source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Interchange%20of%20limiting%20operations | In mathematics, the study of interchange of limiting operations is one of the major concerns of mathematical analysis, in that two given limiting operations, say L and M, cannot be assumed to give the same result when applied in either order. One of the historical sources for this theory is the study of trigonometric s... |
https://en.wikipedia.org/wiki/Pullback%20attractor | In mathematics, the attractor of a random dynamical system may be loosely thought of as a set to which the system evolves after a long enough time. The basic idea is the same as for a deterministic dynamical system, but requires careful treatment because random dynamical systems are necessarily non-autonomous. This req... |
https://en.wikipedia.org/wiki/Base%20flow%20%28random%20dynamical%20systems%29 | In mathematics, the base flow of a random dynamical system is the dynamical system defined on the "noise" probability space that describes how to "fast forward" or "rewind" the noise when one wishes to change the time at which one "starts" the random dynamical system.
Definition
In the definition of a random dynamical... |
https://en.wikipedia.org/wiki/Comparison%20of%20business%20integration%20software | This article is a comparison of notable business integration and business process automation software.
General
Scope
Scope of this comparison:
Service-oriented architecture implementations;
Message-oriented middleware and message brokers;
Enterprise service bus implementations;
BPEL implementations;
Enterprise a... |
https://en.wikipedia.org/wiki/Absorbing%20set%20%28random%20dynamical%20systems%29 | In mathematics, an absorbing set for a random dynamical system is a subset of the phase space. A dynamical system is a system in which a function describes the time dependence of a point in a geometrical space.
The absorbing set eventually contains the image of any bounded set under the cocycle ("flow") of the random ... |
https://en.wikipedia.org/wiki/Pumping%20%28computer%20systems%29 | Pumping, when referring to computer systems, is an informal term for transmitting a data signal more than one time per clock signal.
Overview
Early types of system memory (RAM), such as SDRAM, transmitted data on only the rising edge of the clock signal. With the advent of double data rate synchronous dynamic RAM or ... |
https://en.wikipedia.org/wiki/Sound%20amplification%20by%20stimulated%20emission%20of%20radiation | Sound amplification by stimulated emission of radiation (SASER) refers to a device that emits acoustic radiation. It focuses sound waves in a way that they can serve as accurate and high-speed carriers of information in many kinds of applications—similar to uses of laser light.
Acoustic radiation (sound waves) can be ... |
https://en.wikipedia.org/wiki/Truck%20scale | A truck scale (US), weighbridge (non-US) or railroad scale is a large set of scales, usually mounted permanently on a concrete foundation, that is used to weigh entire rail or road vehicles and their contents. By weighing the vehicle both empty and when loaded, the load carried by the vehicle can be calculated.
The k... |
https://en.wikipedia.org/wiki/EDINA | EDINA is a centre for digital expertise, based at the University of Edinburgh as a division of the Information Services Group.
Services
EDINA front-end services (those accessed directly by the user) are available free at the point of use for University of Edinburgh students and academic staff in the UK working on and... |
https://en.wikipedia.org/wiki/Functional%20square%20root | In mathematics, a functional square root (sometimes called a half iterate) is a square root of a function with respect to the operation of function composition. In other words, a functional square root of a function is a function satisfying for all .
Notation
Notations expressing that is a functional square root... |
https://en.wikipedia.org/wiki/Rostelecom | Rostelecom (Ростелеком) is Russia’s largest provider of digital services for a wide variety of consumers, households, private businesses, government and municipal authorities, and other telecom providers.
Rostelecom interconnects all local public operators’ networks into a single national network for long-distance serv... |
https://en.wikipedia.org/wiki/Integral%20cryptanalysis | In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution–permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so it is commonly known as the Square attack. It was also extended to a few oth... |
https://en.wikipedia.org/wiki/Species%20Survival%20Plan | The American Species Survival Plan or SSP program was developed in 1981 by the (American) Association of Zoos and Aquariums to help ensure the survival of selected species in zoos and aquariums, most of which are threatened or endangered in the wild.
SSP program
SSP programs focus on animals that are near threatened, ... |
https://en.wikipedia.org/wiki/Ohio%20Supercomputer%20Center | The Ohio Supercomputer Center (OSC) is a supercomputer facility located on the western end of the Ohio State University campus, just north of Columbus. Established in 1987, the OSC partners with Ohio universities, labs and industries, providing students and researchers with high performance computing, advanced cyberinf... |
https://en.wikipedia.org/wiki/Decision%20field%20theory | Decision field theory (DFT) is a dynamic-cognitive approach to human decision making. It is a cognitive model that describes how people actually make decisions rather than a rational or normative theory that prescribes what people should or ought to do. It is also a dynamic model of decision making rather than a static... |
https://en.wikipedia.org/wiki/Common%20Criteria%20Testing%20Laboratory | The Common Criteria model provides for the separation of the roles of evaluator and certifier. Product certificates are awarded by national schemes on the basis of evaluations carried by independent testing laboratories.
A Common Criteria testing laboratory is a third-party commercial security testing facility that is... |
https://en.wikipedia.org/wiki/Unidirectional%20network | A unidirectional network (also referred to as a unidirectional gateway or data diode) is a network appliance or device that allows data to travel in only one direction. Data diodes can be found most commonly in high security environments, such as defense, where they serve as connections between two or more networks of ... |
https://en.wikipedia.org/wiki/New%20Math%20%28song%29 | New Math is a 1965 song by American musician Tom Lehrer. Found on his album That Was the Year That Was, the song is a satire of the then-contemporary educational concept of New Math.
Composition
The song is composed in the key of C major in a 2/4 time signature. It correctly describes the step-by-step process for subt... |
https://en.wikipedia.org/wiki/Tannakian%20formalism | In mathematics, a Tannakian category is a particular kind of monoidal category C, equipped with some extra structure relative to a given field K. The role of such categories C is to approximate, in some sense, the category of linear representations of an algebraic group G defined over K. A number of major applications ... |
https://en.wikipedia.org/wiki/Cryptographic%20Module%20Testing%20Laboratory | Cryptographic Module Testing Laboratory (CMTL) is an information technology (IT) computer security testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the FIPS 140-2 U.S. Government standard.
The National Institute of Standards and Technology (NIST) National Voluntary L... |
https://en.wikipedia.org/wiki/Bengt%20Holmstr%C3%B6m | Bengt Robert Holmström (born 18 April 1949) is a Finnish economist who is currently Paul A. Samuelson Professor of Economics (Emeritus) at the Massachusetts Institute of Technology. Together with Oliver Hart, he received the Central Bank of Sweden Nobel Memorial Prize in Economic Sciences in 2016.
Early life and educa... |
https://en.wikipedia.org/wiki/Superdistribution | Superdistribution is an approach to distributing digital products such as software, videos, and recorded music in which the products are made publicly available and distributed in encrypted form instead of being sold in retail outlets or online shops.
Such products can be passed freely among users on physical media, o... |
https://en.wikipedia.org/wiki/Futoshiki | , or More or Less, is a logic puzzle game from Japan. Its name means "inequality". It is also spelled hutosiki (using Kunrei-shiki romanization). Futoshiki was developed by Tamaki Seto in 2001.
The puzzle is played on a square grid. The objective is to place the numbers such that each row and column contains only one ... |
https://en.wikipedia.org/wiki/Watermarking%20attack | In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.
Problem description
Disk encryption suites generally operate on data in 512-byte sectors which are individually encry... |
https://en.wikipedia.org/wiki/Darwinian%20literary%20studies | Darwinian literary studies (also known as literary Darwinism) is a branch of literary criticism that studies literature in the context of evolution by means of natural selection, including gene-culture coevolution. It represents an emerging trend of neo-Darwinian thought in intellectual disciplines beyond those tradit... |
https://en.wikipedia.org/wiki/Semantic%20interoperability | Semantic interoperability is the ability of computer systems to exchange data with unambiguous, shared meaning. Semantic interoperability is a requirement to enable machine computable logic, inferencing, knowledge discovery, and data federation between information systems.
Semantic interoperability is therefore concer... |
https://en.wikipedia.org/wiki/WEA%20Manufacturing | WEA Manufacturing was the record, tape, and compact disc manufacturing arm of WEA International Inc. from 1978 to 2003, when it was sold and merged into Cinram International, a previous competitor. The last owner when the plant closed was Technicolor.
History
WEA Manufacturing Inc. was created in 1978–1979 when Warner... |
https://en.wikipedia.org/wiki/Heuristic%20analysis | Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".
Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk usin... |
https://en.wikipedia.org/wiki/SDS%20930 | The SDS 930 was a commercial 24-bit computer using bipolar junction transistors sold by Scientific Data Systems.
It was announced in December 1963, with first installations in June 1964.
Description
An SDS 930 system consists of at least three standard () cabinets, weighing about . It is composed of an arithmetic and ... |
https://en.wikipedia.org/wiki/Free%20viewpoint%20television | Free viewpoint television (FTV) is a system for viewing natural video, allowing the user to interactively control the viewpoint and generate new views of a dynamic scene from any 3D position.
The equivalent system for computer-simulated video is known as virtual reality. With FTV, the focus of attention can be controll... |
https://en.wikipedia.org/wiki/Subharmonic%20synthesizer | A subharmonic synthesizer is a device or system that generates subharmonics of an input signal. The nth subharmonic of a signal of fundamental frequency F is a signal with frequency F/n. This differs from ordinary harmonics, where the nth harmonic of fundamental frequency F is a signal of frequency nF.
Subharmonic syn... |
https://en.wikipedia.org/wiki/Cement%20kiln | Cement kilns are used for the pyroprocessing stage of manufacture of portland and other types of hydraulic cement, in which calcium carbonate reacts with silica-bearing minerals to form a mixture of calcium silicates. Over a billion tonnes of cement are made per year, and cement kilns are the heart of this production ... |
https://en.wikipedia.org/wiki/Endoplasmic-reticulum-associated%20protein%20degradation | Endoplasmic-reticulum-associated protein degradation (ERAD) designates a cellular pathway which targets misfolded proteins of the endoplasmic reticulum for ubiquitination and subsequent degradation by a protein-degrading complex, called the proteasome.
Mechanism
The process of ERAD can be divided into three steps:
... |
https://en.wikipedia.org/wiki/Authorize.Net | Authorize.Net, A Visa Solution is a United States-based payment gateway service provider, allowing merchants to accept credit card and electronic check payments through their website and over an Internet Protocol (IP) connection. Founded in 1996 as Authorize.Net, Inc., the company is now a subsidiary of Visa Inc. Its s... |
https://en.wikipedia.org/wiki/Power%20cycling | Power cycling is the act of turning a piece of equipment, usually a computer, off and then on again. Reasons for power cycling include having an electronic device reinitialize its set of configuration parameters or recover from an unresponsive state of its mission critical functionality, such as in a crash or hang situ... |
https://en.wikipedia.org/wiki/Potential%20space | In anatomy, a potential space is a space between two adjacent structures that are normally pressed together (directly apposed). Many anatomic spaces are potential spaces, which means that they are potential rather than realized (with their realization being dynamic according to physiologic or pathophysiologic events). ... |
https://en.wikipedia.org/wiki/Jaikoz | Jaikoz is a Java program used for editing and mass tagging music file tags.
Jaikoz generates acoustic fingerprints from music files using the AcoustId service, it can then look up the metadata from MusicBrainz using the AcoustId, additionally it can match based on metadata to MusicBrainz or Discogs. Matching is first ... |
https://en.wikipedia.org/wiki/Tektronix%204050 | The Tektronix 4050 is a series of three desktop computers produced by Tektronix in the late 1970s through the early 1980s. The display technology is similar to the Tektronix 4010 terminal, using a storage tube display to avoid the need for video RAM. They are all-in-one designs with the display, keyboard, CPU and DC300... |
https://en.wikipedia.org/wiki/Ombient | Ombient is the moniker under which Mike Hunter performs his completely improvised ambient/drone music.
Ombient's ambient/drone music, being of a live and improvisational nature, is representative of the feeling of the moment in which it is performed and of the subtle feedback between the audience and the cool performe... |
https://en.wikipedia.org/wiki/Sankofa | (pronounced SAHN-koh-fah) is a word in the Twi language of Ghana meaning “to retrieve" (literally "go back and get"; - to return; - to go; - to fetch, to seek and take) and also refers to the Bono Adinkra symbol represented either with a stylized heart shape or by a bird with its head turned backwards while its feet... |
https://en.wikipedia.org/wiki/Firing%20squad%20synchronization%20problem | The firing squad synchronization problem is a problem in computer science and cellular automata in which the goal is to design a cellular automaton that, starting with a single active cell, eventually reaches a state in which all cells are simultaneously active. It was first proposed by John Myhill in 1957 and publishe... |
https://en.wikipedia.org/wiki/Security%20and%20safety%20features%20new%20to%20Windows%20Vista | There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.
Beginning in early 2002 with Microsoft's announcement of its Trustworthy Computing initiative, a great deal of work has gone into making Windows Vista a more... |
https://en.wikipedia.org/wiki/Nesfatin-1 | Nesfatin-1 is a neuropeptide produced in the hypothalamus of mammals. It participates in the regulation of hunger and fat storage. Increased nesfatin-1 in the hypothalamus contributes to diminished hunger, a 'sense of fullness', and a potential loss of body fat and weight.
A study of metabolic effects of nesfatin-1 in... |
https://en.wikipedia.org/wiki/Blondie24 | Blondie24 is an artificial intelligence checkers-playing computer program named after the screen name used by a team led by David B. Fogel. The purpose was to determine the effectiveness of an artificial intelligence checkers-playing computer program.
The screen name was used on The Zone, an internet boardgaming site ... |
https://en.wikipedia.org/wiki/Roemer%20model%20of%20political%20competition | The Roemer model of political competition is a game between political parties in which each party announces a multidimensional policy vector. Since Nash equilibria do not normally exist when the policy space is multidimensional, John Roemer introduced the concept of party-unanimity Nash equilibrium (PUNE), which can b... |
https://en.wikipedia.org/wiki/Proteinoplast | Proteinoplasts (sometimes called proteoplasts, aleuroplasts, and aleuronaplasts) are specialized organelles found only in plant cells. Proteinoplasts belong to a broad category of organelles known as plastids. Plastids are specialized double-membrane organelles found in plant cells. Plastids perform a variety of functi... |
https://en.wikipedia.org/wiki/Cremona%20group | In algebraic geometry, the Cremona group, introduced by , is the group of birational automorphisms of the -dimensional projective space over a field It is denoted by
or or .
The Cremona group is naturally identified with the automorphism group of the field of the rational functions in indeterminates over , or in ... |
https://en.wikipedia.org/wiki/Semisimple%20operator | In mathematics, a linear operator T : V → V on a vector space V is semisimple if every T-invariant subspace has a complementary T-invariant subspace. If T is a semisimple linear operator on V, then V is a semisimple representation of T. Equivalently, a linear operator is semisimple if its minimal polynomial is a prod... |
https://en.wikipedia.org/wiki/Constant%20false%20alarm%20rate | Constant false alarm rate (CFAR) detection refers to a common form of adaptive algorithm used in radar systems to detect target returns against a background of noise, clutter and interference.
Principle
In the radar receiver, the returning echoes are typically received by the antenna, amplified, down-converted to an i... |
https://en.wikipedia.org/wiki/Constant%20amplitude%20zero%20autocorrelation%20waveform | In signal processing, a Constant Amplitude Zero AutoCorrelation waveform (CAZAC) is a periodic complex-valued signal with modulus one and out-of-phase periodic (cyclic) autocorrelations equal to zero. CAZAC sequences find application in wireless communication systems, for example in 3GPP Long Term Evolution for synchr... |
https://en.wikipedia.org/wiki/Comparison%20of%20firewalls | This is a comparison of firewalls.
Firewall software
Firewall appliances
Firewall rule-set Appliance-UTM filtering features comparison
Notes
Firewall rule-set advanced features comparison
Firewall's other features comparison
Notes
Non-Firewall extra features comparison
These are not strictly firewall features... |
https://en.wikipedia.org/wiki/Sandstorm%20Enterprises | Sandstorm Enterprises was an American computer security software vendor founded in 1998 by Simson Garfinkel, James van Bokkelen, Gene Spafford, Dan Geer. In January 2010, it was purchased by NIKSUN, Inc.
Sandstorm was located in the greater Boston area. Sandstorm's major products were PhoneSweep, the first commercial... |
https://en.wikipedia.org/wiki/Spectral%20flux | Spectral flux is a measure of how quickly the power spectrum of a signal is changing, calculated by comparing the power spectrum for one frame against the power spectrum from the previous frame.
More precisely, it is usually calculated as the L2-norm (also known as the Euclidean distance) between the two normalised s... |
https://en.wikipedia.org/wiki/Multi-attribute%20global%20inference%20of%20quality | Multi-attribute global inference of quality (MAGIQ) is a multi-criteria decision analysis technique. MAGIQ is based on a hierarchical decomposition of comparison attributes and rating assignment using rank order centroids.
Description
The MAGIQ technique is used to assign a single, overall measure of quality to each ... |
https://en.wikipedia.org/wiki/London%20equations | The London equations, developed by brothers Fritz and Heinz London in 1935, are constitutive relations for a superconductor relating its superconducting current to electromagnetic fields in and around it. Whereas Ohm's law is the simplest constitutive relation for an ordinary conductor, the London equations are the sim... |
https://en.wikipedia.org/wiki/Substrate%20mapping | Substrate mapping (or wafer mapping) is a process in which the performance of semiconductor devices on a substrate is represented by a map showing the performance as a colour-coded grid. The map is a convenient representation of the variation in performance across the substrate, since the distribution of those variatio... |
https://en.wikipedia.org/wiki/Chemotaxis%20assay | Chemotaxis assays are experimental tools for evaluation of chemotactic ability of prokaryotic or eukaryotic cells.
A wide variety of techniques have been developed. Some techniques are qualitative - allowing an investigator to approximately determine a cell's chemotactic affinity for an analyte - while others are quant... |
https://en.wikipedia.org/wiki/Bedford%20Level%20experiment | The Bedford Level experiment was a series of observations carried out along a length of the Old Bedford River on the Bedford Level of the Cambridgeshire Fens in the United Kingdom during the 19th and early 20th centuries to measure the curvature of the Earth.
Samuel Birley Rowbotham, who conducted the first observati... |
https://en.wikipedia.org/wiki/Statistical%20semantics | In linguistics, statistical semantics applies the methods of statistics to the problem of determining the meaning of words or phrases, ideally through unsupervised learning, to a degree of precision at least sufficient for the purpose of information retrieval.
History
The term statistical semantics was first used by ... |
https://en.wikipedia.org/wiki/Rangekeeper | Rangekeepers were electromechanical fire control computers used primarily during the early part of the 20th century. They were sophisticated analog computers whose development reached its zenith following World War II, specifically the Computer Mk 47 in the Mk 68 Gun Fire Control system. During World War II, rangekeepe... |
https://en.wikipedia.org/wiki/STAR%20model | In statistics, Smooth Transition Autoregressive (STAR) models are typically applied to time series data as an extension of autoregressive models, in order to allow for higher degree of flexibility in model parameters through a smooth transition.
Given a time series of data xt, the STAR model is a tool for understandin... |
https://en.wikipedia.org/wiki/Fabric%20Application%20Interface%20Standard | ANSI INCITS 432-2007: Information technology - Fabric Application Interface Standard or FAIS is an application programming interface framework for implementing storage applications in a storage area network. FAIS is defined by Technical Committee T11 of the International Committee for Information Technology Standards.... |
https://en.wikipedia.org/wiki/NPIV | NPIV or N_Port ID Virtualization is a Fibre Channel feature whereby multiple Fibre Channel node port (N_Port) IDs can share a single physical N_Port. This allows multiple Fibre Channel initiators to occupy a single physical port, easing hardware requirements in Storage Area Network (SAN) design, especially where virtu... |
https://en.wikipedia.org/wiki/Simple%20Key-Management%20for%20Internet%20Protocol | Simple Key-Management for Internet Protocol or SKIP was a protocol developed circa 1995 by the IETF Security Working Group for the sharing of encryption keys. SKIP and Photuris were evaluated as key exchange mechanisms for IPsec before the adoption of IKE in 1998.
Simple Key Management for Internet Protocols (SKIP) is... |
https://en.wikipedia.org/wiki/DSOS | DSOS (Deep Six Operating System) was a real-time operating system (sometimes termed an operating system kernel) developed by Texas Instruments' division Geophysical Services Incorporated (GSI) in the mid-1970s.
Background
The Geophysical Services division of Texas Instruments' main business was to search for petroleu... |
https://en.wikipedia.org/wiki/Kendall%20tau%20distance | The Kendall tau rank distance is a metric (distance function) that counts the number of pairwise disagreements between two ranking lists. The larger the distance, the more dissimilar the two lists are. Kendall tau distance is also called bubble-sort distance since it is equivalent to the number of swaps that the bubble... |
https://en.wikipedia.org/wiki/Dynamic%20single-frequency%20networks | Dynamic Single Frequency Networks (DSFN) is a transmitter macrodiversity technique for OFDM based cellular networks.
DSFN is based on the idea of single frequency networks (SFN), which is a group of radio transmitters that send the same signal simultaneously over the same frequency. The term originates from the broad... |
https://en.wikipedia.org/wiki/Genghis%20Khan%20II%3A%20Clan%20of%20the%20Gray%20Wolf | Genghis Khan II: Clan of the Gray Wolf, originally released as , is a 1992 video game developed by Koei. It is part of Koei's Historical Simulation Series of games, and is the sequel to Genghis Khan, though this is the third game in the series. Genghis Khan II was developed and published for MSX2, Nintendo Entertainmen... |
https://en.wikipedia.org/wiki/Protocol%20for%20Carrying%20Authentication%20for%20Network%20Access | PANA (Protocol for Carrying Authentication for Network Access) is an IP-based protocol that allows a device to authenticate itself with a network to be granted access. PANA will not define any new authentication protocol, key distribution, key agreement or key derivation protocols. For these purposes, the Extensible Au... |
https://en.wikipedia.org/wiki/Beta-M | The Beta-M is a radioisotope thermoelectric generator (RTG) that was used in Soviet-era lighthouses and beacons.
Design
The Beta-M contains a core made up of strontium-90, which has a half-life of 28.79 years. The service life of these generators is initially 10 years, and can be extended for another 5 to 10 years. T... |
https://en.wikipedia.org/wiki/Variable-length%20code | In coding theory, a variable-length code is a code which maps source symbols to a variable number of bits. The equivalent concept in computer science is bit string.
Variable-length codes can allow sources to be compressed and decompressed with zero error (lossless data compression) and still be read back symbol by sy... |
https://en.wikipedia.org/wiki/Surface-area-to-volume%20ratio | The surface-area-to-volume ratio or surface-to-volume ratio (denoted as SA:V, SA/V, or sa/vol) is the ratio between surface area and volume of an object or collection of objects.
SA:V is an important concept in science and engineering. It is used to explain the relation between structure and function in processes occu... |
https://en.wikipedia.org/wiki/Trailing%20zero | In mathematics, trailing zeros are a sequence of 0 in the decimal representation (or more generally, in any positional representation) of a number, after which no other digits follow.
Trailing zeros to the right of a decimal point, as in 12.340, don’t affect the value of a number and may be omitted if all that is of i... |
https://en.wikipedia.org/wiki/History%20of%20IBM | International Business Machines (IBM) is a multinational corporation specializing in computer technology and information technology consulting. Headquartered in Armonk, New York, United States, the company traces its roots to the amalgamation of various enterprises dedicated to automating routine business transactions,... |
https://en.wikipedia.org/wiki/Integrated%20enterprise%20modeling | Integrated enterprise modeling (IEM) is an enterprise modeling method used for the admission and for the reengineering of processes both in producing enterprises and in the public area and service providers. In integrated enterprise modeling different aspects as functions and data become described in one model. Further... |
https://en.wikipedia.org/wiki/Hiroyuki%20Goto | recited pi from memory to 42,195 decimal places at NHK Broadcasting Centre, Tokyo on 18 February 1995. This set the world record at the time, which was held for more than a decade until Lu Chao beat it in 2005.
He is a game designer at Namco. He is the creator of word puzzle video game Kotoba no Puzzle Moji Pittan, wh... |
https://en.wikipedia.org/wiki/Obligate | As an adjective, obligate means "by necessity" (antonym facultative) and is used mainly in biology in phrases such as:
Obligate aerobe, an organism that cannot survive without oxygen
Obligate anaerobe, an organism that cannot survive in the presence of oxygen
Obligate air-breather, a term used in fish physiology to ... |
https://en.wikipedia.org/wiki/Lamellibrachia | Lamellibrachia is a genus of tube worms related to the giant tube worm, Riftia pachyptila. They live at deep-sea cold seeps where hydrocarbons (oil and methane) leak out of the seafloor, and are entirely reliant on internal, sulfide-oxidizing bacterial symbionts for their nutrition. The symbionts, gammaproteobacteria, ... |
https://en.wikipedia.org/wiki/64b/66b%20encoding | In data networking and transmission, 64b/66b is a line code that transforms 64-bit data to 66-bit line code to provide enough state changes to allow reasonable clock recovery and alignment of the data stream at the receiver. It was defined by the IEEE 802.3 working group as part of the IEEE 802.3ae-2002 amendment which... |
https://en.wikipedia.org/wiki/BMT%20Group | BMT Group Ltd (previously British Maritime Technology) was established in 1985, from the merger of the UK's British Ship Research Association and National Maritime Institute, as an international multidisciplinary engineering, science and technology consultancy offering services particularly in the defence and security,... |
https://en.wikipedia.org/wiki/Screenless%20video | Screenless video is any system for transmitting visual information from a video source without the use of a screen. Screenless computing systems can be divided into three groups: Visual Image, Retinal Direct, and Synaptic Interface.
Visual image
Visual Image screenless display includes any image that the eye can pe... |
https://en.wikipedia.org/wiki/Rotation%20formalisms%20in%20three%20dimensions | In geometry, various formalisms exist to express a rotation in three dimensions as a mathematical transformation. In physics, this concept is applied to classical mechanics where rotational (or angular) kinematics is the science of quantitative description of a purely rotational motion. The orientation of an object at ... |
https://en.wikipedia.org/wiki/Loco-Motion%20%28video%20game%29 | Loco-Motion, known as in Japan, is an arcade puzzle game developed by Konami in 1982 and released by Sega in Japan. The North American rights were licensed to Centuri. In Loco-Motion, the player builds a path for their unstoppable locomotive by moving tracks which will allow it to pick up passengers.
The game was por... |
https://en.wikipedia.org/wiki/Extrusion%20detection | Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful attempts to use the resources of a computer system to compromise other systems. Extrusion detection techniques focus primarily on the analysis of system activity ... |
https://en.wikipedia.org/wiki/Solar%20gain | Solar gain (also known as solar heat gain or passive solar gain) is the increase in thermal energy of a space, object or structure as it absorbs incident solar radiation. The amount of solar gain a space experiences is a function of the total incident solar irradiance and of the ability of any intervening material to t... |
https://en.wikipedia.org/wiki/Induction%20heater | An induction heater is a key piece of equipment used in all forms of induction heating. Typically an induction heater operates at either medium frequency (MF) or radio frequency (RF) ranges.
Four main component systems form the basis of a modern induction heater
the control system, control panel, or ON / OFF switch; ... |
https://en.wikipedia.org/wiki/Statistical%20potential | In protein structure prediction, statistical potentials or knowledge-based potentials are scoring functions derived from an analysis of known protein structures in the Protein Data Bank (PDB).
The original method to obtain such potentials is the quasi-chemical approximation, due to Miyazawa and Jernigan. It was later ... |
https://en.wikipedia.org/wiki/T.37 | T.37 is an ITU standard which deals with sending fax messages using email. It is also referred to as "Internet fax" or "Store-forward-fax".
A fax machine supporting T.37 will send a fax to an email address by converting the document to a TIFF-F image, attaching it to an email (using the MIME format), and sending the d... |
https://en.wikipedia.org/wiki/WDMA%20%28computer%29 | The Word DMA (WDMA) interface was the fastest method used to transfer data between the computer (through the Advanced Technology Attachment (ATA) controller) and an ATA device until Ultra Direct Memory Access (UDMA) was implemented. Single/Multiword DMA took over from Programmed input/output (PIO) as the choice of int... |
https://en.wikipedia.org/wiki/Structural%20semantics | Structural semantics (also structuralist semantics) is a linguistic school and paradigm that emerged in Europe from the 1930s, inspired by the structuralist linguistic movement started by Ferdinand de Saussure's 1916 work "Cours De Linguistique Generale" (A Course in General Linguistics).
Examples of approaches withi... |
https://en.wikipedia.org/wiki/Multiple%20sub-Nyquist%20sampling%20encoding | MUSE (Multiple sub-Nyquist Sampling Encoding), commercially known as Hi-Vision (a contraction of HIgh-definition teleVISION) was a Japanese analog high-definition television system, with design efforts going back to 1979.
It used dot-interlacing and digital video compression to deliver 1125 line, 60 field-per-second (... |
https://en.wikipedia.org/wiki/CrystEngCommunity | CrystEngCommunity is a virtual web community for people working in the field of crystal engineering. The website is owned by the Royal Society of Chemistry (RSC).
CrystEngCommunity has links to the main international research groups working in crystal engineering; publishes occasional profiles (interviews) of crystal... |
https://en.wikipedia.org/wiki/Pugmill | A pugmill, pug mill, or commonly just pug, is a machine in which clay or other materials are extruded in a plastic state or a similar machine for the trituration of ore. Industrial applications are found in pottery, bricks, cement and some parts of the concrete and asphalt mixing processes. A pugmill may be a fast cont... |
https://en.wikipedia.org/wiki/JOSSO | Java Open Single Sign On (JOSSO) is an open source Identity and Access Management (IAM) platform for rapid and standards-based Cloud-scale Single Sign-On, web services security, authentication and provisioning.
See also
Shibboleth (Internet2)
CAS
Digital certificates
List of single sign-on implementations
Exter... |
https://en.wikipedia.org/wiki/Usenet%20quoting | When Usenet and e-mail users respond to a message, they often want to include some context for the discussion. This is often accomplished by quoting a portion of the original message using Usenet conventions. In essence the convention is to communicate in plain text format (not HTML) and quote with ">" at the beginning... |
https://en.wikipedia.org/wiki/Kinetic%20Rule%20Language | Kinetic Rule Language (KRL) is a rule-based programming language for creating applications on the Live Web. KRL programs, or rulesets, comprise a number of rules that respond to particular events. KRL has been promoted as language for building personal clouds.
KRL is part of an open-source project called KRE, for Kin... |
https://en.wikipedia.org/wiki/Desktop%20virtualization | Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.
Desktop virtualization can be used in conjunction with application virtualization and user profile management systems, now termed user vi... |
https://en.wikipedia.org/wiki/Nomen%20novum | In biological nomenclature, a nomen novum (Latin for "new name"), new replacement name (or replacement name, new substitute name, substitute name) is a scientific name that is created specifically to replace another scientific name, but only when this other name cannot be used for technical, nomenclatural reasons (for ... |
https://en.wikipedia.org/wiki/Nearest%20neighbor%20search | Nearest neighbor search (NNS), as a form of proximity search, is the optimization problem of finding the point in a given set that is closest (or most similar) to a given point. Closeness is typically expressed in terms of a dissimilarity function: the less similar the objects, the larger the function values.
Formall... |
https://en.wikipedia.org/wiki/Audio%20bit%20depth | In digital audio using pulse-code modulation (PCM), bit depth is the number of bits of information in each sample, and it directly corresponds to the resolution of each sample. Examples of bit depth include Compact Disc Digital Audio, which uses 16 bits per sample, and DVD-Audio and Blu-ray Disc which can support up to... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.