom... |
https://en.wikipedia.org/wiki/Memory%20latency | Memory latency is the time (the latency) between initiating a request for a byte or word in memory until it is retrieved by a processor. If the data are not in the processor's cache, it takes longer to obtain them, as the processor will have to communicate with the external memory cells. Latency is therefore a fundamen... |
https://en.wikipedia.org/wiki/Dermatoglyphics | Dermatoglyphics (from Ancient Greek derma, "skin", and glyph, "carving") is the scientific study of fingerprints, lines, mounts and shapes of hands, as distinct from the superficially similar pseudoscience of palmistry.
Dermatoglyphics also refers to the making of naturally occurring ridges on certain body parts, name... |
https://en.wikipedia.org/wiki/Rushbrooke%20inequality | In statistical mechanics, the Rushbrooke inequality relates the critical exponents of a magnetic system which exhibits a first-order phase transition in the thermodynamic limit for non-zero temperature T.
Since the Helmholtz free energy is extensive, the normalization to free energy per site is given as
The magnetiz... |
https://en.wikipedia.org/wiki/Bulk%20soil | Bulk soil is soil outside the rhizosphere that is not penetrated by plant roots. The bulk soil is like an ecosystem, it is made up of many things such as: nutrients, ions, soil particles, and root exudates. There are many different interactions that occur between all the members of the bulk soil. Natural organic compo... |
https://en.wikipedia.org/wiki/Raise%20borer | A raise borer is a machine used in underground mining, to excavate a circular hole between two levels of a mine without the use of explosives.
The raise borer is set up on the upper level of the two levels to be connected, on an evenly laid platform (typically a concrete pad). A small-diameter hole (pilot hole) is dri... |
https://en.wikipedia.org/wiki/Co-adaptation | In biology, co-adaptation is the process by which two or more species, genes or phenotypic traits undergo adaptation as a pair or group. This occurs when two or more interacting characteristics undergo natural selection together in response to the same selective pressure or when selective pressures alter one characteri... |
https://en.wikipedia.org/wiki/HM%20Government%20Communications%20Centre | His Majesty's Government Communications Centre (HMGCC) is an organisation which provides electronics and software to support the communication needs of the British Government. Based at Hanslope Park, near Milton Keynes in Buckinghamshire, it is closely linked with the Foreign, Commonwealth and Development Office and th... |
https://en.wikipedia.org/wiki/Svenskt%20Diplomatarium | Svenskt Diplomatarium (also known under the Latin name Diplomatarium Suecanum) is a series of critical editions of medieval Swedish documents or documents pertaining to the history of Sweden (in Swedish, Latin and other languages).
Begun in the 1820s by the antiquarian Johan Gustaf Liljegren and inactive for periods, ... |
https://en.wikipedia.org/wiki/TMS6100 | The Texas Instruments TMS6100 is a 1 or 4-bit serial mask (factory)-programmed read-only memory IC. It is a companion chip to the TMS5100, CD2802, TMS5110, (rarely) TMS5200, and (rarely) TMS5220 speech synthesizer ICs, and was mask-programmed with LPC data required for a specific product. It holds 128Kib (16KiB) of dat... |
https://en.wikipedia.org/wiki/Conway%20polyhedron%20notation | In geometry, Conway polyhedron notation, invented by John Horton Conway and promoted by George W. Hart, is used to describe polyhedra based on a seed polyhedron modified by various prefix operations.
Conway and Hart extended the idea of using operators, like truncation as defined by Kepler, to build related polyhedra ... |
https://en.wikipedia.org/wiki/End%20of%20message | End of message or EOM (as in "(EOM)" or "<EOM>") signifies the end of a message, often an e-mail message.
Usage
The subject of an e-mail message may contain such an abbreviation to signify that all content is in the subject line so that the message itself does not need to be opened (e.g., "No classes Monday (EOM)" or ... |
https://en.wikipedia.org/wiki/Non-explosive%20demolition%20agents | Non-explosive demolition agents are chemicals that are an alternative to explosives and gas pressure blasting products in demolition, mining, and quarrying. To use non-explosive demolition agents in demolition or quarrying, holes are drilled in the base rock as they would be for use with conventional explosives. A slur... |
https://en.wikipedia.org/wiki/Efferent%20coupling | Efferent coupling is a coupling metric in software development. It measures the number of data types a class knows about.
This includes inheritance, interface implementation, parameter types, variable types, and exceptions.
This has also been referred to by Robert C. Martin as the Fan-out stability metric which in hi... |
https://en.wikipedia.org/wiki/University%20of%20New%20Hampshire%20InterOperability%20Laboratory | The University of New Hampshire InterOperability Laboratory (UNH-IOL) is an independent test facility that provides interoperability and standards conformance testing for networking, telecommunications, data storage, and consumer technology products.
Founded in 1988, it employs approximately 25 full-time staff members... |
https://en.wikipedia.org/wiki/Rose%20%28heraldry%29 | The rose is a common device in heraldry. It is often used both as a charge on a coat of arms and by itself as an heraldic badge. The heraldic rose has a stylized form consisting of five symmetrical lobes, five barbs, and a circular seed. The rose is one of the most common plant symbols in heraldry, together with the l... |
https://en.wikipedia.org/wiki/Apollonian%20circles | In geometry, Apollonian circles are two families (pencils) of circles such that every circle in the first family intersects every circle in the second family orthogonally, and vice versa. These circles form the basis for bipolar coordinates. They were discovered by Apollonius of Perga, a renowned Greek geometer.
Defin... |
https://en.wikipedia.org/wiki/257-gon | In Geometry, 257-gon, also known broadly as the Dihectapentacontakaiheptagon, is a polygon with 257 sides. The sum of the interior angles of any non-self-intersecting 257-gon is 45,900°.
Regular 257-gon
The area of a regular 257-gon is (with )
A whole regular 257-gon is not visually discernible from a circle, and it... |
https://en.wikipedia.org/wiki/65537-gon | In geometry, a 65537-gon is a polygon with 65,537 (216 + 1) sides. The sum of the interior angles of any non–self-intersecting is 11796300°.
Regular 65537-gon
The area of a regular is (with )
A whole regular is not visually discernible from a circle, and its perimeter differs from that of the circumscribed circle ... |
https://en.wikipedia.org/wiki/Immune%20tolerance | Immune tolerance, or immunological tolerance, or immunotolerance, is a state of unresponsiveness of the immune system to substances or tissue that would otherwise have the capacity to elicit an immune response in a given organism. It is induced by prior exposure to that specific antigen and contrasts with conventional ... |
https://en.wikipedia.org/wiki/Macdonald%20identities | In mathematics, the Macdonald identities are some infinite product identities associated to affine root systems, introduced by . They include as special cases the Jacobi triple product identity, Watson's quintuple product identity, several identities found by , and a 10-fold product identity found by .
and pointed ... |
https://en.wikipedia.org/wiki/Sour%20sanding | Sour sanding, or sour sugar, is a food ingredient that is used to impart a sour flavor, made from citric or tartaric acid and sugar. It is used to coat sour candies such as lemon drops and Sour Patch Kids, or to make hard candies taste tart, such as SweeTarts.
See also
Acidulant
References
Food ingredients |
https://en.wikipedia.org/wiki/Paris%27%20law | Paris' law (also known as the Paris–Erdogan equation) is a crack growth equation that gives the rate of growth of a fatigue crack. The stress intensity factor characterises the load around a crack tip and the rate of crack growth is experimentally shown to be a function of the range of stress intensity seen in a loa... |
https://en.wikipedia.org/wiki/Suslin%20tree | In mathematics, a Suslin tree is a tree of height ω1 such that
every branch and every antichain is at most countable. They are named after Mikhail Yakovlevich Suslin.
Every Suslin tree is an Aronszajn tree.
The existence of a Suslin tree is independent of ZFC, and is equivalent to the existence of a Suslin line (show... |
https://en.wikipedia.org/wiki/Sergei%20Adian | Sergei Ivanovich Adian, also Adyan (; ; 1 January 1931 – 5 May 2020), was a Soviet and Armenian mathematician. He was a professor at the Moscow State University and was known for his work in group theory, especially on the Burnside problem.
Biography
Adian was born near Elizavetpol. He grew up there in an Armenian fam... |
https://en.wikipedia.org/wiki/Waveform%20buffer | In computing, a waveform buffer is a technique for digital synthesis of repeating waveforms. It is common in PC sound cards.
The waveform amplitude values are stored in a buffer memory, which is addressed from a phase generator, with the retrieved value then used as the basis of the synthesized signal. In the phase ge... |
https://en.wikipedia.org/wiki/Pavement%20engineering | Pavement engineering is a branch of civil engineering that uses engineering techniques to design and maintain flexible (asphalt) and rigid (concrete) pavements. This includes streets and highways and involves knowledge of soils, hydraulics, and material properties. Pavement engineering involves new construction as well... |
https://en.wikipedia.org/wiki/Reactive%20planning | In artificial intelligence, reactive planning denotes a group of techniques for action selection by autonomous agents. These techniques differ from classical planning in two aspects. First, they operate in a timely fashion and hence can cope with highly dynamic and unpredictable environments. Second, they compute just... |
https://en.wikipedia.org/wiki/Criticism%20of%20Wikipedia | Most criticism of Wikipedia has been directed toward its content, community of established users, and processes. Critics have questioned its factual reliability, the readability and organization of the articles, the lack of methodical fact-checking, and its political bias. Concerns have also been raised about systemic ... |
https://en.wikipedia.org/wiki/Chipkill |
Chipkill is IBM's trademark for a form of advanced error checking and correcting (ECC) computer memory technology that protects computer memory systems from any single memory chip failure as well as multi-bit errors from any portion of a single memory chip. One simple scheme to perform this function scatters the bits... |
https://en.wikipedia.org/wiki/Linkwitz%E2%80%93Riley%20filter | A Linkwitz–Riley (L-R) filter is an infinite impulse response filter used in Linkwitz–Riley audio crossovers, named after its inventors Siegfried Linkwitz and Russ Riley. This filter type was originally described in Active Crossover Networks for Noncoincident Drivers in the Journal of the Audio Engineering Society. It ... |
https://en.wikipedia.org/wiki/Autocollimator | An autocollimator is an optical instrument for non-contact measurement of angles. They are typically used to align components and measure deflections in optical or mechanical systems. An autocollimator works by projecting an image onto a target mirror and measuring the deflection of the returned image against a scale, ... |
https://en.wikipedia.org/wiki/Eulerian%20number | In combinatorics, the Eulerian number is the number of permutations of the numbers 1 to in which exactly elements are greater than the previous element (permutations with "ascents").
Leonhard Euler investigated them and associated polynomials in his 1755 book Institutiones calculi differentialis.
Other notations... |
https://en.wikipedia.org/wiki/Constructive%20set%20theory | Axiomatic constructive set theory is an approach to mathematical constructivism following the program of axiomatic set theory.
The same first-order language with "" and "" of classical set theory is usually used, so this is not to be confused with a constructive types approach.
On the other hand, some constructive theo... |
https://en.wikipedia.org/wiki/Absolute%20value%20%28algebra%29 | In algebra, an absolute value (also called a valuation, magnitude, or norm, although "norm" usually refers to a specific kind of absolute value on a field) is a function which measures the "size" of elements in a field or integral domain. More precisely, if D is an integral domain, then an absolute value is any mapping... |
https://en.wikipedia.org/wiki/NLTSS | The Network Livermore Timesharing System (NLTSS, also sometimes the New Livermore Time Sharing System) is an operating system that was actively developed at Lawrence Livermore Laboratory (now Lawrence Livermore National Laboratory) from 1979 until about 1988, though it continued to run production applications until 199... |
https://en.wikipedia.org/wiki/Wikipedia | Wikipedia is a free-content online encyclopedia written and maintained by a community of volunteers, collectively known as Wikipedians, through open collaboration and using a wiki-based editing system called MediaWiki. Wikipedia is the largest and most-read reference work in history, and has consistently been one of th... |
https://en.wikipedia.org/wiki/Chain%20of%20trust | In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate. It is intended to ensure that only trusted software and hardware can be used while still retaining flexibility.
Introduction
A chain of trust is designed to allow... |
https://en.wikipedia.org/wiki/Belt%20transect | Belt transects are used in biology, more specifically in biostatistics, to estimate the distribution of organisms in relation to a certain area, such as the seashore or a meadow.
The belt transect method is similar to the line transect method but gives information on abundance as well as presence, or absence of specie... |
https://en.wikipedia.org/wiki/Stabilizer%20code | The theory of quantum error correction plays a prominent role in the practical realization and engineering of
quantum computing and quantum communication devices. The first quantum
error-correcting codes are strikingly similar to classical block codes in their
operation and performance. Quantum error-correcting codes... |
https://en.wikipedia.org/wiki/Lightweight%20software%20test%20automation | Lightweight software test automation is the process of creating and using relatively short and simple computer programs, called lightweight test harnesses, designed to test a software system. Lightweight test automation harnesses are not tied to a particular programming language but are most often implemented with the ... |
https://en.wikipedia.org/wiki/Self-Protecting%20Digital%20Content | Self Protecting Digital Content (SPDC), is a copy protection (digital rights management) architecture which allows restriction of access to, and copying of, the next generation of optical discs and streaming/downloadable content.
Overview
Designed by Cryptography Research, Inc. of San Francisco, SPDC executes code ... |
https://en.wikipedia.org/wiki/Stopping%20power%20%28particle%20radiation%29 | In nuclear and materials physics, stopping power is the retarding force acting on charged particles, typically alpha and beta particles, due to interaction with matter, resulting in loss of particle kinetic energy.
Stopping power is also interpreted as the rate at which a material absorbs the kinetic energy of a charg... |
https://en.wikipedia.org/wiki/Tallyman | A tallyman is an individual who keeps a numerical record with tally marks, historically often on tally sticks.
Vote counter
In Ireland, it is common for political parties to provide private observers when ballot boxes are opened. These tallymen keep a tally of the preferences of visible voting papers and allow an e... |
https://en.wikipedia.org/wiki/Maxwell%20bridge | A Maxwell bridge is a modification to a Wheatstone bridge used to measure an unknown inductance (usually of low Q value) in terms of calibrated resistance and inductance or resistance and capacitance. When the calibrated components are a parallel resistor and capacitor, the bridge is known as a Maxwell bridge. It is n... |
https://en.wikipedia.org/wiki/Mitotic%20recombination | Mitotic recombination is a type of genetic recombination that may occur in somatic cells during their preparation for mitosis in both sexual and asexual organisms. In asexual organisms, the study of mitotic recombination is one way to understand genetic linkage because it is the only source of recombination within an ... |
https://en.wikipedia.org/wiki/SiRFstarIII | SiRFstarIII is a range of high sensitivity GPS microcontroller chips manufactured by SiRF Technology. GPS microcontroller chips interpret signals from GPS satellites and determine the position of the GPS receiver. It was announced in 2004.
Features
SiRFstarIII features:
A 20-channel receiver, which can process the s... |
https://en.wikipedia.org/wiki/Yojimbo%20%28software%29 | Yojimbo is a personal information manager for MacOS by Bare Bones Software. It can store notes, images and media, URLs, web pages, and passwords. Yojimbo can also encrypt any of its contents and store the password in the Keychain. It is Bare Bones' second Cocoa application.
History
Yojimbo was first released on Janua... |
https://en.wikipedia.org/wiki/Marston%20Mat | Marston Mat, more properly called pierced (or perforated) steel planking (PSP), is standardized, perforated steel matting material developed by the United States at the Waterways Experiment Station shortly before World War II, primarily for the rapid construction of temporary runways and landing strips (also misspelled... |
https://en.wikipedia.org/wiki/Aircrack-ng | Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are re... |
https://en.wikipedia.org/wiki/Non-interference%20%28security%29 | Noninterference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984.
Introduction
In simple terms, a computer is modeled as a machine with inputs and outputs. Inputs and outputs are classified as either low (low sensitivity, not highly classified)... |
https://en.wikipedia.org/wiki/Signal%20conditioning | In electronics and signal processing, signal conditioning is the manipulation of an analog signal in such a way that it meets the requirements of the next stage for further processing.
In an analog-to-digital converter (ADC) application, signal conditioning includes voltage or current limiting and anti-aliasing filte... |
https://en.wikipedia.org/wiki/Recursive%20grammar | In computer science, a grammar is informally called a recursive grammar if it contains production rules that are recursive, meaning that expanding a non-terminal according to these rules can eventually lead to a string that includes the same non-terminal again. Otherwise it is called a non-recursive grammar.
For examp... |
https://en.wikipedia.org/wiki/FLAGS%20register | The FLAGS register is the status register that contains the current state of an x86 CPU. The size and meanings of the flag bits are architecture dependent. It usually reflects the result of arithmetic operations as well as information about restrictions placed on the CPU operation at the current time. Some of those res... |
https://en.wikipedia.org/wiki/Pixelplus | Pixel Plus, is a proprietary digital filter image processing technology developed by Philips, who claims that it enhances the display of analogue broadcast signals on their TVs.
Pixel Plus interpolates the broadcast signal to increase the picture size by one third, from 625 lines to 833 lines. It also doubles the hori... |
https://en.wikipedia.org/wiki/List%20of%20desktop%20publishing%20software | The following is a list of major desktop publishing software. A wide range of related software tools exist in this field including many plug-ins and tools related to the applications listed below.
Several software directories provide more comprehensive listings of desktop publishing software, including VersionTracker ... |
https://en.wikipedia.org/wiki/Initiation%20factor | Initiation factors are proteins that bind to the small subunit of the ribosome during the initiation of translation, a part of protein biosynthesis.
Initiation factors can interact with repressors to slow down or prevent translation. They have the ability to interact with activators to help them start or increase the ... |
https://en.wikipedia.org/wiki/Mercury%28II%29%20iodide | Mercury(II) iodide is a chemical compound with the molecular formula HgI2. It is typically produced synthetically but can also be found in nature as the extremely rare mineral coccinite. Unlike the related mercury(II) chloride it is hardly soluble in water (<100 ppm).
Production
Mercury(II) iodide is produced by addin... |
https://en.wikipedia.org/wiki/Park%20Grass%20Experiment | The Park Grass Experiment is a biological study originally set up to test the effect of fertilizers and manures on hay yields. The scientific experiment is located at the Rothamsted Research in the English county of Hertfordshire, and is notable as one of the longest-running experiments of modern science, as it was ini... |
https://en.wikipedia.org/wiki/Applied%20general%20equilibrium | In mathematical economics, applied general equilibrium (AGE) models were pioneered by Herbert Scarf at Yale University in 1967, in two papers, and a follow-up book with Terje Hansen in 1973, with the aim of empirically estimating the Arrow–Debreu model of general equilibrium theory with empirical data, to provide "“a g... |
https://en.wikipedia.org/wiki/Government%20Paperwork%20Elimination%20Act | The Government Paperwork Elimination Act (GPEA, Title XVII) requires that, when practicable, federal agencies use electronic forms, electronic filing, and electronic signatures to conduct official business with the public by 2003. In doing this, agencies will create records with business, legal and, in some cases, his... |
https://en.wikipedia.org/wiki/Postage%20stamp%20problem | The postage stamp problem is a mathematical riddle that asks what is the smallest postage value which cannot be placed on an envelope, if the latter can hold only a limited number of stamps, and these may only have certain specified face values.
For example, suppose the envelope can hold only three stamps, and the ava... |
https://en.wikipedia.org/wiki/Unihemispheric%20slow-wave%20sleep | Unihemispheric slow-wave sleep (USWS) is sleep where one half of the brain rests while the other half remains alert. This is in contrast to normal sleep where both eyes are shut and both halves of the brain show unconsciousness. In USWS, also known as asymmetric slow-wave sleep, one half of the brain is in deep sleep, ... |
https://en.wikipedia.org/wiki/Trivers%E2%80%93Willard%20hypothesis | In evolutionary biology and evolutionary psychology, the Trivers–Willard hypothesis, formally proposed by Robert Trivers and Dan Willard in 1973, suggests that female mammals adjust the sex ratio of offspring in response to maternal condition, so as to maximize their reproductive success (fitness). For example, it may ... |
https://en.wikipedia.org/wiki/Gyration%20tensor | In physics, the gyration tensor is a tensor that describes the second moments of position of a collection of particles
where is the
Cartesian coordinate of the position vector of the
particle. The origin of the coordinate system has been chosen such that
i.e. in the system of the center of mass . Where
Anothe... |
https://en.wikipedia.org/wiki/Active-pixel%20sensor | An active-pixel sensor (APS) is an image sensor, which was invented by Peter J.W. Noble in 1968, where each pixel sensor unit cell has a photodetector (typically a pinned photodiode) and one or more active transistors. In a metal–oxide–semiconductor (MOS) active-pixel sensor, MOS field-effect transistors (MOSFETs) are ... |
https://en.wikipedia.org/wiki/LCS35 | LCS35 is a cryptographic challenge and a puzzle set by Ron Rivest in 1999. The challenge is to calculate the value
where t is a 14-digit (or 47-bit) integer, namely 79685186856218, and n is a 616 digit (or 2048 bit) integer which is the product of two large primes (which are not given). The value of w can then be used... |
https://en.wikipedia.org/wiki/God%27s%20algorithm | God's algorithm is a notion originating in discussions of ways to solve the Rubik's Cube puzzle, but which can also be applied to other combinatorial puzzles and mathematical games. It refers to any algorithm which produces a solution having the fewest possible moves. The allusion to the deity is based on the notion th... |
https://en.wikipedia.org/wiki/HTTP%20cookie | HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and mor... |
https://en.wikipedia.org/wiki/Widom%20scaling | Widom scaling (after Benjamin Widom) is a hypothesis in statistical mechanics regarding the free energy of a magnetic system near its critical point which leads to the critical exponents becoming no longer independent so that they can be parameterized in terms of two values. The hypothesis can be seen to arise as a nat... |
https://en.wikipedia.org/wiki/Singapore%20Mathematical%20Olympiad | The Singapore Mathematical Olympiad (SMO) is a mathematics competition organised by the Singapore Mathematical Society. It comprises three sections, Junior, Senior and Open, each of which is open to all pre-university students studying in Singapore who meet the age requirements for the particular section. The competiti... |
https://en.wikipedia.org/wiki/Venezuelan%20equine%20encephalitis%20virus | Venezuelan equine encephalitis virus is a mosquito-borne viral pathogen that causes Venezuelan equine encephalitis or encephalomyelitis (VEE). VEE can affect all equine species, such as horses, donkeys, and zebras. After infection, equines may suddenly die or show progressive central nervous system disorders. Humans al... |
https://en.wikipedia.org/wiki/Jonathan%20Partington | Jonathan Richard Partington (born 4 February 1955) is an English mathematician who is Emeritus Professor of pure mathematics at the University of Leeds.
Education
Professor Partington was educated at Gresham's School, Holt, and Trinity College, Cambridge, where he completed his PhD thesis entitled "Numerical ranges an... |
https://en.wikipedia.org/wiki/Fibre%20Channel%20network%20protocols | Communication between devices in a fibre channel network uses different elements of Fibre Channel standards.
Transmission words and ordered sets
All Fibre Channel communication is done in units of four 10-bit codes. This group of 4 codes is called a transmission word.
An ordered set is a transmission word that includ... |
https://en.wikipedia.org/wiki/Gerchberg%E2%80%93Saxton%20algorithm | The Gerchberg–Saxton (GS) algorithm is an iterative phase retrieval algorithm for retrieving the phase of a complex-valued wavefront from two intensity measurements acquired in two different planes. Typically, the two planes are the image plane and the far field (diffraction) plane, and the wavefront propagation betwee... |
https://en.wikipedia.org/wiki/Interface%20control%20document | An interface control document (ICD) in systems engineering
and software engineering, provides a record of all interface information (such as drawings, diagrams, tables, and textual information) generated for a project. The underlying interface documents provide the details and describe the interface or interfaces bet... |
https://en.wikipedia.org/wiki/Rack%20lift | A rack lift is a type of elevator which consists of a cage attached to vertical rails affixed to the walls of a tower or shaft and which is propelled up and down by means of an electric motor which drives a pinion gear that engages a rack gear which is also attached to the wall between the rails.
References
Elevators |
https://en.wikipedia.org/wiki/Pseudonormal%20space | In mathematics, in the field of topology, a topological space is said to be pseudonormal if given two disjoint closed sets in it, one of which is countable, there are disjoint open sets containing them. Note the following:
Every normal space is pseudonormal.
Every pseudonormal space is regular.
An example of a pseud... |
https://en.wikipedia.org/wiki/Perfect%20set | In general topology, a subset of a topological space is perfect if it is closed and has no isolated points. Equivalently: the set is perfect if , where denotes the set of all limit points of , also known as the derived set of .
In a perfect set, every point can be approximated arbitrarily well by other points from ... |
https://en.wikipedia.org/wiki/Chip%20PC%20Technologies | Chip PC Technologies is a developer and manufacturer of thin client solutions and management software for server-based computing; where in a network architecture applications are deployed, managed and can be fully executed on the server.
History
Chip PC was founded in 2000 by Aviv Soffer and Ora Meir Soffer and raised... |
https://en.wikipedia.org/wiki/Ugly%20duckling%20theorem | The ugly duckling theorem is an argument showing that classification is not really possible without some sort of bias. More particularly, it assumes finitely many properties combinable by logical connectives, and finitely many objects; it asserts that any two different objects share the same number of (extensional) pro... |
https://en.wikipedia.org/wiki/Black%20hole%20%28networking%29 | In networking, a black hole, also known as a block hole, refers to a place in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient.
When examining the topology of the network, the black holes themselves are ... |
https://en.wikipedia.org/wiki/Regular%20tree%20grammar | In theoretical computer science and formal language theory, a regular tree grammar is a formal grammar that describes a set of directed trees, or terms. A regular word grammar can be seen as a special kind of regular tree grammar, describing a set of single-path trees.
Definition
A regular tree grammar G is defined b... |
https://en.wikipedia.org/wiki/WiiConnect24 | WiiConnect24 was a feature of the Nintendo Wi-Fi Connection for the Wii console. It was first announced at Electronic Entertainment Expo (E3) in mid-2006 by Nintendo. It enabled the user to remain connected to the Internet while the console was on standby. For example, in Animal Crossing: City Folk, a friend could send... |
https://en.wikipedia.org/wiki/Bennett%20House%20%28Franklin%2C%20Tennessee%29 | The Bennett House is a recording studio located on 4th Avenue North in Franklin, Tennessee.
Built in 1875, the two-story building has served as a residence, a clothing store, and, starting in 1980, a recording studio used by many popular music artists when recording in Tennessee. Artists that have frequently recorded... |
https://en.wikipedia.org/wiki/Extraordinary%20optical%20transmission | Extraordinary optical transmission (EOT) is the phenomenon of greatly enhanced transmission of light through a subwavelength aperture in an otherwise opaque metallic film which has been patterned with a regularly repeating periodic structure. Generally when light of a certain wavelength falls on a subwavelength apertu... |
https://en.wikipedia.org/wiki/Autapomorphy | In phylogenetics, an autapomorphy is a distinctive feature, known as a derived trait, that is unique to a given taxon. That is, it is found only in one taxon, but not found in any others or outgroup taxa, not even those most closely related to the focal taxon (which may be a species, family or in general any clade). I... |
https://en.wikipedia.org/wiki/Prelink | In computing, prebinding, also called prelinking, is a method for optimizing application load times by resolving library symbols prior to launch.
Background
Most computer programs consist of code that requires external shared libraries to execute. These libraries are normally integrated with the program at run time ... |
https://en.wikipedia.org/wiki/Juvenile%20%28organism%29 | A juvenile is an individual organism (especially an animal) that has not yet reached its adult form, sexual maturity or size. Juveniles can look very different from the adult form, particularly in colour, and may not fill the same niche as the adult form. In many organisms the juvenile has a different name from the adu... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.