source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Haskins%20Laboratories | Haskins Laboratories, Inc. is an independent 501(c) non-profit corporation, founded in 1935 and located in New Haven, Connecticut, since 1970. Haskins has formal affiliation agreements with both Yale University and the University of Connecticut; it remains fully independent, administratively and financially, of both Ya... |
https://en.wikipedia.org/wiki/MADI | Multichannel Audio Digital Interface (MADI) standardized as AES10 by the Audio Engineering Society (AES) defines the data format and electrical characteristics of an interface that carries multiple channels of digital audio. The AES first documented the MADI standard in AES10-1991 and updated it in AES10-2003 and AES10... |
https://en.wikipedia.org/wiki/Four-Phase%20Systems | Four-Phase Systems was a computer company, founded by Lee Boysel and others, which built one of the earliest computers using semiconductor main memory and MOS LSI logic. The company was incorporated in February 1969 and had moderate commercial success. It was acquired by Motorola in 1981.
History
The idea behind Fou... |
https://en.wikipedia.org/wiki/Customer%20engineer | A customer engineer (CE) is a worker whose primary job scope is to provide a service to customers who have signed a contract with the company. Originally, the term was used by IBM, but now customer engineer is also being used by other companies.
About
Customer engineers are also referred as the customer support engin... |
https://en.wikipedia.org/wiki/Vehicular%20ad%20hoc%20network | Vehicular ad hoc networks (VANETs) are created by applying the principles of mobile ad hoc networks (MANETs) – the spontaneous creation of a wireless network of mobile devices – to the domain of vehicles. VANETs were first mentioned and introduced in 2001 under "car-to-car ad-hoc mobile communication and networking" a... |
https://en.wikipedia.org/wiki/VerilogCSP | In integrated circuit design, VerilogCSP is a set of macros added to Verilog HDL to support Communicating Sequential Processes (CSP) channel communications. These macros are intended to be used in designing digital asynchronous circuits.
VerilogCSP also describes nonlinear pipelines and high-level channel timing prop... |
https://en.wikipedia.org/wiki/Geodesics%20as%20Hamiltonian%20flows | In mathematics, the geodesic equations are second-order non-linear differential equations, and are commonly presented in the form of Euler–Lagrange equations of motion. However, they can also be presented as a set of coupled first-order equations, in the form of Hamilton's equations. This latter formulation is develope... |
https://en.wikipedia.org/wiki/Interleukin%20receptor | Interleukin receptors are a family of cytokine receptors for interleukins. They belong to the immunoglobulin superfamily.
Types
There are two main families of Interleukin receptors, Type 1 and Type 2.
Type 1
Type 1 interleukin receptors include:
Interleukin-1 receptor
Interleukin-2 receptor
Interleukin-3 receptor
... |
https://en.wikipedia.org/wiki/Scaffold%20%28programming%29 | Scaffolding, as used in computing, refers to one of two techniques:
Code generation:
It is a technique related to database access in some model–view–controller frameworks.
Project generation:
It is a technique supported by various programming tools.
Code generation
Scaffolding is a technique supported by some model–v... |
https://en.wikipedia.org/wiki/Departure%20function | In thermodynamics, a departure function is defined for any thermodynamic property as the difference between the property as computed for an ideal gas and the property of the species as it exists in the real world, for a specified temperature T and pressure P. Common departure functions include those for enthalpy, entr... |
https://en.wikipedia.org/wiki/Defensive%20computing | Defensive computing is a form of practice for computer users to help reduce the risk of computing problems, by avoiding dangerous computing practices. The primary goal of this method of computing is to be able to anticipate and prepare for potentially problematic situations prior to their occurrence, despite any advers... |
https://en.wikipedia.org/wiki/Faug%C3%A8re%27s%20F4%20and%20F5%20algorithms | In computer algebra, the Faugère F4 algorithm, by Jean-Charles Faugère, computes the Gröbner basis of an ideal of a multivariate polynomial ring. The algorithm uses the same mathematical principles as the Buchberger algorithm, but computes many normal forms in one go by forming a generally sparse matrix and using fast... |
https://en.wikipedia.org/wiki/Provider%20model | The provider model is a design pattern formulated by Microsoft for use in the ASP.NET Starter Kits and formalized in .NET version 2.0. It is used to allow an application to choose from one of multiple implementations or "condiments" in the application configuration, for example, to provide access to different data stor... |
https://en.wikipedia.org/wiki/SNePS | SNePS is a knowledge representation, reasoning, and acting (KRRA) system developed and maintained by Stuart C. Shapiro and colleagues at the State University of New York at Buffalo.
SNePS is simultaneously a logic-based, frame-based, and network-based KRRA system. It uses an assertional model of knowledge, in that a ... |
https://en.wikipedia.org/wiki/Afroinsectiphilia | The Afroinsectiphilia (African insectivores) is a clade that has been proposed based on the results of recent molecular phylogenetic studies. Many of the taxa within it were once regarded as part of the order Insectivora, but Insectivora is now considered to be polyphyletic and obsolete. This proposed classification is... |
https://en.wikipedia.org/wiki/MetaEdit%2B | MetaEdit+ is an environment for creating and using Domain-Specific Modeling languages.
Research History
The research behind the genesis of MetaEdit+ was carried out at the University of Jyväskylä, as part of the MetaPHOR project. A metamodeling and modeling tool, MetaEdit, had been created by the earlier SYTI project... |
https://en.wikipedia.org/wiki/MAX%20%28operating%20system%29 | MaX, also known as Madrid_linux is a linux distribution created with funds from the Conserjería de Educación, Juventud y Deporte of the Comunidad de Madrid adapted for use in educational environments. The main features of this operating system are simplicity, stability and a huge collection of software.
History
Start... |
https://en.wikipedia.org/wiki/Molinux | Molinux was an operating system based on Ubuntu sponsored by the autonomous community of Castilla-La Mancha and the Fundación Ínsula Barataria.
The name "Molinux" derives from the Spanish word molino, meaning "mill" or "windmill". Each version of Molinux is named after a character from the classic Spanish novel Don Qu... |
https://en.wikipedia.org/wiki/Xtraview%20Encryption%20System | Xtraview Video Encryption System refers to the now-defunct patented "encryption" system used on Xtraview and a number of other Top Up TV services, including Setanta Sports, Television X, Babestation and Red Hot TV.
Unlike the other encryption system used by Top Up TV, Mediaguard, the Xtraview Video Encryption System w... |
https://en.wikipedia.org/wiki/Necklace%20%28combinatorics%29 | In combinatorics, a k-ary necklace of length n is an equivalence class of n-character strings over an alphabet of size k, taking all rotations as equivalent. It represents a structure with n circularly connected beads which have k available colors.
A k-ary bracelet, also referred to as a turnover (or free) necklace, ... |
https://en.wikipedia.org/wiki/Plated-wire%20memory | Plated-wire memory is a variation of core memory developed by Bell Laboratories in 1957. Its primary advantage was that it could be machine-assembled, which potentially led to lower prices than the almost always hand-assembled core.
Instead of threading individual ferrite cores on wires, plated-wire memory used a grid... |
https://en.wikipedia.org/wiki/Hardware%20keylogger | Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer. They log all keyboard activity to... |
https://en.wikipedia.org/wiki/Cell%20physiology | Cell physiology is the biological study of the activities that take place in a cell to keep it alive. The term physiology refers to normal functions in a living organism. Animal cells, plant cells and microorganism cells show similarities in their functions even though they vary in structure.
General characteristics
T... |
https://en.wikipedia.org/wiki/Stubline%20transmitter | Stubline transmitter is a broadcasting facility for mediumwave and shortwave near Zvečka, Serbia. The mediumwave transmitter broadcast on 684 kHz and, until its destruction on May 30, 1999, it was one of the strongest in Europe having used 2000 kilowatts of power.
The station was rebuilt with a 225.5 metres tall mast,... |
https://en.wikipedia.org/wiki/Expander%20mixing%20lemma | The expander mixing lemma intuitively states that the edges of certain -regular graphs are evenly distributed throughout the graph. In particular, the number of edges between two vertex subsets and is always close to the expected number of edges between them in a random -regular graph, namely .
d-Regular Expander Gr... |
https://en.wikipedia.org/wiki/Building%20performance | Building performance is an attribute of a building that expresses how well that building carries out its functions. It may also relate to the performance of the building construction process. Categories of building performance are quality (how well the building fulfills its functions), resource savings (how much of a p... |
https://en.wikipedia.org/wiki/Compartmentalization%20%28information%20security%29 | Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-know basis to perform certain tasks.
It originated in the handling of classified information in military and intelligence applications. It dates back to antiquity... |
https://en.wikipedia.org/wiki/Compartmentalization%20%28engineering%29 | When referring to engineering, compartmentalization is the general technique of separating two or more parts of a system to prevent malfunctions from spreading between or among them.
This entails the breaking up of a project or problem into sub classes and sub categories, with the intention of simplifying the task at ... |
https://en.wikipedia.org/wiki/Telmac%20TMC-600 | The Telmac TMC-600 was a Finnish microcomputer introduced in 1982 by Telercas Oy, a Finnish importer of RCA microchips.
Only 600 units were produced, making it very rare today. The TMC-600 was the only commercially available BASIC-based home computer designed and manufactured in Finland.
Specifications
RCA 1802A (C... |
https://en.wikipedia.org/wiki/Frequency%20domain%20sensor | Frequency domain (FD) sensor is an instrument developed for measuring soil moisture content. The instrument has an oscillating circuit, the sensing part of the sensor is embedded in the soil, and the operating frequency will depend on the value of soil's dielectric constant.
Types of sensors
Capacitance probe, or f... |
https://en.wikipedia.org/wiki/Global%20Address%20List | A Global Address List (GAL) is an electronic shared address book which contains usually all people of given organization (company, school etc.). This address book is accessed over the computer network using LDAP protocol, CardDAV or some other electronic means.
The GAL is usually read-only for users. Only administrato... |
https://en.wikipedia.org/wiki/Floating-gate%20MOSFET | The floating-gate MOSFET (FGMOS), also known as a floating-gate MOS transistor or floating-gate transistor, is a type of metal–oxide–semiconductor field-effect transistor (MOSFET) where the gate is electrically isolated, creating a floating node in direct current, and a number of secondary gates or inputs are deposited... |
https://en.wikipedia.org/wiki/Nanocomputer | Nanocomputer refers to a computer smaller than the microcomputer, which is smaller than the minicomputer.
Microelectronic components that are at the core of all modern electronic devices employ semiconductor transistors. The term nanocomputer is increasingly used to refer to general computing devices of size comparab... |
https://en.wikipedia.org/wiki/AmpliFIND | AmpliFIND is an acoustic fingerprinting service and a software development kit developed by the US company MusicIP.
MusicIP first marketed their fingerprinting algorithm and service as MusicDNS. In 2006, MusicIP reported that the MusicDNS database had more than 22 million fingerprints of digital audio recordings. One ... |
https://en.wikipedia.org/wiki/Single-base%20extension | Single-base extension (SBE) is a method for determining the identity of a nucleotide base at a specific position along a nucleic acid. The method is used to identify a single-nucleotide polymorphism (SNP).
In the method, an oligonucleotide primer hybridizes to a complementary region along the nucleic acid to form a du... |
https://en.wikipedia.org/wiki/Personal%20data%20manager | A personal data manager (PDM) is a portable hardware tool enabling secure storage and easy access to user data. It can also be an application located on a portable smart device or PC, enabling novice end-users to directly define, classify, and manipulate a universe of information objects. Usually PDMs include password ... |
https://en.wikipedia.org/wiki/Microporous%20material | A microporous material is a material containing pores with diameters less than 2 nm. Examples of microporous materials include zeolites and metal-organic frameworks.
Porous materials are classified into several kinds by their size. The recommendations of a panel convened by the International Union of Pure and Applied ... |
https://en.wikipedia.org/wiki/Signaling%20compression | For data compression, signaling compression, or SigComp, is a compression method designed especially for compression of text-based communication data as SIP or RTSP. SigComp had originally been defined in RFC 3320 and was later updated with RFC 4896. A Negative Acknowledgement Mechanism for Signaling Compression is def... |
https://en.wikipedia.org/wiki/Sun%20Java%20System%20Directory%20Server | The Sun Java System Directory Server is a discontinued LDAP directory server and DSML server written in C and originally developed by Sun Microsystems. The Java System Directory Server is a component of the Java Enterprise System. Earlier iterations of Sun Java System Directory Server were known as Sun ONE Directory Se... |
https://en.wikipedia.org/wiki/Submarine%20Command%20System | SMCS, the Submarine Command System, was first created for the Royal Navy of the United Kingdom's s as a tactical information system and a torpedo weapon control system. Versions have now also been installed on all active Royal Navy submarine classes.
Initial Phase: SMCS for Vanguard class
With the decision in 1983 to ... |
https://en.wikipedia.org/wiki/Branched%20DNA%20assay | In biology, a branched DNA assay is a signal amplification assay (as opposed to a target amplification assay) that is used to detect nucleic acid molecules.
Method
A branched DNA assay begins with a dish or some other solid support (e.g., a plastic dipstick). The dish is peppered with small, single stranded DNA molecu... |
https://en.wikipedia.org/wiki/Institute%20for%20Micro%20Process%20Engineering | The Institute for Micro Process Engineering IMVT (from the German name Institut für Mikroverfahrenstechnik) is an institute within the Karlsruhe Research Center (Forschungszentrum Karlsruhe) in Eggenstein-Leopoldshafen, Germany. Its main field of activity is micro process engineering, the science of conducting chemica... |
https://en.wikipedia.org/wiki/Object-Oriented%20Software%20Construction | Object-Oriented Software Construction is a book by Bertrand Meyer, widely considered a foundational text of object-oriented programming. The first edition was published in 1988; the second, extensively revised and expanded edition (more than 1300 pages), in 1997. Numerous translations are available including Dutch (fir... |
https://en.wikipedia.org/wiki/Turing%20machine%20examples | The following are examples to supplement the article Turing machine.
Turing's very first example
The following table is Turing's very first example (Alan Turing 1937):
"1. A machine can be constructed to compute the sequence 0 1 0 1 0 1..." (0 <blank> 1 <blank> 0...) (Undecidable p. 119)
With regard to what actions t... |
https://en.wikipedia.org/wiki/Nemesis%20%28operating%20system%29 | Nemesis was an operating system that was designed by the University of Cambridge, the University of Glasgow, the Swedish Institute of Computer Science and Citrix Systems.
Nemesis was conceived with multimedia uses in mind. It was designed with a small lightweight kernel, using shared libraries to perform functions tha... |
https://en.wikipedia.org/wiki/Noninvasive%20genotyping | Noninvasive genotyping is a modern technique for obtaining DNA for genotyping that is characterized by the indirect sampling of specimen, not requiring harm to, handling of, or even the presence of the organism of interest. Beginning in the early 1990s, with the advent of PCR, researchers have been able to obtain high-... |
https://en.wikipedia.org/wiki/Heteroclinic%20network | In mathematics, a heteroclinic network is an invariant set in the phase space of a dynamical system. It can be thought of loosely as the union of more than one heteroclinic cycle. Heteroclinic networks arise naturally in a number of different types of applications, including fluid dynamics and populations dynamics.
T... |
https://en.wikipedia.org/wiki/List%20of%20drill%20and%20tap%20sizes | Below is a comprehensive drill and tap size chart for all drills and taps, imperial and metric, up to in diameter.
In manufactured parts, holes with female screw threads are often needed; they accept male screws to facilitate the building and fastening of a finished assembly. One of the most common ways to produce su... |
https://en.wikipedia.org/wiki/Deep%20Dungeon | is a series of role-playing video games developed by HummingBirdSoft. The first two installments were released on the Family Computer Disk System by Square's label DOG; the third one was released on the regular Family Computer by Square directly and the final one by Asmik.
Games in the series
Madō Senki
is a "dunge... |
https://en.wikipedia.org/wiki/Bake-out | Bake-out, in several areas of technology and fabrication, and in building construction, refers to the process of using high heat temperature (heat), and possibly vacuum, to remove volatile compounds from materials and objects before placing them into situations where the slow release of the same volatile compounds woul... |
https://en.wikipedia.org/wiki/Antenna%20tuning%20hut | An antenna tuning hut or helix house is a small shed at the base of a longwave or mediumwave radio transmitting antenna. It contains antenna tuner — radio equipment for coupling the power from the feedline to the antenna. Alternative names include antenna tuning house, coupling hut, and dog house.
Equipment
The radio... |
https://en.wikipedia.org/wiki/Immunoproteomics | Immunoproteomics is the study of large sets of proteins (proteomics) involved in the immune response.
Examples of common applications of immunoproteomics include:
The isolation and mass spectrometric identification of MHC (major histocompatibility complex) binding peptides
Purification and identification of protein ... |
https://en.wikipedia.org/wiki/Proper%20forcing%20axiom | In the mathematical field of set theory, the proper forcing axiom (PFA) is a significant strengthening of Martin's axiom, where forcings with the countable chain condition (ccc) are replaced by proper forcings.
Statement
A forcing or partially ordered set P is proper if for all regular uncountable cardinals , forcin... |
https://en.wikipedia.org/wiki/Non-standard%20model%20of%20arithmetic | In mathematical logic, a non-standard model of arithmetic is a model of first-order Peano arithmetic that contains non-standard numbers. The term standard model of arithmetic refers to the standard natural numbers 0, 1, 2, …. The elements of any model of Peano arithmetic are linearly ordered and possess an initial se... |
https://en.wikipedia.org/wiki/Central%20composite%20design | In statistics, a central composite design is an experimental design, useful in response surface methodology, for building a second order (quadratic) model for the response variable without needing to use a complete three-level factorial experiment.
After the designed experiment is performed, linear regression is used,... |
https://en.wikipedia.org/wiki/GNOME%20Screensaver | Up until GNOME 3.5, GNOME Screensaver was the GNOME project's official screen blanking and locking framework. With the release of GNOME 3.5.5, screen locking functionality became a function of GDM and GNOME Shell by default.
History
GNOME Screensaver continued to be used by the GNOME Fallback mode until GNOME Fallback... |
https://en.wikipedia.org/wiki/TSS%20%28operating%20system%29 | The IBM Time Sharing System TSS/360 is a discontinued early time-sharing operating system designed exclusively for a special model of the System/360 line of mainframes, the Model 67. Made available on a trial basis to a limited set of customers in 1967, it was never officially released as a supported product by IBM. TS... |
https://en.wikipedia.org/wiki/Honeynet%20Project | The Honeynet Project is an international security research organization that investigates the latest cyber attacks and develops open source security tools to improve Internet security by tracking hackers behavioral patterns.
History
The Honeynet Project began in 1999 as a small mailing list of a group of people. The ... |
https://en.wikipedia.org/wiki/Virtual%20Museum%20of%20New%20France | The Virtual Museum of New France () is a virtual museum created and managed by the Canadian Museum of History. Its purpose is to share knowledge and raise awareness of the history, culture and legacy of early French settlements in North America.
The site includes interactive maps, photos, illustrations and information... |
https://en.wikipedia.org/wiki/RF%20power%20amplifier | A radio-frequency power amplifier (RF power amplifier) is a type of electronic amplifier that converts a low-power radio-frequency signal into a higher-power signal. Typically, RF power amplifiers are used in the final stage of a radio transmitter, their output driving the antenna. Design goals often include gain, powe... |
https://en.wikipedia.org/wiki/Contact%20Conference | Contact is an annual interdisciplinary conference that brings together renowned social and space scientists, science fiction writers and artists to exchange ideas, stimulate new perspectives, and encourage serious, creative speculation about humanity's future. The intent of Contact is to promote the integration of huma... |
https://en.wikipedia.org/wiki/Hilton%27s%20law | Hilton's law, espoused by John Hilton in a series of medical lectures given in 1860–1862, is the observation that in the study of anatomy, the nerve supplying the muscles extending directly across and acting at a given joint not only supplies the muscle, but also innervates the joint and the skin overlying the muscle. ... |
https://en.wikipedia.org/wiki/Communications%20%26%20Information%20Services%20Corps | The Communications and Information Services Corps (CIS) () – formerly the Army Corps of Signals – is one of the combat support corps of the Irish Defence Forces, the military of Ireland. It is responsible for the installation, maintenance and operation of communications and information systems for the command, control ... |
https://en.wikipedia.org/wiki/Oophagy | Oophagy ( ) sometimes ovophagy, literally "egg eating", is the practice of
embryos feeding on eggs produced by the ovary while still inside the mother's uterus. The word oophagy is formed from the classical Greek (, "egg") and classical Greek (, "to eat"). In contrast, adelphophagy is the cannibalism of a multi-cell... |
https://en.wikipedia.org/wiki/359%20%28number%29 | 359 (three hundred [and] fifty-nine) is the natural number following 358 and preceding 360. 359 is the 72nd prime number.
In mathematics
359 is a Sophie Germain prime: (also a Sophie Germain prime).
It is also a safe prime, because subtracting 1 and halving it gives another prime number (179, itself also safe).
Si... |
https://en.wikipedia.org/wiki/Numerical%20cognition | Numerical cognition is a subdiscipline of cognitive science that studies the cognitive, developmental and neural bases of numbers and mathematics. As with many cognitive science endeavors, this is a highly interdisciplinary topic, and includes researchers in cognitive psychology, developmental psychology, neuroscience ... |
https://en.wikipedia.org/wiki/Wireless%20configuration%20utility | A wireless configuration utility, wireless configuration tool, or is a class of network management software that manages the activities and features of a wireless network connection. It may control the process of selecting an available access point, authenticating and associating to it and setting up other parameters... |
https://en.wikipedia.org/wiki/Biological%20integrity | Biological integrity is associated with how "pristine" an environment is and its function relative to the potential or original state of an ecosystem before human alterations were imposed. Biological integrity is built on the assumption that a decline in the values of an ecosystem's functions are primarily caused by hu... |
https://en.wikipedia.org/wiki/Secure%20two-party%20computation | Secure two-party computation (2PC) a.k.a. Secure function evaluation is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks. The goal of 2PC is to create a generic protocol that allows two parties to jointly com... |
https://en.wikipedia.org/wiki/Stretched%20exponential%20function | The stretched exponential function is obtained by inserting a fractional power law into the exponential function.
In most applications, it is meaningful only for arguments between 0 and +∞. With , the usual exponential function is recovered. With a stretching exponent β between 0 and 1, the graph of log f versus t is... |
https://en.wikipedia.org/wiki/Turing%20machine%20equivalents | A Turing machine is a hypothetical computing device, first conceived by Alan Turing in 1936. Turing machines manipulate symbols on a potentially infinite strip of tape according to a finite table of rules, and they provide the theoretical underpinnings for the notion of a computer algorithm.
While none of the followin... |
https://en.wikipedia.org/wiki/Functional%20testing | In software development, functional testing is a quality assurance (QA) process and a type of black-box testing that bases its test cases on the specifications of the software component under test. Functions are tested by feeding them input and examining the output, and internal program structure is rarely considered (... |
https://en.wikipedia.org/wiki/Stanislas%20Dehaene | Stanislas Dehaene (born May 12, 1965) is a French author and cognitive neuroscientist whose research centers on a number of topics, including numerical cognition, the neural basis of reading and the neural correlates of consciousness. As of 2017, he is a professor at the Collège de France and, since 1989, the director ... |
https://en.wikipedia.org/wiki/Simulation%20noise | Simulation noise is a function that creates a divergence-free vector field. This signal can be used in artistic simulations for the purposes of increasing the perception of extra detail.
The function can be calculated in three dimensions by dividing the space into a regular lattice grid. With each edge is associated... |
https://en.wikipedia.org/wiki/The%20Web%20Conference | The ACM Web Conference (formerly known as International World Wide Web Conference, abbreviated as WWW) is a yearly international academic conference on the topic of the future direction of the World Wide Web. The first conference of many was held and organized by Robert Cailliau in 1994 at CERN in Geneva, Switzerland. ... |
https://en.wikipedia.org/wiki/Kalman%E2%80%93Yakubovich%E2%80%93Popov%20lemma | The Kalman–Yakubovich–Popov lemma is a result in system analysis and control theory which states: Given a number , two n-vectors B, C and an n x n Hurwitz matrix A, if the pair is completely controllable, then a symmetric matrix P and a vector Q satisfying
exist if and only if
Moreover, the set is the unobservable ... |
https://en.wikipedia.org/wiki/Boom%20brake | A boom brake is a device designed to control the swing of the boom on a sailboat. The boom brake acts as a preventer when sailing downwind, and can also be used to jibe(US) or gybe(UK) the mainsail in a slow measured action.
Uncontrolled jibes often damage elements of the rig, and can inflict serious and sometimes fa... |
https://en.wikipedia.org/wiki/Pragmatic%20theory%20of%20information | The pragmatic theory of information is derived from Charles Sanders Peirce's general theory of signs and inquiry. Peirce explored a number of ideas about information throughout his career. One set of ideas is about the "laws of information" having to do with the logical properties of information. Another set of idea... |
https://en.wikipedia.org/wiki/Media%20type | A media type (formerly known as a MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet. Their purpose is somewhat similar to file extensions in that they identify the intended data format. The Internet Assigned Numbers Authority (IANA) is the official authority for the st... |
https://en.wikipedia.org/wiki/Microsoft%20Forefront | Microsoft Forefront is a discontinued family of line-of-business security software by Microsoft Corporation. Microsoft Forefront products are designed to help protect computer networks, network servers (such as Microsoft Exchange Server and Microsoft SharePoint Server) and individual devices. As of 2015, the only activ... |
https://en.wikipedia.org/wiki/NO%20CARRIER | NO CARRIER (capitalized) is a text message transmitted from a modem to its attached device (typically a computer), indicating the modem is not (or no longer) connected to a remote system.
NO CARRIER is a response message that is defined in the Hayes command set. Due to the popularity of Hayes modems during the heyday... |
https://en.wikipedia.org/wiki/Elxsi | Elxsi Corporation was a minicomputer manufacturing company established in the late 1970s in Silicon Valley, US, along with a host of competitors (Trilogy Systems, Sequent, Convex Computer). The Elxsi processor was an Emitter Coupled Logic (ECL) design that featured a 50-nanosecond clock, a 25-nanosecond back panel bus,... |
https://en.wikipedia.org/wiki/Beta%20diversity | In ecology, beta diversity (β-diversity or true beta diversity) is the ratio between regional and local species diversity. The term was introduced by R. H. Whittaker together with the terms alpha diversity (α-diversity) and gamma diversity (γ-diversity). The idea was that the total species diversity in a landscape (γ) ... |
https://en.wikipedia.org/wiki/Clarke%20Medal | The Clarke Medal is awarded by the Royal Society of New South Wales, the oldest learned society in Australia and the Southern Hemisphere, for distinguished work in the Natural sciences.
The medal is named in honour of the Reverend William Branwhite Clarke, one of the founders of the Society and was to be "awarded for ... |
https://en.wikipedia.org/wiki/Backgammon%20opening%20theory | The first moves of a backgammon game are the opening moves, collectively referred to as the opening, and studied in the backgammon opening theory. Backgammon opening theory is not developed in as much detail as opening theory in chess, which has been widely studied. This is because following the first move in backgammo... |
https://en.wikipedia.org/wiki/Encircled%20energy | In optics, encircled energy is a measure of concentration of energy in an image, or projected laser at a given range. For example, if a single star is brought to its sharpest focus by a lens giving the smallest image possible with that given lens (called a point spread function or PSF), calculation of the encircled en... |
https://en.wikipedia.org/wiki/Roller%20cone%20bit | A roller-cone bit is a drill bit used for drilling through rock that features 2 or 3 abrasive, spinning cones that break up rock and sediment as they grind against it. Roller-cone bits are typically used when drilling for oil and gas. A water jet flowing through the bit washes out the rock in a slurry.
History
The o... |
https://en.wikipedia.org/wiki/Programming%20by%20permutation | Programming by permutation, sometimes called "programming by accident" or "shotgunning", is an approach to software development wherein a programming problem is solved by iteratively making small changes (permutations) and testing each change to see if it behaves as desired. This approach sometimes seems attractive whe... |
https://en.wikipedia.org/wiki/Armed%20Forces%20Radiobiology%20Research%20Institute | The Armed Forces Radiobiology Research Institute (AFRRI) is an American triservice research laboratory in Bethesda, Maryland chartered by Congress in 1960 and formally established in 1961. It conducts research in the field of radiobiology and related matters which are essential to the operational and medical support of... |
https://en.wikipedia.org/wiki/Extranuclear%20inheritance | Extranuclear inheritance or cytoplasmic inheritance is the transmission of genes that occur outside the nucleus. It is found in most eukaryotes and is commonly known to occur in cytoplasmic organelles such as mitochondria and chloroplasts or from cellular parasites like viruses or bacteria.
Organelles
Mitochondria a... |
https://en.wikipedia.org/wiki/Cost%20escalation | Cost escalation can be defined as changes in the cost or price of specific goods or services in a given economy over a period. This is similar to the concepts of inflation and deflation except that escalation is specific to an item or class of items (not as general in nature), it is often not primarily driven by change... |
https://en.wikipedia.org/wiki/Blue%E2%80%93white%20screen | The blue–white screen is a screening technique that allows for the rapid and convenient detection of recombinant bacteria in vector-based molecular cloning experiments. This method of screening is usually performed using a suitable bacterial strain, but other organisms such as yeast may also be used. DNA of transforma... |
https://en.wikipedia.org/wiki/Crawl%20ratio | Crawl ratio is a term used in the automotive world to describe the highest gear ratio that a vehicle is capable of. Note that gear ratio, also known as speed ratio, of a gear train is defined as the ratio of the angular velocity of the input gear to the angular velocity of the output gear, and thus a higher gear ratio ... |
https://en.wikipedia.org/wiki/UWA%20Telerobot | The UWA telerobot is a teleoperable robot belonging to the school of mechanical and civil engineering at the University of Western Australia.
Development
The UWA telerobot is a historic landmark for the Internet and The University of Western Australia. It was the first telerobot device made available for general use o... |
https://en.wikipedia.org/wiki/Whitehead%27s%20point-free%20geometry | In mathematics, point-free geometry is a geometry whose primitive ontological notion is region rather than point. Two axiomatic systems are set out below, one grounded in mereology, the other in mereotopology and known as connection theory.
Point-free geometry was first formulated in Whitehead (1919, 1920), not as a... |
https://en.wikipedia.org/wiki/IEEE%20P1619 | Institute of Electrical and Electronics Engineers (IEEE) standardization project for encryption of stored data, but more generically refers to the Security in Storage Working Group (SISWG), which includes a family of standards for protection of stored data and for the corresponding cryptographic key management.
Standa... |
https://en.wikipedia.org/wiki/Triple%20product%20rule | The triple product rule, known variously as the cyclic chain rule, cyclic relation, cyclical rule or Euler's chain rule, is a formula which relates partial derivatives of three interdependent variables. The rule finds application in thermodynamics, where frequently three variables can be related by a function of the f... |
https://en.wikipedia.org/wiki/Cubic%20reciprocity | Cubic reciprocity is a collection of theorems in elementary and algebraic number theory that state conditions under which the congruence x3 ≡ p (mod q) is solvable; the word "reciprocity" comes from the form of the main theorem, which states that if p and q are primary numbers in the ring of Eisenstein integers, both ... |
https://en.wikipedia.org/wiki/National%20Cipher%20Challenge | The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attempt to break cryptograms published on the competition website. In the 2017, more than 7,500 students took part in the competition. Participants must be in full-time scho... |
https://en.wikipedia.org/wiki/Task%20state%20segment | The task state segment (TSS) is a structure on x86-based computers which holds information about a task. It is used by the operating system kernel for task management. Specifically, the following information is stored in the TSS:
Processor register state
I/O port permissions
Inner-level stack pointers
Previous T... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.