source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Paraboloidal%20coordinates
Paraboloidal coordinates are three-dimensional orthogonal coordinates that generalize two-dimensional parabolic coordinates. They possess elliptic paraboloids as one-coordinate surfaces. As such, they should be distinguished from parabolic cylindrical coordinates and parabolic rotational coordinates, both of which are...
https://en.wikipedia.org/wiki/Oblate%20spheroidal%20coordinates
Oblate spheroidal coordinates are a three-dimensional orthogonal coordinate system that results from rotating the two-dimensional elliptic coordinate system about the non-focal axis of the ellipse, i.e., the symmetry axis that separates the foci. Thus, the two foci are transformed into a ring of radius in the x-y plan...
https://en.wikipedia.org/wiki/Ellipsoidal%20coordinates
Ellipsoidal coordinates are a three-dimensional orthogonal coordinate system that generalizes the two-dimensional elliptic coordinate system. Unlike most three-dimensional orthogonal coordinate systems that feature quadratic coordinate surfaces, the ellipsoidal coordinate system is based on confocal quadrics. Basic ...
https://en.wikipedia.org/wiki/Conical%20coordinates
Conical coordinates, sometimes called sphero-conal or sphero-conical coordinates, are a three-dimensional orthogonal coordinate system consisting of concentric spheres (described by their radius ) and by two families of perpendicular elliptic cones, aligned along the - and -axes, respectively. The intersection between...
https://en.wikipedia.org/wiki/Micro-operation
In computer central processing units, micro-operations (also known as micro-ops or μops, historically also as micro-actions) are detailed low-level instructions used in some designs to implement complex machine instructions (sometimes termed macro-instructions in this context). Usually, micro-operations perform basic ...
https://en.wikipedia.org/wiki/Metalink
Metalink is an extensible metadata file format that describes one or more computer files available for download. It specifies files appropriate for the user's language and operating system; facilitates file verification and recovery from data corruption; and lists alternate download sources (mirror URIs). The metadata...
https://en.wikipedia.org/wiki/Inauthentic%20text
An inauthentic text is a computer-generated expository document meant to appear as genuine, but which is actually meaningless. Frequently they are created in order to be intermixed with genuine documents and thus manipulate the results of search engines, as with Spam blogs. They are also carried along in email in ord...
https://en.wikipedia.org/wiki/Microsoft%20Fingerprint%20Reader
Microsoft Fingerprint Reader was a device sold by Microsoft, primarily for homes and small businesses. The underlying software providing the biometrics was developed by Digital Persona. Fingerprint readers are more secure, reliable and convenient than a normal traditional password, although they have been subject t...
https://en.wikipedia.org/wiki/ClamTk
ClamTk is a free software graphical interface for the ClamAV command line antivirus software program, for Linux desktop users. It provides both on-demand and scheduled scanning. The project was started by Dave Mauroni in February 2004 and remains under development. ClamTk was originally written using the Tk widget too...
https://en.wikipedia.org/wiki/Enterprise%20Distributed%20Object%20Computing
The UML profile for Enterprise Distributed Object Computing (EDOC) is a standard of the Object Management Group in support of open distributed computing using model-driven architecture and service-oriented architecture. Its aim is to simplify the development of component based (EDOC) systems by providing a UML-based m...
https://en.wikipedia.org/wiki/Reglet
A reglet is found on the exterior of a building along a masonry wall, chimney or parapet that meets the roof. It is a groove cut within a mortar joint that receives counter-flashing meant to cover surface flashing used to deflect water infiltration. Reglet can also refer to the counter-flashing itself when it is applie...
https://en.wikipedia.org/wiki/Korea%20Atomic%20Energy%20Research%20Institute
The Korea Atomic Energy Research Institute (KAERI) in Daejeon, South Korea was established in 1959 as the sole professional research-oriented institute for nuclear power in South Korea, and has rapidly built a reputation for research and development in various fields. History KAERI was established in 1959 as the Atom...
https://en.wikipedia.org/wiki/Memory%20latency
Memory latency is the time (the latency) between initiating a request for a byte or word in memory until it is retrieved by a processor. If the data are not in the processor's cache, it takes longer to obtain them, as the processor will have to communicate with the external memory cells. Latency is therefore a fundamen...
https://en.wikipedia.org/wiki/Dermatoglyphics
Dermatoglyphics (from Ancient Greek derma, "skin", and glyph, "carving") is the scientific study of fingerprints, lines, mounts and shapes of hands, as distinct from the superficially similar pseudoscience of palmistry. Dermatoglyphics also refers to the making of naturally occurring ridges on certain body parts, name...
https://en.wikipedia.org/wiki/Rushbrooke%20inequality
In statistical mechanics, the Rushbrooke inequality relates the critical exponents of a magnetic system which exhibits a first-order phase transition in the thermodynamic limit for non-zero temperature T. Since the Helmholtz free energy is extensive, the normalization to free energy per site is given as The magnetiz...
https://en.wikipedia.org/wiki/Bulk%20soil
Bulk soil is soil outside the rhizosphere that is not penetrated by plant roots. The bulk soil is like an ecosystem, it is made up of many things such as: nutrients, ions, soil particles, and root exudates. There are many different interactions that occur between all the members of the bulk soil. Natural organic compo...
https://en.wikipedia.org/wiki/Raise%20borer
A raise borer is a machine used in underground mining, to excavate a circular hole between two levels of a mine without the use of explosives. The raise borer is set up on the upper level of the two levels to be connected, on an evenly laid platform (typically a concrete pad). A small-diameter hole (pilot hole) is dri...
https://en.wikipedia.org/wiki/Co-adaptation
In biology, co-adaptation is the process by which two or more species, genes or phenotypic traits undergo adaptation as a pair or group. This occurs when two or more interacting characteristics undergo natural selection together in response to the same selective pressure or when selective pressures alter one characteri...
https://en.wikipedia.org/wiki/HM%20Government%20Communications%20Centre
His Majesty's Government Communications Centre (HMGCC) is an organisation which provides electronics and software to support the communication needs of the British Government. Based at Hanslope Park, near Milton Keynes in Buckinghamshire, it is closely linked with the Foreign, Commonwealth and Development Office and th...
https://en.wikipedia.org/wiki/Svenskt%20Diplomatarium
Svenskt Diplomatarium (also known under the Latin name Diplomatarium Suecanum) is a series of critical editions of medieval Swedish documents or documents pertaining to the history of Sweden (in Swedish, Latin and other languages). Begun in the 1820s by the antiquarian Johan Gustaf Liljegren and inactive for periods, ...
https://en.wikipedia.org/wiki/TMS6100
The Texas Instruments TMS6100 is a 1 or 4-bit serial mask (factory)-programmed read-only memory IC. It is a companion chip to the TMS5100, CD2802, TMS5110, (rarely) TMS5200, and (rarely) TMS5220 speech synthesizer ICs, and was mask-programmed with LPC data required for a specific product. It holds 128Kib (16KiB) of dat...
https://en.wikipedia.org/wiki/Conway%20polyhedron%20notation
In geometry, Conway polyhedron notation, invented by John Horton Conway and promoted by George W. Hart, is used to describe polyhedra based on a seed polyhedron modified by various prefix operations. Conway and Hart extended the idea of using operators, like truncation as defined by Kepler, to build related polyhedra ...
https://en.wikipedia.org/wiki/End%20of%20message
End of message or EOM (as in "(EOM)" or "<EOM>") signifies the end of a message, often an e-mail message. Usage The subject of an e-mail message may contain such an abbreviation to signify that all content is in the subject line so that the message itself does not need to be opened (e.g., "No classes Monday (EOM)" or ...
https://en.wikipedia.org/wiki/Non-explosive%20demolition%20agents
Non-explosive demolition agents are chemicals that are an alternative to explosives and gas pressure blasting products in demolition, mining, and quarrying. To use non-explosive demolition agents in demolition or quarrying, holes are drilled in the base rock as they would be for use with conventional explosives. A slur...
https://en.wikipedia.org/wiki/Efferent%20coupling
Efferent coupling is a coupling metric in software development. It measures the number of data types a class knows about. This includes inheritance, interface implementation, parameter types, variable types, and exceptions. This has also been referred to by Robert C. Martin as the Fan-out stability metric which in hi...
https://en.wikipedia.org/wiki/University%20of%20New%20Hampshire%20InterOperability%20Laboratory
The University of New Hampshire InterOperability Laboratory (UNH-IOL) is an independent test facility that provides interoperability and standards conformance testing for networking, telecommunications, data storage, and consumer technology products. Founded in 1988, it employs approximately 25 full-time staff members...
https://en.wikipedia.org/wiki/Rose%20%28heraldry%29
The rose is a common device in heraldry. It is often used both as a charge on a coat of arms and by itself as an heraldic badge. The heraldic rose has a stylized form consisting of five symmetrical lobes, five barbs, and a circular seed. The rose is one of the most common plant symbols in heraldry, together with the l...
https://en.wikipedia.org/wiki/Apollonian%20circles
In geometry, Apollonian circles are two families (pencils) of circles such that every circle in the first family intersects every circle in the second family orthogonally, and vice versa. These circles form the basis for bipolar coordinates. They were discovered by Apollonius of Perga, a renowned Greek geometer. Defin...
https://en.wikipedia.org/wiki/257-gon
In Geometry, 257-gon, also known broadly as the Dihectapentacontakaiheptagon, is a polygon with 257 sides. The sum of the interior angles of any non-self-intersecting 257-gon is 45,900°. Regular 257-gon The area of a regular 257-gon is (with ) A whole regular 257-gon is not visually discernible from a circle, and it...
https://en.wikipedia.org/wiki/65537-gon
In geometry, a 65537-gon is a polygon with 65,537 (216 + 1) sides. The sum of the interior angles of any non–self-intersecting is 11796300°. Regular 65537-gon The area of a regular is (with ) A whole regular is not visually discernible from a circle, and its perimeter differs from that of the circumscribed circle ...
https://en.wikipedia.org/wiki/Immune%20tolerance
Immune tolerance, or immunological tolerance, or immunotolerance, is a state of unresponsiveness of the immune system to substances or tissue that would otherwise have the capacity to elicit an immune response in a given organism. It is induced by prior exposure to that specific antigen and contrasts with conventional ...
https://en.wikipedia.org/wiki/Macdonald%20identities
In mathematics, the Macdonald identities are some infinite product identities associated to affine root systems, introduced by . They include as special cases the Jacobi triple product identity, Watson's quintuple product identity, several identities found by , and a 10-fold product identity found by . and pointed ...
https://en.wikipedia.org/wiki/Sour%20sanding
Sour sanding, or sour sugar, is a food ingredient that is used to impart a sour flavor, made from citric or tartaric acid and sugar. It is used to coat sour candies such as lemon drops and Sour Patch Kids, or to make hard candies taste tart, such as SweeTarts. See also Acidulant References Food ingredients
https://en.wikipedia.org/wiki/Paris%27%20law
Paris' law (also known as the Paris–Erdogan equation) is a crack growth equation that gives the rate of growth of a fatigue crack. The stress intensity factor characterises the load around a crack tip and the rate of crack growth is experimentally shown to be a function of the range of stress intensity seen in a loa...
https://en.wikipedia.org/wiki/Suslin%20tree
In mathematics, a Suslin tree is a tree of height ω1 such that every branch and every antichain is at most countable. They are named after Mikhail Yakovlevich Suslin. Every Suslin tree is an Aronszajn tree. The existence of a Suslin tree is independent of ZFC, and is equivalent to the existence of a Suslin line (show...
https://en.wikipedia.org/wiki/Sergei%20Adian
Sergei Ivanovich Adian, also Adyan (; ; 1 January 1931 – 5 May 2020), was a Soviet and Armenian mathematician. He was a professor at the Moscow State University and was known for his work in group theory, especially on the Burnside problem. Biography Adian was born near Elizavetpol. He grew up there in an Armenian fam...
https://en.wikipedia.org/wiki/Waveform%20buffer
In computing, a waveform buffer is a technique for digital synthesis of repeating waveforms. It is common in PC sound cards. The waveform amplitude values are stored in a buffer memory, which is addressed from a phase generator, with the retrieved value then used as the basis of the synthesized signal. In the phase ge...
https://en.wikipedia.org/wiki/Pavement%20engineering
Pavement engineering is a branch of civil engineering that uses engineering techniques to design and maintain flexible (asphalt) and rigid (concrete) pavements. This includes streets and highways and involves knowledge of soils, hydraulics, and material properties. Pavement engineering involves new construction as well...
https://en.wikipedia.org/wiki/Reactive%20planning
In artificial intelligence, reactive planning denotes a group of techniques for action selection by autonomous agents. These techniques differ from classical planning in two aspects. First, they operate in a timely fashion and hence can cope with highly dynamic and unpredictable environments. Second, they compute just...
https://en.wikipedia.org/wiki/Criticism%20of%20Wikipedia
Most criticism of Wikipedia has been directed toward its content, community of established users, and processes. Critics have questioned its factual reliability, the readability and organization of the articles, the lack of methodical fact-checking, and its political bias. Concerns have also been raised about systemic ...
https://en.wikipedia.org/wiki/Chipkill
Chipkill is IBM's trademark for a form of advanced error checking and correcting (ECC) computer memory technology that protects computer memory systems from any single memory chip failure as well as multi-bit errors from any portion of a single memory chip. One simple scheme to perform this function scatters the bits...
https://en.wikipedia.org/wiki/Linkwitz%E2%80%93Riley%20filter
A Linkwitz–Riley (L-R) filter is an infinite impulse response filter used in Linkwitz–Riley audio crossovers, named after its inventors Siegfried Linkwitz and Russ Riley. This filter type was originally described in Active Crossover Networks for Noncoincident Drivers in the Journal of the Audio Engineering Society. It ...
https://en.wikipedia.org/wiki/Autocollimator
An autocollimator is an optical instrument for non-contact measurement of angles. They are typically used to align components and measure deflections in optical or mechanical systems. An autocollimator works by projecting an image onto a target mirror and measuring the deflection of the returned image against a scale, ...
https://en.wikipedia.org/wiki/Eulerian%20number
In combinatorics, the Eulerian number is the number of permutations of the numbers 1 to in which exactly elements are greater than the previous element (permutations with "ascents"). Leonhard Euler investigated them and associated polynomials in his 1755 book Institutiones calculi differentialis. Other notations...
https://en.wikipedia.org/wiki/Constructive%20set%20theory
Axiomatic constructive set theory is an approach to mathematical constructivism following the program of axiomatic set theory. The same first-order language with "" and "" of classical set theory is usually used, so this is not to be confused with a constructive types approach. On the other hand, some constructive theo...
https://en.wikipedia.org/wiki/Absolute%20value%20%28algebra%29
In algebra, an absolute value (also called a valuation, magnitude, or norm, although "norm" usually refers to a specific kind of absolute value on a field) is a function which measures the "size" of elements in a field or integral domain. More precisely, if D is an integral domain, then an absolute value is any mapping...
https://en.wikipedia.org/wiki/NLTSS
The Network Livermore Timesharing System (NLTSS, also sometimes the New Livermore Time Sharing System) is an operating system that was actively developed at Lawrence Livermore Laboratory (now Lawrence Livermore National Laboratory) from 1979 until about 1988, though it continued to run production applications until 199...
https://en.wikipedia.org/wiki/Wikipedia
Wikipedia is a free-content online encyclopedia written and maintained by a community of volunteers, collectively known as Wikipedians, through open collaboration and using a wiki-based editing system called MediaWiki. Wikipedia is the largest and most-read reference work in history, and has consistently been one of th...
https://en.wikipedia.org/wiki/Chain%20of%20trust
In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate. It is intended to ensure that only trusted software and hardware can be used while still retaining flexibility. Introduction A chain of trust is designed to allow...
https://en.wikipedia.org/wiki/Belt%20transect
Belt transects are used in biology, more specifically in biostatistics, to estimate the distribution of organisms in relation to a certain area, such as the seashore or a meadow. The belt transect method is similar to the line transect method but gives information on abundance as well as presence, or absence of specie...
https://en.wikipedia.org/wiki/Stabilizer%20code
The theory of quantum error correction plays a prominent role in the practical realization and engineering of quantum computing and quantum communication devices. The first quantum error-correcting codes are strikingly similar to classical block codes in their operation and performance. Quantum error-correcting codes...
https://en.wikipedia.org/wiki/Lightweight%20software%20test%20automation
Lightweight software test automation is the process of creating and using relatively short and simple computer programs, called lightweight test harnesses, designed to test a software system. Lightweight test automation harnesses are not tied to a particular programming language but are most often implemented with the ...
https://en.wikipedia.org/wiki/Self-Protecting%20Digital%20Content
Self Protecting Digital Content (SPDC), is a copy protection (digital rights management) architecture which allows restriction of access to, and copying of, the next generation of optical discs and streaming/downloadable content. Overview Designed by Cryptography Research, Inc. of San Francisco, SPDC executes code ...
https://en.wikipedia.org/wiki/Stopping%20power%20%28particle%20radiation%29
In nuclear and materials physics, stopping power is the retarding force acting on charged particles, typically alpha and beta particles, due to interaction with matter, resulting in loss of particle kinetic energy. Stopping power is also interpreted as the rate at which a material absorbs the kinetic energy of a charg...
https://en.wikipedia.org/wiki/Tallyman
A tallyman is an individual who keeps a numerical record with tally marks, historically often on tally sticks. Vote counter In Ireland, it is common for political parties to provide private observers when ballot boxes are opened. These tallymen keep a tally of the preferences of visible voting papers and allow an e...
https://en.wikipedia.org/wiki/Maxwell%20bridge
A Maxwell bridge is a modification to a Wheatstone bridge used to measure an unknown inductance (usually of low Q value) in terms of calibrated resistance and inductance or resistance and capacitance. When the calibrated components are a parallel resistor and capacitor, the bridge is known as a Maxwell bridge. It is n...
https://en.wikipedia.org/wiki/Mitotic%20recombination
Mitotic recombination is a type of genetic recombination that may occur in somatic cells during their preparation for mitosis in both sexual and asexual organisms. In asexual organisms, the study of mitotic recombination is one way to understand genetic linkage because it is the only source of recombination within an ...
https://en.wikipedia.org/wiki/SiRFstarIII
SiRFstarIII is a range of high sensitivity GPS microcontroller chips manufactured by SiRF Technology. GPS microcontroller chips interpret signals from GPS satellites and determine the position of the GPS receiver. It was announced in 2004. Features SiRFstarIII features: A 20-channel receiver, which can process the s...
https://en.wikipedia.org/wiki/Yojimbo%20%28software%29
Yojimbo is a personal information manager for MacOS by Bare Bones Software. It can store notes, images and media, URLs, web pages, and passwords. Yojimbo can also encrypt any of its contents and store the password in the Keychain. It is Bare Bones' second Cocoa application. History Yojimbo was first released on Janua...
https://en.wikipedia.org/wiki/Marston%20Mat
Marston Mat, more properly called pierced (or perforated) steel planking (PSP), is standardized, perforated steel matting material developed by the United States at the Waterways Experiment Station shortly before World War II, primarily for the rapid construction of temporary runways and landing strips (also misspelled...
https://en.wikipedia.org/wiki/Aircrack-ng
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are re...
https://en.wikipedia.org/wiki/Non-interference%20%28security%29
Noninterference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984. Introduction In simple terms, a computer is modeled as a machine with inputs and outputs. Inputs and outputs are classified as either low (low sensitivity, not highly classified)...
https://en.wikipedia.org/wiki/Signal%20conditioning
In electronics and signal processing, signal conditioning is the manipulation of an analog signal in such a way that it meets the requirements of the next stage for further processing. In an analog-to-digital converter (ADC) application, signal conditioning includes voltage or current limiting and anti-aliasing filte...
https://en.wikipedia.org/wiki/Recursive%20grammar
In computer science, a grammar is informally called a recursive grammar if it contains production rules that are recursive, meaning that expanding a non-terminal according to these rules can eventually lead to a string that includes the same non-terminal again. Otherwise it is called a non-recursive grammar. For examp...
https://en.wikipedia.org/wiki/FLAGS%20register
The FLAGS register is the status register that contains the current state of an x86 CPU. The size and meanings of the flag bits are architecture dependent. It usually reflects the result of arithmetic operations as well as information about restrictions placed on the CPU operation at the current time. Some of those res...
https://en.wikipedia.org/wiki/Pixelplus
Pixel Plus, is a proprietary digital filter image processing technology developed by Philips, who claims that it enhances the display of analogue broadcast signals on their TVs. Pixel Plus interpolates the broadcast signal to increase the picture size by one third, from 625 lines to 833 lines. It also doubles the hori...
https://en.wikipedia.org/wiki/List%20of%20desktop%20publishing%20software
The following is a list of major desktop publishing software. A wide range of related software tools exist in this field including many plug-ins and tools related to the applications listed below. Several software directories provide more comprehensive listings of desktop publishing software, including VersionTracker ...
https://en.wikipedia.org/wiki/Initiation%20factor
Initiation factors are proteins that bind to the small subunit of the ribosome during the initiation of translation, a part of protein biosynthesis. Initiation factors can interact with repressors to slow down or prevent translation. They have the ability to interact with activators to help them start or increase the ...
https://en.wikipedia.org/wiki/Mercury%28II%29%20iodide
Mercury(II) iodide is a chemical compound with the molecular formula HgI2. It is typically produced synthetically but can also be found in nature as the extremely rare mineral coccinite. Unlike the related mercury(II) chloride it is hardly soluble in water (<100 ppm). Production Mercury(II) iodide is produced by addin...
https://en.wikipedia.org/wiki/Park%20Grass%20Experiment
The Park Grass Experiment is a biological study originally set up to test the effect of fertilizers and manures on hay yields. The scientific experiment is located at the Rothamsted Research in the English county of Hertfordshire, and is notable as one of the longest-running experiments of modern science, as it was ini...
https://en.wikipedia.org/wiki/Applied%20general%20equilibrium
In mathematical economics, applied general equilibrium (AGE) models were pioneered by Herbert Scarf at Yale University in 1967, in two papers, and a follow-up book with Terje Hansen in 1973, with the aim of empirically estimating the Arrow–Debreu model of general equilibrium theory with empirical data, to provide "“a g...
https://en.wikipedia.org/wiki/Government%20Paperwork%20Elimination%20Act
The Government Paperwork Elimination Act (GPEA, Title XVII) requires that, when practicable, federal agencies use electronic forms, electronic filing, and electronic signatures to conduct official business with the public by 2003. In doing this, agencies will create records with business, legal and, in some cases, his...
https://en.wikipedia.org/wiki/Postage%20stamp%20problem
The postage stamp problem is a mathematical riddle that asks what is the smallest postage value which cannot be placed on an envelope, if the latter can hold only a limited number of stamps, and these may only have certain specified face values. For example, suppose the envelope can hold only three stamps, and the ava...
https://en.wikipedia.org/wiki/Unihemispheric%20slow-wave%20sleep
Unihemispheric slow-wave sleep (USWS) is sleep where one half of the brain rests while the other half remains alert. This is in contrast to normal sleep where both eyes are shut and both halves of the brain show unconsciousness. In USWS, also known as asymmetric slow-wave sleep, one half of the brain is in deep sleep, ...
https://en.wikipedia.org/wiki/Trivers%E2%80%93Willard%20hypothesis
In evolutionary biology and evolutionary psychology, the Trivers–Willard hypothesis, formally proposed by Robert Trivers and Dan Willard in 1973, suggests that female mammals adjust the sex ratio of offspring in response to maternal condition, so as to maximize their reproductive success (fitness). For example, it may ...
https://en.wikipedia.org/wiki/Gyration%20tensor
In physics, the gyration tensor is a tensor that describes the second moments of position of a collection of particles where is the Cartesian coordinate of the position vector of the particle. The origin of the coordinate system has been chosen such that i.e. in the system of the center of mass . Where Anothe...
https://en.wikipedia.org/wiki/Active-pixel%20sensor
An active-pixel sensor (APS) is an image sensor, which was invented by Peter J.W. Noble in 1968, where each pixel sensor unit cell has a photodetector (typically a pinned photodiode) and one or more active transistors. In a metal–oxide–semiconductor (MOS) active-pixel sensor, MOS field-effect transistors (MOSFETs) are ...
https://en.wikipedia.org/wiki/LCS35
LCS35 is a cryptographic challenge and a puzzle set by Ron Rivest in 1999. The challenge is to calculate the value where t is a 14-digit (or 47-bit) integer, namely 79685186856218, and n is a 616 digit (or 2048 bit) integer which is the product of two large primes (which are not given). The value of w can then be used...
https://en.wikipedia.org/wiki/God%27s%20algorithm
God's algorithm is a notion originating in discussions of ways to solve the Rubik's Cube puzzle, but which can also be applied to other combinatorial puzzles and mathematical games. It refers to any algorithm which produces a solution having the fewest possible moves. The allusion to the deity is based on the notion th...
https://en.wikipedia.org/wiki/HTTP%20cookie
HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and mor...
https://en.wikipedia.org/wiki/Widom%20scaling
Widom scaling (after Benjamin Widom) is a hypothesis in statistical mechanics regarding the free energy of a magnetic system near its critical point which leads to the critical exponents becoming no longer independent so that they can be parameterized in terms of two values. The hypothesis can be seen to arise as a nat...
https://en.wikipedia.org/wiki/Singapore%20Mathematical%20Olympiad
The Singapore Mathematical Olympiad (SMO) is a mathematics competition organised by the Singapore Mathematical Society. It comprises three sections, Junior, Senior and Open, each of which is open to all pre-university students studying in Singapore who meet the age requirements for the particular section. The competiti...
https://en.wikipedia.org/wiki/Venezuelan%20equine%20encephalitis%20virus
Venezuelan equine encephalitis virus is a mosquito-borne viral pathogen that causes Venezuelan equine encephalitis or encephalomyelitis (VEE). VEE can affect all equine species, such as horses, donkeys, and zebras. After infection, equines may suddenly die or show progressive central nervous system disorders. Humans al...
https://en.wikipedia.org/wiki/Jonathan%20Partington
Jonathan Richard Partington (born 4 February 1955) is an English mathematician who is Emeritus Professor of pure mathematics at the University of Leeds. Education Professor Partington was educated at Gresham's School, Holt, and Trinity College, Cambridge, where he completed his PhD thesis entitled "Numerical ranges an...
https://en.wikipedia.org/wiki/Fibre%20Channel%20network%20protocols
Communication between devices in a fibre channel network uses different elements of Fibre Channel standards. Transmission words and ordered sets All Fibre Channel communication is done in units of four 10-bit codes. This group of 4 codes is called a transmission word. An ordered set is a transmission word that includ...
https://en.wikipedia.org/wiki/Gerchberg%E2%80%93Saxton%20algorithm
The Gerchberg–Saxton (GS) algorithm is an iterative phase retrieval algorithm for retrieving the phase of a complex-valued wavefront from two intensity measurements acquired in two different planes. Typically, the two planes are the image plane and the far field (diffraction) plane, and the wavefront propagation betwee...
https://en.wikipedia.org/wiki/Interface%20control%20document
An interface control document (ICD) in systems engineering and software engineering, provides a record of all interface information (such as drawings, diagrams, tables, and textual information) generated for a project. The underlying interface documents provide the details and describe the interface or interfaces bet...
https://en.wikipedia.org/wiki/Rack%20lift
A rack lift is a type of elevator which consists of a cage attached to vertical rails affixed to the walls of a tower or shaft and which is propelled up and down by means of an electric motor which drives a pinion gear that engages a rack gear which is also attached to the wall between the rails. References Elevators
https://en.wikipedia.org/wiki/Pseudonormal%20space
In mathematics, in the field of topology, a topological space is said to be pseudonormal if given two disjoint closed sets in it, one of which is countable, there are disjoint open sets containing them. Note the following: Every normal space is pseudonormal. Every pseudonormal space is regular. An example of a pseud...
https://en.wikipedia.org/wiki/Perfect%20set
In general topology, a subset of a topological space is perfect if it is closed and has no isolated points. Equivalently: the set is perfect if , where denotes the set of all limit points of , also known as the derived set of . In a perfect set, every point can be approximated arbitrarily well by other points from ...
https://en.wikipedia.org/wiki/Chip%20PC%20Technologies
Chip PC Technologies is a developer and manufacturer of thin client solutions and management software for server-based computing; where in a network architecture applications are deployed, managed and can be fully executed on the server. History Chip PC was founded in 2000 by Aviv Soffer and Ora Meir Soffer and raised...
https://en.wikipedia.org/wiki/Ugly%20duckling%20theorem
The ugly duckling theorem is an argument showing that classification is not really possible without some sort of bias. More particularly, it assumes finitely many properties combinable by logical connectives, and finitely many objects; it asserts that any two different objects share the same number of (extensional) pro...
https://en.wikipedia.org/wiki/Black%20hole%20%28networking%29
In networking, a black hole, also known as a block hole, refers to a place in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient. When examining the topology of the network, the black holes themselves are ...
https://en.wikipedia.org/wiki/Regular%20tree%20grammar
In theoretical computer science and formal language theory, a regular tree grammar is a formal grammar that describes a set of directed trees, or terms. A regular word grammar can be seen as a special kind of regular tree grammar, describing a set of single-path trees. Definition A regular tree grammar G is defined b...
https://en.wikipedia.org/wiki/WiiConnect24
WiiConnect24 was a feature of the Nintendo Wi-Fi Connection for the Wii console. It was first announced at Electronic Entertainment Expo (E3) in mid-2006 by Nintendo. It enabled the user to remain connected to the Internet while the console was on standby. For example, in Animal Crossing: City Folk, a friend could send...
https://en.wikipedia.org/wiki/Bennett%20House%20%28Franklin%2C%20Tennessee%29
The Bennett House is a recording studio located on 4th Avenue North in Franklin, Tennessee. Built in 1875, the two-story building has served as a residence, a clothing store, and, starting in 1980, a recording studio used by many popular music artists when recording in Tennessee. Artists that have frequently recorded...
https://en.wikipedia.org/wiki/Extraordinary%20optical%20transmission
Extraordinary optical transmission (EOT) is the phenomenon of greatly enhanced transmission of light through a subwavelength aperture in an otherwise opaque metallic film which has been patterned with a regularly repeating periodic structure. Generally when light of a certain wavelength falls on a subwavelength apertu...
https://en.wikipedia.org/wiki/Autapomorphy
In phylogenetics, an autapomorphy is a distinctive feature, known as a derived trait, that is unique to a given taxon. That is, it is found only in one taxon, but not found in any others or outgroup taxa, not even those most closely related to the focal taxon (which may be a species, family or in general any clade). I...
https://en.wikipedia.org/wiki/Prelink
In computing, prebinding, also called prelinking, is a method for optimizing application load times by resolving library symbols prior to launch. Background Most computer programs consist of code that requires external shared libraries to execute. These libraries are normally integrated with the program at run time ...
https://en.wikipedia.org/wiki/Juvenile%20%28organism%29
A juvenile is an individual organism (especially an animal) that has not yet reached its adult form, sexual maturity or size. Juveniles can look very different from the adult form, particularly in colour, and may not fill the same niche as the adult form. In many organisms the juvenile has a different name from the adu...