source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/American%20Solar%20Challenge
The American Solar Challenge (ASC), previously known as the North American Solar Challenge and Sunrayce, is a solar car race across the United States. In the race, teams from colleges and universities throughout North America design, build, test, and race solar-powered vehicles in a long distance road rally-style event...
https://en.wikipedia.org/wiki/Hook%20effect
The hook effect refers to the prozone phenomenon, also known as antibody excess or the Postzone phenomenon, also known as antigen excess. It is an immunologic phenomenon whereby the effectiveness of antibodies to form immune complexes can be impaired when concentrations of an antibody or an antigen are very high. The f...
https://en.wikipedia.org/wiki/Caret%20notation
Caret notation is a notation for control characters in ASCII. The notation assigns to control-code 1, sequentially through the alphabet to assigned to control-code 26 (0x1A). For the control-codes outside of the range 1–26, the notation extends to the adjacent, non-alphabetic ASCII characters. Often a control charac...
https://en.wikipedia.org/wiki/Comparison%20of%20project%20management%20software
The following is a comparison of project management software. General information Features Monetary features See also Kanban (development) Project management software Project planning Comparison of scrum software Comparison of development estimation software Comparison of source-code-hosting facilities Compa...
https://en.wikipedia.org/wiki/Spite%20%28game%20theory%29
In fair division problems, spite is a phenomenon that occurs when a player's value of an allocation decreases when one or more other players' valuation increases. Thus, other things being equal, a player exhibiting spite will prefer an allocation in which other players receive less than more (if more of the good is de...
https://en.wikipedia.org/wiki/De%20Arte%20Combinatoria
The Dissertatio de arte combinatoria ("Dissertation on the Art of Combinations" or "On the Combinatorial Art") is an early work by Gottfried Leibniz published in 1666 in Leipzig. It is an extended version of his first doctoral dissertation, written before the author had seriously undertaken the study of mathematics. Th...
https://en.wikipedia.org/wiki/Arabic%20chat%20alphabet
The Arabic chat alphabet, Arabizi, or Arabeezi refer to the romanized alphabets for informal Arabic dialects in which Arabic script is transcribed or encoded into a combination of Latin script and Arabic numerals. These informal chat alphabets were originally used primarily by youth in the Arab world in very informal ...
https://en.wikipedia.org/wiki/Virtual%20globe
A virtual globe is a three-dimensional (3D) software model or representation of Earth or another world. A virtual globe provides the user with the ability to freely move around in the virtual environment by changing the viewing angle and position. Compared to a conventional globe, virtual globes have the additional cap...
https://en.wikipedia.org/wiki/Telescopic%20handler
A telescopic handler, also called a lull, telehandler, teleporter, reach forklift, or zoom boom, is a machine widely used in agriculture and industry. It is somewhat like a forklift but has a boom (telescopic cylinder), making it more a crane than a forklift, with the increased versatility of a single telescopic boom t...
https://en.wikipedia.org/wiki/Problem%20solving%20environment
A problem solving environment (PSE) is a completed, integrated and specialised computer software for solving one class of problems, combining automated problem-solving methods with human-oriented tools for guiding the problem resolution. A PSE may also assist users in formulating problem resolution. A PSE may also assi...
https://en.wikipedia.org/wiki/Finger%20binary
Finger binary is a system for counting and displaying binary numbers on the fingers of either or both hands. Each finger represents one binary digit or bit. This allows counting from zero to 31 using the fingers of one hand, or 1023 using both: that is, up to 25−1 or 210−1 respectively. Modern computers typically stor...
https://en.wikipedia.org/wiki/Complementary%20code%20keying
Complementary code keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.11b specification. In 1999, CCK was adopted to supplement the Barker code in wireless digital networks to achieve data rate higher than 2 Mbit/s at the expense of shorter distance. This is due to the shor...
https://en.wikipedia.org/wiki/Phenocopy
A phenocopy is a variation in phenotype (generally referring to a single trait) which is caused by environmental conditions (often, but not necessarily, during the organism's development), such that the organism's phenotype matches a phenotype which is determined by genetic factors. It is not a type of mutation, as it ...
https://en.wikipedia.org/wiki/Autonegotiation
Autonegotiation is a signaling mechanism and procedure used by Ethernet over twisted pair by which two connected devices choose common transmission parameters, such as speed, duplex mode, and flow control. In this process, the connected devices first share their capabilities regarding these parameters and then choose t...
https://en.wikipedia.org/wiki/Resource%20holding%20potential
In biology, resource holding potential (RHP) is the ability of an animal to win an all-out fight if one were to take place. The term was coined by Geoff Parker to disambiguate physical fighting ability from the motivation to persevere in a fight (Parker, 1974). Originally the term used was 'resource holding power', bu...
https://en.wikipedia.org/wiki/PostSecret
PostSecret is an ongoing community mail art project, created by Frank Warren in 2005, in which people mail their secrets anonymously on a homemade postcard. Selected secrets are then posted on the PostSecret website, or used for PostSecret's books or museum exhibits. History The concept of the project was that comple...
https://en.wikipedia.org/wiki/Photostimulation
Photostimulation is the use of light to artificially activate biological compounds, cells, tissues, or even whole organisms. Photostimulation can be used to noninvasively probe various relationships between different biological processes, using only light. In the long run, photostimulation has the potential for use in ...
https://en.wikipedia.org/wiki/Bandit%20Kings%20of%20Ancient%20China
Bandit Kings of Ancient China, also known as in Japan, is a turn-based strategy video game developed and published by Koei, and released in 1989 for MSX, MS-DOS, Amiga, and Macintosh and in 1990 for the Nintendo Entertainment System. In 1996, Koei issued a remake for the Japanese Sega Saturn and PlayStation featuring ...
https://en.wikipedia.org/wiki/Registered%20memory
Registered (also called buffered) memory modules have a register between the DRAM modules and the system's memory controller. They place less electrical load on the memory controller and allow single systems to remain stable with more memory modules than they would have otherwise. When compared with registered memory,...
https://en.wikipedia.org/wiki/Angelfire
Angelfire is an Internet service that offers website services. It is owned by Lycos, which also owns Tripod.com. Angelfire operates separately from Tripod.com and includes features such as blog building and a photo gallery builder. Free webpages are no longer available to new registrants and have been replaced by paid ...
https://en.wikipedia.org/wiki/Series%2040
Series 40, often shortened as S40, is a software platform and application user interface (UI) software on Nokia's broad range of mid-tier feature phones, as well as on some of the Vertu line of luxury phones. It was one of the world's most widely used mobile phone platforms and found in hundreds of millions of devices....
https://en.wikipedia.org/wiki/Multi-master%20replication
Multi-master replication is a method of database replication which allows data to be stored by a group of computers, and updated by any member of the group. All members are responsive to client data queries. The multi-master replication system is responsible for propagating the data modifications made by each member to...
https://en.wikipedia.org/wiki/Business%20rule%20management%20system
A BRMS or business rule management system is a software system used to define, deploy, execute, monitor and maintain the variety and complexity of decision logic that is used by operational systems within an organization or enterprise. This logic, also referred to as business rules, includes policies, requirements, and...
https://en.wikipedia.org/wiki/Millman%27s%20theorem
In electrical engineering, Millman's theorem (or the parallel generator theorem) is a method to simplify the solution of a circuit. Specifically, Millman's theorem is used to compute the voltage at the ends of a circuit made up of only branches in parallel. It is named after Jacob Millman, who proved the theorem. Exp...
https://en.wikipedia.org/wiki/WUNI
WUNI (channel 66) is a television station licensed to Marlborough, Massachusetts, United States, broadcasting the Spanish-language Univision network to the Boston area. It is owned by TelevisaUnivision alongside Derry, New Hampshire–licensed True Crime Network affiliate WWJE-DT (channel 50); Entravision Communications ...
https://en.wikipedia.org/wiki/Natural%20region
A natural region (landscape unit) is a basic geographic unit. Usually, it is a region which is distinguished by its common natural features of geography, geology, and climate. From the ecological point of view, the naturally occurring flora and fauna of the region are likely to be influenced by its geographical and ge...
https://en.wikipedia.org/wiki/Daina%20Taimi%C5%86a
Daina Taimiņa (born August 19, 1954) is a Latvian mathematician, retired adjunct associate professor of mathematics at Cornell University, known for developing a way of modeling hyperbolic geometry with crocheted objects. Education and career Taimiņa received all of her formal education in Riga, Latvia, where in 1977 ...
https://en.wikipedia.org/wiki/The%20Unix%20Programming%20Environment
The Unix Programming Environment, first published in 1984 by Prentice Hall, is a book written by Brian W. Kernighan and Rob Pike, both of Bell Labs and considered an important and early document of the Unix operating system. Unix philosophy The book addresses the Unix philosophy of small cooperating tools with standa...
https://en.wikipedia.org/wiki/Logical%20Volume%20Manager%20%28Linux%29
In Linux, Logical Volume Manager (LVM) is a device mapper framework that provides logical volume management for the Linux kernel. Most modern Linux distributions are LVM-aware to the point of being able to have their root file systems on a logical volume. Heinz Mauelshagen wrote the original LVM code in 1998, when he...
https://en.wikipedia.org/wiki/Fibre%20Channel%20time-out%20values
The FC-PH standard defines three time-out values used for error detection and recovery in Fibre Channel protocol. E_D_TOV stands for Error Detect TimeOut Value. This is the basic error timeout used for all Fibre Channel error detection. Its default value is 2 seconds. R_A_TOV stands for Resource Allocation TimeOut ...
https://en.wikipedia.org/wiki/Signal/One
Signal/One was a manufacturer of high performance SSB and CW HF radio communications transceivers initially based in St. Petersburg, Florida, United States. History Signal/One's parent company was Electronic Communications, Inc. (ECI), a military division of NCR Corporation located in St. Petersburg, Florida. Key Si...
https://en.wikipedia.org/wiki/British%20Informatics%20Olympiad
The British Informatics Olympiad (BIO) is an annual computer-programming competition for secondary and sixth-form students. Any student under 19 who is in full-time pre-university education and resident in mainland Britain is eligible to compete. The competition is composed of two rounds - a preliminary 3-question, 3-h...
https://en.wikipedia.org/wiki/Cabal%20%28set%20theory%29
The Cabal was, or perhaps is, a set of set theorists in Southern California, particularly at UCLA and Caltech, but also at UC Irvine. Organization and procedures range from informal to nonexistent, so it is difficult to say whether it still exists or exactly who has been a member, but it has included such notable figu...
https://en.wikipedia.org/wiki/Steel%20frame
Steel frame is a building technique with a "skeleton frame" of vertical steel columns and horizontal I-beams, constructed in a rectangular grid to support the floors, roof and walls of a building which are all attached to the frame. The development of this technique made the construction of the skyscraper possible. Co...
https://en.wikipedia.org/wiki/WWIVnet
WWIVnet was a Bulletin board system (BBS) network for WWIV-based BBSes. It was created by Wayne Bell on December 1, 1987. The system was similar to FidoNet in purpose, but used a very different routing mechanism that was more automated and distributed. Network layout WWIVnet consisted of several participating BBSes, e...
https://en.wikipedia.org/wiki/TeraGrid
TeraGrid was an e-Science grid computing infrastructure combining resources at eleven partner sites. The project started in 2001 and operated from 2004 through 2011. The TeraGrid integrated high-performance computers, data resources and tools, and experimental facilities. Resources included more than a petaflops of co...
https://en.wikipedia.org/wiki/Resist%20%28semiconductor%20fabrication%29
In semiconductor fabrication, a resist is a thin layer used to transfer a circuit pattern to the semiconductor substrate which it is deposited upon. A resist can be patterned via lithography to form a (sub)micrometer-scale, temporary mask that protects selected areas of the underlying substrate during subsequent proces...
https://en.wikipedia.org/wiki/Metastability%20%28electronics%29
In electronics, metastability is the ability of a digital electronic system to persist for an unbounded time in an unstable equilibrium or metastable state. In digital logic circuits, a digital signal is required to be within certain voltage or current limits to represent a '0' or '1' logic level for correct circuit op...
https://en.wikipedia.org/wiki/Special%20right%20triangle
A special right triangle is a right triangle with some regular feature that makes calculations on the triangle easier, or for which simple formulas exist. For example, a right triangle may have angles that form simple relationships, such as 45°–45°–90°. This is called an "angle-based" right triangle. A "side-based" rig...
https://en.wikipedia.org/wiki/It%27s%20Too%20Late%20to%20Stop%20Now
It's Too Late to Stop Now is a 1974 live double album by Northern Irish singer-songwriter Van Morrison. It features performances that were recorded in concerts at the Troubadour in Los Angeles, California, the Santa Monica Civic Auditorium, and the Rainbow in London, during Morrison's three-month tour with his eleven-p...
https://en.wikipedia.org/wiki/Uniform%20access%20principle
The uniform access principle of computer programming was put forth by Bertrand Meyer (originally in his book Object-Oriented Software Construction). It states "All services offered by a module should be available through a uniform notation, which does not betray whether they are implemented through storage or through c...
https://en.wikipedia.org/wiki/Sender%20Rewriting%20Scheme
The Sender Rewriting Scheme (SRS) is a scheme for bypassing the Sender Policy Framework's (SPF) methods of preventing forged sender addresses. Forging a sender address is also known as email spoofing. Background In a number of cases, including change of email address and mailing lists, a message transfer agent (MTA) ...
https://en.wikipedia.org/wiki/Microdialysis
Microdialysis is a minimally-invasive sampling technique that is used for continuous measurement of free, unbound analyte concentrations in the extracellular fluid of virtually any tissue. Analytes may include endogenous molecules (e.g. neurotransmitter, hormones, glucose, etc.) to assess their biochemical functions in...
https://en.wikipedia.org/wiki/CRT%20projector
A CRT projector is a video projector that uses a small, high-brightness cathode ray tube (CRT) as the image generating element. The image is then focused and enlarged onto a screen using a lens kept in front of the CRT face. The first color CRT projectors came out in the early 1950s. Most modern CRT projectors are colo...
https://en.wikipedia.org/wiki/Veritas%20Storage%20Foundation
Veritas Storage Foundation (VSF), previously known as Veritas Foundation Suite, is a computer software product made by Veritas Software that combines Veritas Volume Manager (VxVM) and Veritas File System (VxFS) to provide online-storage management. Symantec Corporation developed and maintained VSF until January 29, 2...
https://en.wikipedia.org/wiki/Propidium%20iodide
Propidium iodide (or PI) is a fluorescent intercalating agent that can be used to stain cells and nucleic acids. PI binds to DNA by intercalating between the bases with little or no sequence preference. When in an aqueous solution, PI has a fluorescent excitation maximum of 493 nm (blue-green), and an emission maximum ...
https://en.wikipedia.org/wiki/Wirth%27s%20law
Wirth's law is an adage on computer performance which states that software is getting slower more rapidly than hardware is becoming faster. The adage is named after Niklaus Wirth, a computer scientist who discussed it in his 1995 article "A Plea for Lean Software". History Wirth attributed the saying to Martin Reise...
https://en.wikipedia.org/wiki/Naturalisation%20%28biology%29
Naturalisation (or naturalization) is the ecological phenomenon through which a species, taxon, or population of exotic (as opposed to native) origin integrates into a given ecosystem, becoming capable of reproducing and growing in it, and proceeds to disseminate spontaneously. In some instances, the presence of a spe...
https://en.wikipedia.org/wiki/Broadcast%20encryption
Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such a way that only qualified users (e.g. subscribers who have paid their fees or DVD players conforming to a specification) can decrypt the content. The challenge arises fro...
https://en.wikipedia.org/wiki/IEC%2060228
IEC 60228 is the International Electrotechnical Commission (IEC)'s international standard on conductors of insulated cables. the current version is Third Edition 2004-11 Among other things, it defines a set of standard wire cross-sectional areas: In engineering applications, it is often most convenient to describe a ...
https://en.wikipedia.org/wiki/Court-bouillon
Court-bouillon or court bouillon (in Louisiana, pronounced coo-bee-yon) is a quickly-cooked broth used for poaching other foods, most commonly fish or seafood. It is also sometimes used for poaching vegetables, eggs, sweetbreads, cockscombs, and delicate meats. It includes seasonings and salt but lacks animal gelatin. ...
https://en.wikipedia.org/wiki/IBM%20Planning%20Analytics
IBM Planning Analytics powered by TM1 (formerly IBM Cognos TM1, formerly Applix TM1, formerly Sinper TM/1) is a business performance management software suite designed to implement collaborative planning, budgeting and forecasting solutions, interactive "what-if" analyses, as well as analytical and reporting applicatio...
https://en.wikipedia.org/wiki/History%20of%20thermodynamics
The history of thermodynamics is a fundamental strand in, the history of physics, the history of chemistry, and the history of science in general. Owing in the relevance of thermodynamics in much of science and technology, its history is finely woven with the developments of classical mechanics, quantum mechanics, magn...
https://en.wikipedia.org/wiki/Genealogical%20DNA%20test
A genealogical DNA test is a DNA-based genetic test used in genetic genealogy that looks at specific locations of a person's genome in order to find or verify ancestral genealogical relationships, or (with lower reliability) to estimate the ethnic mixture of an individual. Since different testing companies use differen...
https://en.wikipedia.org/wiki/Advanced%20Telecommunications%20Computing%20Architecture
Advanced Telecommunications Computing Architecture (ATCA or AdvancedTCA) is the largest specification effort in the history of the PCI Industrial Computer Manufacturers Group (PICMG), with more than 100 companies participating. Known as AdvancedTCA, the official specification designation PICMG 3.x (see below) was ratif...
https://en.wikipedia.org/wiki/Infrared%20multiphoton%20dissociation
Infrared multiple photon dissociation (IRMPD) is a technique used in mass spectrometry to fragment molecules in the gas phase usually for structural analysis of the original (parent) molecule. How it works An infrared laser is directed through a window into the vacuum of the mass spectrometer where the ions are. The ...
https://en.wikipedia.org/wiki/Stepper
A stepper is a device used in the manufacture of integrated circuits (ICs) that is similar in operation to a slide projector or a photographic enlarger. Stepper is short for step-and-repeat camera. Steppers are an essential part of the complex process, called photolithography, which creates millions of microscopic circ...
https://en.wikipedia.org/wiki/Conditioned%20taste%20aversion
Conditioned taste aversion occurs when an animal acquires an aversion to the taste of a food that was paired with aversive stimuli. The Garcia effect explains that the aversion develops more strongly for stimuli that cause nausea than other stimuli. This is considered an adaptive trait or survival mechanism that enable...
https://en.wikipedia.org/wiki/Clay%20Shirky
Clay Shirky (born 1964) is an American writer, consultant and teacher on the social and economic effects of Internet technologies and journalism. In 2017 he was appointed Vice Provost of Educational Technologies of New York University (NYU), after serving as Chief Information Officer at NYU Shanghai from 2014 to 2017....
https://en.wikipedia.org/wiki/Cell%20therapy
Cell therapy (also called cellular therapy, cell transplantation, or cytotherapy) is a therapy in which viable cells are injected, grafted or implanted into a patient in order to effectuate a medicinal effect, for example, by transplanting T-cells capable of fighting cancer cells via cell-mediated immunity in the cours...
https://en.wikipedia.org/wiki/Encryption%20software
Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet. Classification There are many software products which prov...
https://en.wikipedia.org/wiki/Bruch%27s%20membrane
Bruch's membrane or lamina vitrea is the innermost layer of the choroid of the eye. It is also called the vitreous lamina or Membrane vitriae, because of its glassy microscopic appearance. It is 2–4 μm thick. Anatomy Structure Bruch's membrane consists of five layers (from inside to outside): the basement membrane o...
https://en.wikipedia.org/wiki/Surface%20metrology
Surface metrology is the measurement of small-scale features on surfaces, and is a branch of metrology. Surface primary form, surface fractality, and surface finish (including surface roughness) are the parameters most commonly associated with the field. It is important to many disciplines and is mostly known for the m...
https://en.wikipedia.org/wiki/Conway%27s%20law
Conway's law is an adage linking the communication structure of organizations to the systems they design. It is named after the computer programmer Melvin Conway, who introduced the idea in 1967. His original wording was: The law is based on the reasoning that in order for a product to function, the authors and design...
https://en.wikipedia.org/wiki/SLAM%20project
The SLAM project, which was started in 1999 by Thomas Ball and Sriram Rajamani of Microsoft Research, aimed at verifying software safety properties using model checking techniques. It was implemented in OCaml, and has been used to find many bugs in Windows Device Drivers. It is distributed as part of the Microsoft Wind...
https://en.wikipedia.org/wiki/VAXstation
The VAXstation is a discontinued family of workstation computers developed and manufactured by Digital Equipment Corporation using processors implementing the VAX instruction set architecture. VAXstation systems were typically shipped with either the OpenVMS or ULTRIX operating systems. Many members of the VAXstation f...
https://en.wikipedia.org/wiki/Real-Time%20Multiprogramming%20Operating%20System
Real-Time Multiprogramming Operating System (RTMOS) was a 24-bit process control operating system developed in the 1960s by General Electric that supported both real-time computing and multiprogramming. Programming was done in assembly language or Process FORTRAN. The two languages could be used in the same program, a...
https://en.wikipedia.org/wiki/Interrupt%20storm
In operating systems, an interrupt storm is an event during which a processor receives an inordinate number of interrupts that consume the majority of the processor's time. Interrupt storms are typically caused by hardware devices that do not support interrupt rate limiting. Background Because interrupt processing is ...
https://en.wikipedia.org/wiki/List%20of%20types%20of%20XML%20schemas
This is a list of notable XML schemas in use on the Internet sorted by purpose. XML schemas can be used to create XML documents for a wide range of purposes such as syndication, general exchange, and storage of data in a standard format. Bookmarks XBEL - XML Bookmark Exchange Language Brewing BeerXML - a free XML ...
https://en.wikipedia.org/wiki/ESTREAM
eSTREAM is a project to "identify new stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to the NESSIE project. The call for primitives was first issued in November 2004. The project was completed in April 2...
https://en.wikipedia.org/wiki/Mathematical%20joke
A mathematical joke is a form of humor which relies on aspects of mathematics or a stereotype of mathematicians. The humor may come from a pun, or from a double meaning of a mathematical term, or from a lay person's misunderstanding of a mathematical concept. Mathematician and author John Allen Paulos in his book Mathe...
https://en.wikipedia.org/wiki/Active%20shape%20model
Active shape models (ASMs) are statistical models of the shape of objects which iteratively deform to fit to an example of the object in a new image, developed by Tim Cootes and Chris Taylor in 1995. The shapes are constrained by the PDM (point distribution model) Statistical Shape Model to vary only in ways seen in a ...
https://en.wikipedia.org/wiki/White%20box%20%28software%20engineering%29
A white box (or glass box, clear box, or open box) is a subsystem whose internals can be viewed but usually not altered. The term is used in systems engineering, software engineering, and in intelligent user interface design, where it is closely related to recent interest in explainable artificial intelligence. Havin...
https://en.wikipedia.org/wiki/White%20box%20%28computer%20hardware%29
In computer hardware, a white box is a personal computer or server without a well-known brand name. The term is usually applied to systems assembled by small system integrators and to homebuilt computer systems assembled by end users from parts purchased separately at retail. In this sense, building a white box system...
https://en.wikipedia.org/wiki/Crystal%20earpiece
A crystal earpiece is a type of piezoelectric earphone, producing sound by using a piezoelectric crystal, a material that changes its shape when electricity is applied to it. It is usually designed to plug into the ear canal of the user. Operation A crystal earpiece typically consists of a piezoelectric crystal with ...
https://en.wikipedia.org/wiki/Concrete%20security
In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. It quantifies the security of a cryptosystem by bounding the probability of success for an adversa...
https://en.wikipedia.org/wiki/Negative%20thermal%20expansion
Negative thermal expansion (NTE) is an unusual physicochemical process in which some materials contract upon heating, rather than expand as most other materials do. The most well-known material with NTE is water at 0 to 3.98 °C. Also, the density of water ice is smaller than the density of liquid water. Water's NTE is ...
https://en.wikipedia.org/wiki/Magic%20angle
The magic angle is a precisely defined angle, the value of which is approximately 54.7356°. The magic angle is a root of a second-order Legendre polynomial, , and so any interaction which depends on this second-order Legendre polynomial vanishes at the magic angle. This property makes the magic angle of particular imp...
https://en.wikipedia.org/wiki/Research%20Institute%20of%20Computer%20Science%20and%20Random%20Systems
The Institut de recherche en informatique et systèmes aléatoires is a joint computer science research center of CNRS, University of Rennes 1, ENS Rennes, INSA Rennes and Inria, in Rennes in Brittany. It is one of the eight Inria research centers. Created in 1975 as a spin-off of the University of Rennes 1, merging the...
https://en.wikipedia.org/wiki/El%20Bulli
El Bulli () was a restaurant near the town of Roses, Spain, run by chef Ferran Adrià, later joined by Albert Adrià, and renowned for its modernist cuisine. Established in 1964, the restaurant overlooked Cala Montjoi, a bay on the Costa Brava of Catalonia. El Bulli held three Michelin stars and was described as "the mos...
https://en.wikipedia.org/wiki/Windows%20Vista
Windows Vista is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on November 8, 2006, and became generally available on January 30, 2007, on the Windows Marketplace, the first release of Windows to be made available through a digital distribution platform. Vista succeeded Wi...
https://en.wikipedia.org/wiki/179%20%28number%29
179 (one hundred [and] seventy-nine) is the natural number following 178 and preceding 180. In mathematics 179 is part of the Cunningham chain of prime numbers 89, 179, 359, 719, 1439, 2879, in which each successive number is two times the previous number, plus one. Among Cunningham chains of this length, this one has...
https://en.wikipedia.org/wiki/181%20%28number%29
181 (one hundred [and] eighty-one) is the natural number following 180 and preceding 182. In mathematics 181 is an odd number 181 is a centered number 181 is a centered pentagonal number 181 is a centered 12-gonal number 181 is a centered 18-gonal number 181 is a centered 30-gonal number 181 is a centered squar...
https://en.wikipedia.org/wiki/191%20%28number%29
191 (one hundred [and] ninety-one) is the natural number following 190 and preceding 192. In mathematics 191 is a prime number, part of a prime quadruplet of four primes: 191, 193, 197, and 199. Because doubling and adding one produces another prime number (383), 191 is a Sophie Germain prime. It is the smallest prime...
https://en.wikipedia.org/wiki/193%20%28number%29
193 (one hundred [and] ninety-three) is the natural number following 192 and preceding 194. In mathematics 193 is the number of compositions of 14 into distinct parts. In decimal, it is the seventeenth full repetend prime, or long prime. It is the only odd prime known for which 2 is not a primitive root of . It...
https://en.wikipedia.org/wiki/Security%20parameter
In cryptography, a security parameter is a way of measuring of how "hard" it is for an adversary to break a cryptographic scheme. There are two main types of security parameter: computational and statistical, often denoted by and , respectively. Roughly speaking, the computational security parameter is a measure for...
https://en.wikipedia.org/wiki/197%20%28number%29
197 (one hundred [and] ninety-seven) is the natural number following 196 and preceding 198. In mathematics 197 is a prime number, the third of a prime quadruplet: 191, 193, 197, 199 197 is the smallest prime number that is the sum of 7 consecutive primes: 17 + 19 + 23 + 29 + 31 + 37 + 41, and is the sum of the first...
https://en.wikipedia.org/wiki/199%20%28number%29
199 (one hundred [and] ninety-nine) is the natural number following 198 and preceding 200. In mathematics 199 is a centered triangular number. It is a prime number and the fourth part of a prime quadruplet: 191, 193, 197, 199. 199 is the smallest natural number that takes more than two iterations to compute its digi...
https://en.wikipedia.org/wiki/Interface%20Message%20Processor
The Interface Message Processor (IMP) was the packet switching node used to interconnect participant networks to the ARPANET from the late 1960s to 1989. It was the first generation of gateways, which are known today as routers. An IMP was a ruggedized Honeywell DDP-516 minicomputer with special-purpose interfaces and...
https://en.wikipedia.org/wiki/Francis%20Heylighen
Francis Paul Heylighen (born 27 September 1960) is a Belgian cyberneticist investigating the emergence and evolution of intelligent organization. He presently works as a research professor at the Vrije Universiteit Brussel (the Dutch-speaking Free University of Brussels), where he directs the transdisciplinary "Center ...
https://en.wikipedia.org/wiki/Common%20iliac%20vein
In human anatomy, the common iliac veins are formed by the external iliac veins and internal iliac veins. The left and right common iliac veins come together in the abdomen at the level of the fifth lumbar vertebra, forming the inferior vena cava. They drain blood from the pelvis and lower limbs. Both common iliac ve...
https://en.wikipedia.org/wiki/Genetically%20modified%20crops
Genetically modified crops (GM crops) are plants used in agriculture, the DNA of which has been modified using genetic engineering methods. Plant genomes can be engineered by physical methods or by use of Agrobacterium for the delivery of sequences hosted in T-DNA binary vectors. In most cases, the aim is to introduce ...
https://en.wikipedia.org/wiki/Predictive%20learning
Predictive learning is a technique of machine learning in which an agent tries to build a model of its environment by trying out different actions in various circumstances. It uses knowledge of the effects its actions appear to have, turning them into planning operators. These allow the agent to act purposefully in its...
https://en.wikipedia.org/wiki/Global%20dimension
In ring theory and homological algebra, the global dimension (or global homological dimension; sometimes just called homological dimension) of a ring A denoted gl dim A, is a non-negative integer or infinity which is a homological invariant of the ring. It is defined to be the supremum of the set of projective dimensio...
https://en.wikipedia.org/wiki/Principal%20variation%20search
Principal variation search (sometimes equated with the practically identical NegaScout) is a negamax algorithm that can be faster than alpha–beta pruning. Like alpha–beta pruning, NegaScout is a directional search algorithm for computing the minimax value of a node in a tree. It dominates alpha–beta pruning in the sens...
https://en.wikipedia.org/wiki/Square%20principle
In mathematical set theory, a square principle is a combinatorial principle asserting the existence of a cohering sequence of short closed unbounded (club) sets so that no one (long) club set coheres with them all. As such they may be viewed as a kind of incompactness phenomenon. They were introduced by Ronald Jense...
https://en.wikipedia.org/wiki/ACARS
In aviation, ACARS (; an acronym for Aircraft Communications Addressing and Reporting System) is a digital datalink system for transmission of short messages between aircraft and ground stations via airband radio or satellite. The protocol was designed by ARINC and deployed in 1978, using the Telex format. More ACARS r...
https://en.wikipedia.org/wiki/Sequence%20transformation
In mathematics, a sequence transformation is an operator acting on a given space of sequences (a sequence space). Sequence transformations include linear mappings such as convolution with another sequence, and resummation of a sequence and, more generally, are commonly used for series acceleration, that is, for improvi...
https://en.wikipedia.org/wiki/211%20%28number%29
211 (two hundred [and] eleven) is the natural number following 210 and preceding 212. It is also a prime number. In mathematics 211 is an odd number. 211 is a primorial prime, the sum of three consecutive primes (), a Chen prime, a centered decagonal prime, and a self prime. 211 is the smallest prime separated by ei...
https://en.wikipedia.org/wiki/Pseudoholomorphic%20curve
In mathematics, specifically in topology and geometry, a pseudoholomorphic curve (or J-holomorphic curve) is a smooth map from a Riemann surface into an almost complex manifold that satisfies the Cauchy–Riemann equation. Introduced in 1985 by Mikhail Gromov, pseudoholomorphic curves have since revolutionized the study ...