source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Pairwise%20summation | In numerical analysis, pairwise summation, also called cascade summation, is a technique to sum a sequence of finite-precision floating-point numbers that substantially reduces the accumulated round-off error compared to naively accumulating the sum in sequence. Although there are other techniques such as Kahan summat... |
https://en.wikipedia.org/wiki/GNOSIS | Great New Operating System In the Sky (GNOSIS) is a capability-based operating system that was researched during the 1970s at Tymshare, Inc. It was based on the research of Norman Hardy, Dale E. Jordan, Bill Frantz, Charlie Landau, Jay Jonekait, et al. It provided a foundation for the development of future operating sy... |
https://en.wikipedia.org/wiki/Pairwise%20Stone%20space | In mathematics and particularly in topology, pairwise Stone space is a bitopological space which is pairwise compact, pairwise Hausdorff, and pairwise zero-dimensional.
Pairwise Stone spaces are a bitopological version of the Stone spaces.
Pairwise Stone spaces are closely related to spectral spaces.
Theorem: If ... |
https://en.wikipedia.org/wiki/Priestley%20space | In mathematics, a Priestley space is an ordered topological space with special properties. Priestley spaces are named after Hilary Priestley who introduced and investigated them. Priestley spaces play a fundamental role in the study of distributive lattices. In particular, there is a duality ("Priestley duality") betwe... |
https://en.wikipedia.org/wiki/Duality%20theory%20for%20distributive%20lattices | In mathematics, duality theory for distributive lattices provides three different (but closely related) representations of bounded distributive lattices via Priestley spaces, spectral spaces, and pairwise Stone spaces. This duality, which is originally also due to Marshall H. Stone, generalizes the well-known Stone du... |
https://en.wikipedia.org/wiki/Esakia%20duality | In mathematics, Esakia duality is the dual equivalence between the category of Heyting algebras and the category of Esakia spaces. Esakia duality provides an order-topological representation of Heyting algebras via Esakia spaces.
Let Esa denote the category of Esakia spaces and Esakia morphisms.
Let be a Heyting alg... |
https://en.wikipedia.org/wiki/Package%20testing | Package testing or packaging testing involves the measurement of a characteristic or property involved with packaging. This includes packaging materials, packaging components, primary packages, shipping containers, and unit loads, as well as the associated processes.
Testing measures the effects and interactions of t... |
https://en.wikipedia.org/wiki/Seymour%20Cray%20Computer%20Engineering%20Award | The Seymour Cray Computer Engineering Award, also known as the Seymour Cray Award, is an award given by the IEEE Computer Society, to recognize significant and innovative contributions in the field of high-performance computing. The award honors scientists who exhibit the creativity demonstrated by Seymour Cray, founde... |
https://en.wikipedia.org/wiki/VIMCAS | VIMCAS, standing for Vertical Interval Multiple Channel Audio System, is a dual-channel Sound-in-Syncs mechanism for transmitting digitally encoded audio in a composite video analogue television signal.
Invented by Australian company IRT in the 1980s, the basic concept of VIMCAS is to transmit two channels of PCM-enco... |
https://en.wikipedia.org/wiki/Silent%20speech%20interface | Silent speech interface is a device that allows speech communication without using the sound made when people vocalize their speech sounds. As such it is a type of electronic lip reading. It works by the computer identifying the phonemes that an individual pronounces from nonauditory sources of information about their ... |
https://en.wikipedia.org/wiki/John%20Crawford%20%28engineer%29 | John H. Crawford (born February 2, 1953) is an American computer engineer.
Career
During a long career at Intel starting in 1977, he was the chief architect of the Intel 80386 and Intel 80486 microprocessors. He also co-managed the design of the Intel P5 Pentium microprocessor family. Crawford was the recipient of th... |
https://en.wikipedia.org/wiki/Post-quantum%20cryptography | In cryptography, post-quantum cryptography (PQC) (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with currently popular algorithm... |
https://en.wikipedia.org/wiki/D-Shape | D-Shape is a large 3-dimensional printer that uses binder-jetting, a layer by layer printing process, to bind sand with an inorganic seawater and magnesium-based binder in order to create stone-like objects. Invented by Enrico Dini, founder of Monolite UK Ltd, the first model of the D-Shape printer used epoxy resin, co... |
https://en.wikipedia.org/wiki/Dirichlet%20kernel | In mathematical analysis, the Dirichlet kernel, named after the German mathematician Peter Gustav Lejeune Dirichlet, is the collection of periodic functions defined as
where is any nonnegative integer. The kernel functions are periodic with period .
The importance of the Dirichlet kernel comes from its relation to F... |
https://en.wikipedia.org/wiki/Penrose%20tiling | A Penrose tiling is an example of an aperiodic tiling. Here, a tiling is a covering of the plane by non-overlapping polygons or other shapes, and a tiling is aperiodic if it does not contain arbitrarily large periodic regions or patches. However, despite their lack of translational symmetry, Penrose tilings may have bo... |
https://en.wikipedia.org/wiki/Biological%20pathway | A biological pathway is a series of interactions among molecules in a cell that leads to a certain product or a change in a cell. Such a pathway can trigger the assembly of new molecules, such as a fat or protein. Pathways can also turn genes on and off, or spur a cell to move. Some of the most common biological path... |
https://en.wikipedia.org/wiki/Locanto | locanto is a worldwide Locanto only network with areas dedicated to jobs, personals, for rent, for sale, services, community, real estate, vehicles, and pets.
Background
The Locanto Classifieds sites are operated by the German startup company Yalwa located in Wiesbaden, Germany. Locanto was launched in July 2006 wi... |
https://en.wikipedia.org/wiki/Nanoknife | A nanoknife is a carbon nanotube-based prototype compression cutting tool intended for sectioning of biological cells. Working principle is similar to that of a 'cheese slicer', a nanometer-thin individual carbon nanotube strung between two tungsten needles would allow sectioning of very thin slices of biological matte... |
https://en.wikipedia.org/wiki/Building%20engineering%20physics | The term building engineering physics was introduced in a report released in January 2010 commissioned by The Royal Academy of Engineering (RAeng). The report, entitled Engineering a Low Carbon Built Environment: The Discipline of Building Engineering Physics, presents the initiative of many at the Royal Academy of Eng... |
https://en.wikipedia.org/wiki/Roller%20screw | A roller screw, also known as a planetary roller screw or satellite roller screw, is a low-friction precision screw-type actuator, a mechanical device for converting rotational motion to linear motion, or vice versa. Planetary roller screws are used as the actuating mechanism in many electro-mechanical linear actuator... |
https://en.wikipedia.org/wiki/Feature-oriented%20domain%20analysis | Feature oriented domain analysis (FODA) is a domain analysis method which introduced feature modelling to domain engineering. FODA was developed in 1990 following several U.S. Government research projects. Its concepts have been regarded as critically advancing software engineering and software reuse.
History
Feature-... |
https://en.wikipedia.org/wiki/Crucible%20%28software%29 | Crucible is a collaborative code review application by Australian software company Atlassian. Like other Atlassian products, Crucible is a Web-based application primarily aimed at enterprise, and certain features that enable peer review of a codebase may be considered enterprise social software.
Crucible is particula... |
https://en.wikipedia.org/wiki/Electrical%20junction | An electrical junction is a point or area where (a) two or more conductors or (b) different semiconducting regions of differing electrical properties make physical contact. Electrical junctions types include thermoelectricity junctions, metal–semiconductor junctions and p–n junctions. Junctions are either rectifying or... |
https://en.wikipedia.org/wiki/OneLogin | OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that develops a unified access management (UAM) platform for enterprise-level businesses and organizations.
History
OneLogin was founded in 2009 in San Francisco by Thomas and Christian Pedersen. The brothers were previously involved with th... |
https://en.wikipedia.org/wiki/Omega-categorical%20theory | In mathematical logic, an omega-categorical theory is a theory that has exactly one countably infinite model up to isomorphism. Omega-categoricity is the special case κ = = ω of κ-categoricity, and omega-categorical theories are also referred to as ω-categorical. The notion is most important for countable first-orde... |
https://en.wikipedia.org/wiki/Axillary%20lines | The axillary lines are the anterior axillary line, midaxillary line and the posterior axillary line.
The anterior axillary line
is a coronal line on the anterior torso marked by the anterior axillary fold. It's the imaginary line that runs down from the point midway between the middle of the clavicle and the lateral ... |
https://en.wikipedia.org/wiki/Gy%C3%B6rgy%20Elekes | György Elekes (19 May 1949 – 29 September 2008) was a Hungarian mathematician and computer scientist who specialized in Combinatorial geometry and Combinatorial set theory. He may be best known for his work in the field that would eventually be called Additive Combinatorics. Particularly notable was his "ingenious" app... |
https://en.wikipedia.org/wiki/Narrow%20escape%20problem | The narrow escape problem is a ubiquitous problem in biology, biophysics and cellular biology.
The mathematical formulation is the following: a Brownian particle (ion, molecule, or protein) is confined to a bounded domain (a compartment or a cell) by a reflecting boundary, except for a small window through which it ca... |
https://en.wikipedia.org/wiki/Chroma%20dots | Chroma dots are visual artifacts caused by displaying an unfiltered PAL analogue colour video signal on a black-and-white television or monitor. They are commonly found on black-and-white recordings of television programmes originally made in colour. Chroma dots were once regarded as undesirable picture noise, but rece... |
https://en.wikipedia.org/wiki/Autologous%20immune%20enhancement%20therapy | Autologous immune enhancement therapy (AIET) is a treatment method in which immune cells are taken out from the patient's body which are cultured and processed to activate them until their resistance to cancer is strengthened and then the cells are put back in the body. The cells, antibodies, and organs of the immune s... |
https://en.wikipedia.org/wiki/Cyclic%20polytope | In mathematics, a cyclic polytope, denoted C(n,d), is a convex polytope formed as a convex hull of n distinct points on a rational normal curve in Rd, where n is greater than d. These polytopes were studied by Constantin Carathéodory, David Gale, Theodore Motzkin, Victor Klee, and others. They play an important role in... |
https://en.wikipedia.org/wiki/Intersex | Intersex people are individuals born with any of several sex characteristics including chromosome patterns, gonads, or genitals that, according to the Office of the United Nations High Commissioner for Human Rights, "do not fit typical binary notions of male or female bodies".
Sex assignment at birth usually aligns wi... |
https://en.wikipedia.org/wiki/Xonotic | Xonotic () is a free and open-source first-person shooter video game. It was developed as a fork of Nexuiz, following controversy surrounding the game's development. The game runs on a heavily modified version of the Quake engine known as the DarkPlaces engine. Its gameplay is inspired by Unreal Tournament and Quake, b... |
https://en.wikipedia.org/wiki/Counting%20rods | Counting rods () are small bars, typically 3–14 cm (1" to 6") long, that were used by mathematicians for calculation in ancient East Asia. They are placed either horizontally or vertically to represent any integer or rational number.
The written forms based on them are called rod numerals. They are a true positional... |
https://en.wikipedia.org/wiki/TO-263 | The Double Decawatt Package, D2PAK, SOT404 or DDPAK, standardized as TO-263, is a semiconductor package type intended for surface mounting on circuit boards. The TO-263 is designed by Motorola. They are similar to the earlier TO-220-style packages intended for high power dissipation but lack the extended metal tab and ... |
https://en.wikipedia.org/wiki/Hypercomplex%20analysis | In mathematics, hypercomplex analysis is the extension of complex analysis to the hypercomplex numbers. The first instance is functions of a quaternion variable, where the argument is a quaternion (in this case, the sub-field of hypercomplex analysis is called quaternionic analysis). A second instance involves functio... |
https://en.wikipedia.org/wiki/Free%20Software%20Movement%20of%20India | Free Software Movement of India (FSMI) is a national coalition of various regional and sectoral free software movements operating in different parts of India. The formation of FSMI was announced in the valedictory function of the National Free Software Conference - 2010 held in Bangalore during 20–21 March 2010. FSMI i... |
https://en.wikipedia.org/wiki/Principle%20of%20least%20astonishment | In user interface design and software design,
the principle of least astonishment (POLA), also known as principle of least surprise, proposes that a component of a system should behave in a way that most users will expect it to behave, and therefore not astonish or surprise users. The following is a corollary of the p... |
https://en.wikipedia.org/wiki/Herglotz%E2%80%93Zagier%20function | In mathematics, the Herglotz–Zagier function, named after Gustav Herglotz and Don Zagier, is the function
introduced by who used it to obtain a Kronecker limit formula for real quadratic fields.
References
Special functions |
https://en.wikipedia.org/wiki/Aegean%20numerals | Aegean numbers was an additive sign-value numeral system used by the Minoan and Mycenaean civilizations. They are attested in Linear A and Linear B scripts. They may have survived in the Cypro-Minoan script, where a single sign with "100" value is attested so far on a large clay tablet from Enkomi.
Unicode
See also
L... |
https://en.wikipedia.org/wiki/Phenolic%20paper | Phenolic paper is a material often used to make printed circuit board substrates (the flat board to which the components and traces are attached). It is a very tough board made of wood fibre and phenolic polymers. It is most commonly brown in colour, and is a fibre reinforced plastic. These PCB materials are known as... |
https://en.wikipedia.org/wiki/Gardenology.org | Gardenology.org is a wiki, launched in 2007, meant to serve as a free, "complete plant and garden wiki encyclopedia." There are over 19,000 articles on the site, and a plant search box. Gardenology.org is a "reference database with botany basics, cultivation, propagation, plant maintenance, glossary of botanical name... |
https://en.wikipedia.org/wiki/Cytometry | Cytometry is the measurement of number and characteristics of cells. Variables that can be measured by cytometric methods include cell size, cell count, cell morphology (shape and structure), cell cycle phase, DNA content, and the existence or absence of specific proteins on the cell surface or in the cytoplasm. Cytome... |
https://en.wikipedia.org/wiki/Slot%20insulation | Slot insulation is the common name for shielding material used for the rotor inside a power generator. The slot insulation process for electric motors provides a barrier between the copper wirings and the steel lamination for all stator, armature and rotor products. This shielding material separates the rotor's electri... |
https://en.wikipedia.org/wiki/Building%20transportation%20systems | Building transportation systems include:
Elevator
Escalator
Moving walkway
Paternoster elevator
References
Building engineering |
https://en.wikipedia.org/wiki/Signal%20chain | Signal chain, or signal-processing chain is a term used in signal processing and mixed-signal system design to describe a series of signal-conditioning electronic components that receive input (data acquired from sampling either real-time phenomena or from stored data) sequentially, with the output of one portion of th... |
https://en.wikipedia.org/wiki/Little%20Irvy | Little Irvy was a traveling sideshow attraction in the United States from the late 1967 until the mid-1990s. The body of the 20-ton sperm whale was hauled around the country by trucker Jerry "Tyrone" Malone in Old Blue, a refrigerated tractor-trailer.
The whale was purchased in 1967 for $6,000 from the Del-Monte Fishi... |
https://en.wikipedia.org/wiki/Game%20Room | Game Room was a social gaming service for the Xbox 360 video game system, Microsoft Windows PCs, and Windows Phone 7. Launched on March 24, 2010, Game Room let players download classic video games and compete against each other for high scores. Players on both Xbox 360 and Windows PCs could access Game Room through the... |
https://en.wikipedia.org/wiki/Tests%20of%20Engineering%20Aptitude%2C%20Mathematics%2C%20and%20Science | Tests of Engineering Aptitude, Mathematics, and Science (TEAMS) is an annual competition originally organized by the Junior Engineering Technical Society (JETS). TEAMS is an annual theme-based competition for students in grades 9–12, aimed at giving them the opportunity to discover engineering and how they can make a d... |
https://en.wikipedia.org/wiki/Fault%20Tolerant%20Ethernet | Fault Tolerant Ethernet (FTE) is proprietary protocol created by Honeywell.
Designed to provide rapid network redundancy, on top of spanning tree protocol. Each node is connected twice to a single LAN through the dual network interface controllers. The driver and the FTE enabled components allow network communication ... |
https://en.wikipedia.org/wiki/Super-resolution%20microscopy | Super-resolution microscopy is a series of techniques in optical microscopy that allow such images to have resolutions higher than those imposed by the diffraction limit, which is due to the diffraction of light. Super-resolution imaging techniques rely on the near-field (photon-tunneling microscopy as well as those th... |
https://en.wikipedia.org/wiki/UEA%20School%20of%20Biological%20Sciences | The School of Biological Sciences is a research-led academic community at the University of East Anglia. It works with partners in industry on a range of activities, including translating research discoveries into products, making knowledge and research expertise available through consultancies, contract research and p... |
https://en.wikipedia.org/wiki/Blue%20only%20mode | Blue Only mode is a special display mode on display units such as projectors and television sets whereby only the blue pixels or the blue cathode ray tube is used to generate the image.
Displays featuring this mode are prominent especially in the broadcast area because it allows for hue and saturation to be adjusted q... |
https://en.wikipedia.org/wiki/Cover%20meter | A cover meter is an instrument to locate rebars and measure the exact concrete cover. Rebar detectors are less sophisticated devices that can only locate metallic objects below the surface. Due to the cost-effective design, the pulse-induction method is one of the most commonly used solutions.
Method
The pulse-inducti... |
https://en.wikipedia.org/wiki/P%C3%A9ter%20Kacsuk | Péter Kacsuk is a Hungarian computer scientist at MTA-SZTAKI, Budapest, Hungary.
Biography
Péter Kacsuk received his MSc and university doctorate degrees from the Technical University of Budapest, Hungary in 1976 and 1984, respectively. He received the Kandidat degree (equivalent to PhD) from the Hungarian Academy i... |
https://en.wikipedia.org/wiki/Atari%20AMY | The Atari AMY (or Amy) was a 64-oscillator additive synthesizer implemented as a single-IC sound chip. It was initially developed as part of a new advanced chipset, codenamed "Rainbow" that included a graphics processor and sprite generator. Rainbow was considered for use in the 16/32-bit workstation known as Sierra, ... |
https://en.wikipedia.org/wiki/Harmonic%20differential | In mathematics, a real differential one-form ω on a surface is called a harmonic differential if ω and its conjugate one-form, written as ω∗, are both closed.
Explanation
Consider the case of real one-forms defined on a two dimensional real manifold. Moreover, consider real one-forms that are the real parts of compl... |
https://en.wikipedia.org/wiki/Eulerian%20poset | In combinatorial mathematics, an Eulerian poset is a graded poset in which every nontrivial interval has the same number of elements of even rank as of odd rank. An Eulerian poset which is a lattice is an Eulerian lattice. These objects are named after Leonhard Euler. Eulerian lattices generalize face lattices of conve... |
https://en.wikipedia.org/wiki/Kobo%20eReader | The Kobo eReader is an e-reader produced by Toronto-based Kobo Inc (a subsidiary of Rakuten). The company's name is an anagram of "book". The original version was released in May 2010 and was marketed as a minimalist alternative to the more expensive e-book readers available at the time. Like most e-readers, the Kobo u... |
https://en.wikipedia.org/wiki/Debug%20code | Debug code is computer code introduced to a computer program to test for errors or to help determine the cause of an error. It can be as simple as an echo command to print the value of a variable at certain points of a program. Modern integrated development environments sometimes render this unnecessary by allowing the... |
https://en.wikipedia.org/wiki/Bread%20Financial | Bread Financial Holdings, Inc. is an American publicly-traded provider of loyalty and marketing services, such as private label credit cards, coalition loyalty programs, and direct marketing, derived from the capture and analysis of transaction-rich data.
History
Alliance Data was formed from the December 1996 merger ... |
https://en.wikipedia.org/wiki/NetFPGA | The NetFPGA project is an effort to develop open-source hardware and software for rapid prototyping of computer network devices. The project targeted academic researchers, industry users, and students. It was not the first platform of its kind in the networking community. NetFPGA used an FPGA-based approach to prototyp... |
https://en.wikipedia.org/wiki/Universal%20Storage%20Platform | Universal Storage Platform (USP) was the brand name for an Hitachi Data Systems line of computer data storage disk arrays circa 2004 to 2010.
History
The Hitachi Universal Storage Platform was first introduced in 2004.
An entry level enterprise and high-end midrange model, the Network Storage Controller was introdu... |
https://en.wikipedia.org/wiki/National%20Broadband%20Plan%20%28United%20States%29 | Connecting America: The National Broadband Plan is a Federal Communications Commission (FCC) plan to improve Internet access in the United States. The FCC was directed to create the plan by the American Recovery and Reinvestment Act of 2009, and unveiled its plan on March 16, 2010.
The act did not give the FCC specifi... |
https://en.wikipedia.org/wiki/Ferdinand%20Freudenstein | Ferdinand Freudenstein (12 May 1926 – 30 March 2006) was an American physicist and engineer known as the "Father of Modern Kinematics." Freudenstein applied digital computation to the kinematic synthesis of mechanisms. In his Ph.D. dissertation, he developed what became known as the Freudenstein equation, which uses a ... |
https://en.wikipedia.org/wiki/Undefined%20value | In computing (particularly, in programming), undefined value is a condition where an expression does not have a correct value, although it is syntactically correct. An undefined value must not be confused with empty string, Boolean "false" or other "empty" (but defined) values. Depending on circumstances, evaluation to... |
https://en.wikipedia.org/wiki/Local%20Tate%20duality | In Galois cohomology, local Tate duality (or simply local duality) is a duality for Galois modules for the absolute Galois group of a non-archimedean local field. It is named after John Tate who first proved it. It shows that the dual of such a Galois module is the Tate twist of usual linear dual. This new dual is call... |
https://en.wikipedia.org/wiki/Unpolarized%20light | Unpolarized light is light with a random, time-varying polarization.
Natural light, like most other common sources of visible light, is produced independently by a large number of atoms or molecules whose emissions are uncorrelated.
Unpolarized light can be produced from the incoherent combination of vertical and h... |
https://en.wikipedia.org/wiki/Gauss%20iterated%20map | In mathematics, the Gauss map (also known as Gaussian map or mouse map), is a nonlinear iterated map of the reals into a real interval given by the Gaussian function:
where α and β are real parameters.
Named after Johann Carl Friedrich Gauss, the function maps the bell shaped Gaussian function similar to the logi... |
https://en.wikipedia.org/wiki/Mathematical%20instrument | A mathematical instrument is a tool or device used in the study or practice of mathematics. In geometry, construction of various proofs was done using only a compass and straightedge; arguments in these proofs relied only on idealized properties of these instruments and literal construction was regarded as only an appr... |
https://en.wikipedia.org/wiki/Horizontal%20evolution | The phrase horizontal evolution is used in evolutionary biology to refer to:
Concerted evolution, whereby individual members of a DNA family within one species are more closely related to each other than to members of the same type of DNA family in other species;
Horizontal gene transfer, where genes are transferred ... |
https://en.wikipedia.org/wiki/Ident%20protocol | The Ident Protocol (Identification Protocol, Ident), specified in RFC 1413, is an Internet protocol that helps identify the user of a particular TCP connection. One popular daemon program for providing the ident service is identd.
Function
The Ident Protocol is designed to work as a server daemon, on a user's compute... |
https://en.wikipedia.org/wiki/Solid-state%20dye%20laser | A solid-state dye laser (SSDL) is a solid-state lasers in which the gain medium is a laser dye-doped organic matrix such as poly(methyl methacrylate) (PMMA), rather than a liquid solution of the dye. These lasers are also referred to as solid-state organic lasers and solid-state dye-doped polymer lasers.
SSDLs were in... |
https://en.wikipedia.org/wiki/Integral%20sliding%20mode | In 1996, V. Utkin and J. Shi proposed an improved sliding control method named integral sliding mode control (ISMC). In contrast with conventional sliding mode control, the system motion under integral sliding mode has a dimension equal to that of the state space. In ISMC, the system trajectory always starts from the s... |
https://en.wikipedia.org/wiki/Terminal%20sliding%20mode | In the early 1990s, a new type of sliding mode control, named terminal sliding modes (TSM) was invented at the Jet Propulsion Laboratory (JPL) by Venkataraman and Gulati. TSM is robust non-linear control approach.
The main idea of terminal sliding mode control evolved out of seminal work on terminal attractors done by... |
https://en.wikipedia.org/wiki/Geodat | Geodat was a commercial project, begun in 1980 and completed by 1991, that provided digital geographic mapping data for commercial users at scales equal to or greater than 1:1,000,000. The term "Geodat" was derived from "GEOgraphic DATa". Geodat data was primarily "medium scale", a nominal 1:100,000, but ranged from 1... |
https://en.wikipedia.org/wiki/Tonido | Tonido is remote access and home server software for network-attached storage. Once installed on a computer, Tonido software makes that computer's files available remotely via the internet through the web browser or through native mobile apps. This allows access to files stored on the computer, including music and vid... |
https://en.wikipedia.org/wiki/List%20of%20prime%20knots | In knot theory, prime knots are those knots that are indecomposable under the operation of knot sum. The prime knots with ten or fewer crossings are listed here for quick comparison of their properties and varied naming schemes.
Table of prime knots
Six or fewer crossings
Seven crossings
Eight crossings
Nine cros... |
https://en.wikipedia.org/wiki/Sexually%20active%20life%20expectancy | Sexually active life expectancy is the average number of years remaining for a person to be sexually active. This population-based indicator extends the concept of health expectancy to the measure of sexuality (via sexual activity). Calculation of sexually active life expectancy uses the age-specific prevalence data on... |
https://en.wikipedia.org/wiki/Microwave%20and%20Optical%20Technology%20Letters | Microwave and Optical Technology Letters is a monthly peer-reviewed scientific journal published by Wiley-Blackwell. The editor-in-chief is Kai Chang (Texas A&M University). The journal covers technology that operates in wavelengths ranging from radio frequency to the optical spectrum.
Abstracting and indexing
This j... |
https://en.wikipedia.org/wiki/Bob%20Rau | Bantwal Ramakrishna "Bob" Rau (1951 – December 10, 2002) was a computer engineer and HP Fellow. Rau was a founder and chief architect of Cydrome, where he helped develop the Very long instruction word technology that is now common in modern computer processors. Rau was the recipient of the 2002 Eckert–Mauchly Award.
I... |
https://en.wikipedia.org/wiki/Gravimetric%20blender | A gravimetric blender is an item of industrial equipment used in the plastics industry to accurately weigh two or more components and then mix them together prior to processing in an injection molding machine, plastics extrusion, or blow moulding machine.
There are two types of gravimetric blenders:
1. Loss in weight... |
https://en.wikipedia.org/wiki/Randomized%20rounding | In computer science and operations research, randomized rounding
is a widely-used approach for designing and analyzing approximation algorithms.
Many combinatorial optimization problems are computationally intractable to solve exactly (to optimality). For such problems, randomized rounding can be used to design fast... |
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Microwave%20Theory%20and%20Techniques | IEEE Transactions on Microwave Theory and Techniques (T-MTT) is a monthly peer-reviewed scientific journal with a focus on that part of engineering and theory associated with microwave/millimeter-wave technology and components, electronic devices, guided wave structures and theory, electromagnetic theory, and Radio Fre... |
https://en.wikipedia.org/wiki/Active%20State%20Power%20Management | Active-state power management (ASPM) is a power management mechanism for PCI Express devices to garner power savings while otherwise in a fully active state. Predominantly, this is achieved through active-state link power management; i.e., the PCI Express serial link is powered down when there is no traffic across it. ... |
https://en.wikipedia.org/wiki/Gul%20%28design%29 | A gul (also written gol, göl and gül) is a medallion-like design element typical of traditional hand-woven carpets from Central and West Asia. In Turkmen weavings they are often repeated to form the pattern in the main field.
Shape
Gul are medallions, often octagonal, and often somewhat angular on a generally octagona... |
https://en.wikipedia.org/wiki/Identity%20provider | An identity provider (abbreviated IdP or IDP) is a system entity that creates, maintains, and manages identity information for principals and also provides authentication services to relying applications within a federation or distributed network.
Identity providers offer user authentication as a service. Relying part... |
https://en.wikipedia.org/wiki/Outline%20of%20television%20broadcasting | The following outline is provided as an overview of and topical guide to television broadcasting:
Television broadcasting: form of broadcasting in which a television signal is transmitted by radio waves from a terrestrial (Earth based) transmitter of a television station to TV receivers having an antenna.
Nature of t... |
https://en.wikipedia.org/wiki/Superheterodyne%20transmitter | Superheterodyne transmitter is a radio or TV transmitter which uses an intermediate frequency signal in addition to radio frequency signal.
Types of transmitters
There are two types of transmitters. In some transmitters, the information signal (audio (AF), video (VF) etc.) modulates the radio frequency (RF) signal. ... |
https://en.wikipedia.org/wiki/Discovery%20Net | Discovery Net is one of the earliest examples of a scientific workflow system allowing users to coordinate the execution of remote services based on Web service and Grid Services (OGSA and Open Grid Services Architecture) standards.
The system was designed and implemented at Imperial College London as part of the Disco... |
https://en.wikipedia.org/wiki/Data%20stream%20management%20system | A data stream management system (DSMS) is a computer software system to manage continuous data streams. It is similar to a database management system (DBMS), which is, however, designed for static data in conventional databases. A DBMS also offers a flexible query processing so that the information needed can be expres... |
https://en.wikipedia.org/wiki/N-terminal%20prohormone%20of%20brain%20natriuretic%20peptide | The N-terminal prohormone of brain natriuretic peptide (NT-proBNP or BNPT) is a prohormone with a 76 amino acid N-terminal inactive protein that is cleaved from the molecule to release brain natriuretic peptide 32 (BNP, also known as B-type natriuretic peptide).
Both BNP and NT-proBNP levels in the blood are used for ... |
https://en.wikipedia.org/wiki/Jacobi%20zeta%20function | In mathematics, the Jacobi zeta function Z(u) is the logarithmic derivative of the Jacobi theta function Θ(u). It is also commonly denoted as
Where E, K, and F are generic Incomplete Elliptical Integrals of the first and second kind. Jacobi Zeta Functions being kinds of Jacobi theta functions have applications... |
https://en.wikipedia.org/wiki/BIP-8 | BIP-8 (alternatively, BIP8) is an abbreviation for bit-interleaved parity 8. BIP-8 consists of a parity byte calculated bit-wise across a large number of bytes in a transmission transport frame. BIP-8 bits are set such that the overall data stream, including the BIP-8 byte, has even parity. BIP-8 is used in the SONET/S... |
https://en.wikipedia.org/wiki/Proton200k | The Proton200k is a high-speed, space-qualified, radiation-hardened single-board computer based on a Texas Instruments 320C 6415/6713 DSP. The Proton200k is produced by Space Micro Inc, a designer and manufacturer of radiation hardened electronics for space applications. The Proton200k was originally developed under Ph... |
https://en.wikipedia.org/wiki/866A | The 866 is a mercury vapor half-wave rectifier intended for high-voltage applications. The voltage drop is approximately 15 volts up to 150 Hz. To avoid unwanted shorts the tube must be operated in a vertical position and the filament preheated for at least 30 seconds before applying the plate voltage.
Construction
St... |
https://en.wikipedia.org/wiki/Number%20bond | In mathematics education at primary school level, a number bond (sometimes alternatively called an addition fact) is a simple addition sum which has become so familiar that a child can recognise it and complete it almost instantly, with recall as automatic as that of an entry from a multiplication table in multiplicati... |
https://en.wikipedia.org/wiki/Hash%20function%20security%20summary | This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions.
Table color key
Common hash functions
Collision resistance
Chosen prefix collision attack... |
https://en.wikipedia.org/wiki/Fritz%20John%20conditions | The Fritz John conditions (abbr. FJ conditions), in mathematics, are a necessary condition for a solution in nonlinear programming to be optimal. They are used as lemma in the proof of the Karush–Kuhn–Tucker conditions, but they are relevant on their own.
We consider the following optimization problem:
where ƒ is the... |
https://en.wikipedia.org/wiki/Root%20complex | In a PCI Express (PCIe) system, a root complex device connects the CPU and memory subsystem to the PCI Express switch fabric composed of one or more PCIe or PCI devices.
Similar to a host bridge in a PCI system, the root complex generates transaction requests on behalf of the CPU, which is interconnected through a lo... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.