source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/L%C3%A1szl%C3%B3%20Fejes%20T%C3%B3th | László Fejes Tóth (, 12 March 1915 – 17 March 2005) was a Hungarian mathematician who specialized in geometry. He proved that a lattice pattern is the most efficient way to pack centrally symmetric convex sets on the Euclidean plane (a generalization of Thue's theorem, a 2-dimensional analog of the Kepler conjecture).... |
https://en.wikipedia.org/wiki/Artin%20approximation%20theorem | In mathematics, the Artin approximation theorem is a fundamental result of in deformation theory which implies that formal power series with coefficients in a field k are well-approximated by the algebraic functions on k.
More precisely, Artin proved two such theorems: one, in 1968, on approximation of complex analyt... |
https://en.wikipedia.org/wiki/Scott%20Swedorski | Scott Swedorski is the founder of Tucows (The Ultimate Collection of Winsock Software), a large Internet domain name reseller, and Internet service provider.
History
Scott served in the military and then received an associate degree from Mott Community College in Flint.
In 1993 he worked for the Flint Area Library O... |
https://en.wikipedia.org/wiki/DOS%20XL | DOS XL is a discontinued Disk Operating System (DOS) written by Paul Laughton, Mark Rose, Bill Wilkinson, and Mike Peters and published by Optimized Systems Software (OSS) for the Atari 8-bit family of home computers. It was designed to be compatible with Atari DOS which came shipped with Atari, Inc.'s disk drives, whi... |
https://en.wikipedia.org/wiki/Glossary%20of%20category%20theory | This is a glossary of properties and concepts in category theory in mathematics. (see also Outline of category theory.)
Notes on foundations: In many expositions (e.g., Vistoli), the set-theoretic issues are ignored; this means, for instance, that one does not distinguish between small and large categories and that on... |
https://en.wikipedia.org/wiki/AdBrite | AdBrite, Inc. was an online ad exchange, based in San Francisco, California, which was founded by Philip J. Kaplan and Gidon Wise in 2002. Founded as Marketbanker.com, the site was relaunched as AdBrite in 2004 as an advertising network and then in 2008 as an ad exchange.
AdBrite remained an independent ad exchange, r... |
https://en.wikipedia.org/wiki/Dogic | The Dogic () is an icosahedron-shaped puzzle like the Rubik's Cube. The 5 triangles meeting at its tips may be rotated, or 5 entire faces (including the triangles) around the tip may be rotated. It has a total of 80 movable pieces to rearrange, compared to the 20 pieces in the Rubik's Cube.
History
The Dogic was pat... |
https://en.wikipedia.org/wiki/Entomophily | Entomophily or insect pollination is a form of pollination whereby pollen of plants, especially but not only of flowering plants, is distributed by insects. Flowers pollinated by insects typically advertise themselves with bright colours, sometimes with conspicuous patterns (honey guides) leading to rewards of pollen ... |
https://en.wikipedia.org/wiki/Seabird%20Colony%20Register | The Seabird Colony Register (SCR) is a database, managed by the British Joint Nature Conservation Committee, which contains counts of breeding seabirds at British seabird colonies made between 1969 and 1998, which is used for analysing past changes in breeding seabird numbers and changes in their colony size in Britain... |
https://en.wikipedia.org/wiki/IOPS | Input/output operations per second (IOPS, pronounced eye-ops) is an input/output performance measurement used to characterize computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area networks (SAN). Like benchmarks, IOPS numbers published by storage device manufacturers do not di... |
https://en.wikipedia.org/wiki/XML%20Interface%20for%20Network%20Services | XML Interface for Network Services (XINS) is an open-source technology for definition and implementation of internet applications, which enforces a specification-oriented approach.
Specification-oriented approach
The specification-oriented approach is at the heart of XINS:
first specifications need to be written;
th... |
https://en.wikipedia.org/wiki/Audio%20tape%20specifications | Since the widespread adoption of reel-to-reel audio tape recording in the 1950s, audio tapes and tape cassettes have been available in many formats. This article describes the length, tape thickness and playing times of some of the most common ones.
All tape thicknesses here refer to the total tape thickness unless ot... |
https://en.wikipedia.org/wiki/Blum%20axioms | In computational complexity theory the Blum axioms or Blum complexity axioms are axioms that specify desirable properties of complexity measures on the set of computable functions. The axioms were first defined by Manuel Blum in 1967.
Importantly, Blum's speedup theorem and the Gap theorem hold for any complexity mea... |
https://en.wikipedia.org/wiki/Skewb%20Diamond | The Skewb Diamond is an octahedron-shaped combination puzzle similar to the Rubik's Cube. It has 14 movable pieces which can be rearranged in a total of 138,240 possible combinations. This puzzle is the dual polyhedron of the Skewb. It was invented by Uwe Mèffert, a German puzzle inventor and designer.
Description
Th... |
https://en.wikipedia.org/wiki/Marquee%20%28structure%29 | A marquee is most commonly a structure placed over the entrance to a hotel, theatre, casino, train station, or similar building. It often has signage stating either the name of the establishment or, in the case of theatres, the play or movie and the artist(s) appearing at that venue. The marquee is sometimes identifiab... |
https://en.wikipedia.org/wiki/Yang%E2%80%93Mills%20existence%20and%20mass%20gap | The Yang–Mills existence and mass gap problem is an unsolved problem in mathematical physics and mathematics, and one of the seven Millennium Prize Problems defined by the Clay Mathematics Institute, which has offered a prize of US$1,000,000 for its solution.
The problem is phrased as follows:
Yang–Mills Existence a... |
https://en.wikipedia.org/wiki/Algebraic%20space | In mathematics, algebraic spaces form a generalization of the schemes of algebraic geometry, introduced by Michael Artin for use in deformation theory. Intuitively,
schemes are given by gluing together affine schemes using the Zariski topology, while algebraic spaces are given by gluing together affine schemes using t... |
https://en.wikipedia.org/wiki/Mex%20%28mathematics%29 | In mathematics, the mex ("minimum excluded value") of a subset of a well-ordered set is the smallest value from the whole set that does not belong to the subset. That is, it is the minimum value of the complement set.
Beyond sets, subclasses of well-ordered classes have minimum excluded values. Minimum excluded value... |
https://en.wikipedia.org/wiki/Synovial%20osteochondromatosis | Synovial osteochondromatosis (SOC) (synonyms include synovial chondromatosis, primary synovial chondromatosis, synovial chondrometaplasia) is a rare disease that creates a benign change or proliferation in the synovium or joint-lining tissue, which changes to form bone-forming cartilage. In most occurrences, there is ... |
https://en.wikipedia.org/wiki/Shared%20Whois%20Project | The Shared Whois Project (SWIP) is the process used to submit, maintain and update information to ensure up-to-date and efficient maintenance of WHOIS records, as structured in RFC 1491. The process updates WHOIS to contain information regarding what organization is using a specific IP address, or a specific block of a... |
https://en.wikipedia.org/wiki/STONITH | STONITH ("Shoot The Other Node In The Head" or "Shoot The Offending Node In The Head"), sometimes called STOMITH ("Shoot The Other Member/Machine In The Head"), is a technique for fencing in computer clusters.
Fencing is the isolation of a failed node so that it does not cause disruption to a computer cluster. As its ... |
https://en.wikipedia.org/wiki/OpenBSM | OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) Audit API and file format. BSM, which is a system used for auditing, describes a set of system call and library interfaces for managing audit records as well as a token stream file format that permits extensible and generalized audit trail pr... |
https://en.wikipedia.org/wiki/Puzz%203D | Puzz 3D is the brand name of three-dimensional jigsaw puzzles, manufactured by Hasbro and formerly by Wrebbit, Inc. Unlike traditional puzzles which are composed of series of flat pieces that when put together, create a single unified image, the Puzz 3D series of puzzles are composed on plastic foam, with part of an im... |
https://en.wikipedia.org/wiki/Noddy%20%28camera%29 | Noddy was a camera system used for generating idents for the BBC One and BBC Two television channels from late 1963 to February 1985.
The Noddy video camera was controlled by a servomotor to pan and tilt (or 'nod', hence the name Noddy) across a set of pre-arranged physical objects; captions and mechanical models. The... |
https://en.wikipedia.org/wiki/Linux%20adoption | Linux adoption is the adoption of Linux computer operating systems (OS) by households, nonprofit organizations, businesses, and governments.
Many factors have resulted in the expanded use of Linux systems by traditional desktop users as well as operators of server systems, including the desire to minimize software cos... |
https://en.wikipedia.org/wiki/Karush%E2%80%93Kuhn%E2%80%93Tucker%20conditions | In mathematical optimization, the Karush–Kuhn–Tucker (KKT) conditions, also known as the Kuhn–Tucker conditions, are first derivative tests (sometimes called first-order necessary conditions) for a solution in nonlinear programming to be optimal, provided that some regularity conditions are satisfied.
Allowing inequal... |
https://en.wikipedia.org/wiki/Tiling%20puzzle | Tiling puzzles are puzzles involving two-dimensional packing problems in which a number of flat shapes have to be assembled into a larger given shape without overlaps (and often without gaps). Some tiling puzzles ask you to dissect a given shape first and then rearrange the pieces into another shape. Other tiling puz... |
https://en.wikipedia.org/wiki/Sliding%20puzzle | A sliding puzzle, sliding block puzzle, or sliding tile puzzle is a combination puzzle that challenges a player to slide (frequently flat) pieces along certain routes (usually on a board) to establish a certain end-configuration. The pieces to be moved may consist of simple shapes, or they may be imprinted with colour... |
https://en.wikipedia.org/wiki/Puzzle%20lock | A puzzle lock or puzzle padlock is a type of mechanical puzzle. It consists of a lock with unusual or hidden mechanics. Puzzle locks are reconfigurable mechanisms where the topological structure changes during the operation. Such locks are sometimes called trick locks, because there is a trick to opening them which n... |
https://en.wikipedia.org/wiki/Digital%20cassettes | Digital audio cassette formats introduced to the professional audio and consumer markets:
Digital Audio Tape (or DAT) is the most well-known, and had some success as an audio storage format among professionals and "prosumers" before the prices of hard drive and solid-state flash memory-based digital recording devices ... |
https://en.wikipedia.org/wiki/Univariate | In mathematics, a univariate object is an expression, equation, function or polynomial involving only one variable. Objects involving more than one variable are multivariate. In some cases the distinction between the univariate and multivariate cases is fundamental; for example, the fundamental theorem of algebra and E... |
https://en.wikipedia.org/wiki/Lean%20government | Lean government refers to the application of Lean Manufacturing (also known as "Lean") principles and methods to both identify and then implement the most efficient, value added way to provide government services. Government agencies have found that when Lean is implemented, they see an improved understanding of how th... |
https://en.wikipedia.org/wiki/Numbering%20%28computability%20theory%29 | In computability theory a numbering is the assignment of natural numbers to a set of objects such as functions, rational numbers, graphs, or words in some formal language. A numbering can be used to transfer the idea of computability and related concepts, which are originally defined on the natural numbers using comput... |
https://en.wikipedia.org/wiki/Second-order%20cellular%20automaton | A second-order cellular automaton is a type of reversible cellular automaton (CA) invented by Edward Fredkin where the state of a cell at time depends not only on its neighborhood at time , but also on its state at time .
General technique
In general, the evolution rule for a second-order automaton may be described a... |
https://en.wikipedia.org/wiki/Block%20cellular%20automaton | A block cellular automaton or partitioning cellular automaton is a special kind of cellular automaton in which the lattice of cells is divided into non-overlapping blocks (with different partitions at different time steps) and the transition rule is applied to a whole block at a time rather than a single cell. Block ce... |
https://en.wikipedia.org/wiki/Comparison%20of%20time-tracking%20software | This is a comparison of notable time-tracking software packages and web hosted services.
See also
Deployment management
Flextime plan
Project management software
Timesheet
Working time
References
Administrative software
Lists of software
Software comparisons |
https://en.wikipedia.org/wiki/Gunfright | Gunfright is an action-adventure game developed by Ultimate Play the Game and published by U.S. Gold. It was first released for the ZX Spectrum in December 1985, then released for Amstrad CPC and the MSX the following year. The player takes the role of a sheriff in the town of Black Rock and is tasked with eliminating ... |
https://en.wikipedia.org/wiki/Core%20Data | Core Data is an object graph and persistence framework provided by Apple in the macOS and iOS operating systems. It was introduced in Mac OS X 10.4 Tiger and iOS with iPhone SDK 3.0. It allows data organized by the relational entity–attribute model to be serialized into XML, binary, or SQLite stores. The data can be ma... |
https://en.wikipedia.org/wiki/Minibar | A minibar is a small refrigerator, typically an absorption refrigerator, in a hotel room or cruise ship stateroom. The hotel staff fill it with drinks and snacks for the guest to purchase during their stay. It is stocked with a precise inventory of goods, with a price list. The guest is charged for goods consumed when ... |
https://en.wikipedia.org/wiki/Kibu.com | Kibu.com was an American website for teenage girls that was created in 1999 and launched in 2000. The website was founded as an online community for girls to discuss and exchange advice.
Kibu.com secured a US$22 million investment from high-profile figures in the tech industry, including Jim Clark. However, following ... |
https://en.wikipedia.org/wiki/Angle%20bisector%20theorem | In geometry, the angle bisector theorem is concerned with the relative lengths of the two segments that a triangle's side is divided into by a line that bisects the opposite angle. It equates their relative lengths to the relative lengths of the other two sides of the triangle.
Theorem
Consider a triangle . Let the an... |
https://en.wikipedia.org/wiki/Static%20build | A static build is a compiled version of a program which has been statically linked against libraries.
Linking
In computer science, linking means taking one or more objects generated by compilers and assembling them into a single executable program. The objects are program modules containing machine code and symbol def... |
https://en.wikipedia.org/wiki/Algal%20mat | Algal mats are one of many types of microbial mat that forms on the surface of water or rocks. They are typically composed of blue-green cyanobacteria and sediments. Formation occurs when alternating layers of blue-green bacteria and sediments are deposited or grow in place, creating dark-laminated layers. Stromatolite... |
https://en.wikipedia.org/wiki/Lanczos%20tensor | The Lanczos tensor or Lanczos potential is a rank 3 tensor in general relativity that generates the Weyl tensor. It was first introduced by Cornelius Lanczos in 1949. The theoretical importance of the Lanczos tensor is that it serves as the gauge field for the gravitational field in the same way that, by analogy, the... |
https://en.wikipedia.org/wiki/Rainbow%20table | A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such a database of hashed passwords falls into the hands of an attacker, they can use a precomputed rainbow... |
https://en.wikipedia.org/wiki/Strained%20silicon%20directly%20on%20insulator | Strained silicon directly on insulator (SSDOI) is a procedure developed by IBM which removes the silicon germanium layer in the strained silicon process leaving the strained silicon directly on the insulator. In contrast, strained silicon on SGOI provides a strained silicon layer on a relaxed silicon germanium layer o... |
https://en.wikipedia.org/wiki/Virtual%20assistant%20%28occupation%29 | A virtual assistant (typically abbreviated to VA, also called a virtual office assistant) is generally self-employed and provides professional administrative, technical, or creative (social) assistance to clients remotely from a home office. Because virtual assistants are independent contractors rather than employees, ... |
https://en.wikipedia.org/wiki/Poincar%C3%A9%20recurrence%20theorem | In mathematics and physics, the Poincaré recurrence theorem states that certain dynamical systems will, after a sufficiently long but finite time, return to a state arbitrarily close to (for continuous state systems), or exactly the same as (for discrete state systems), their initial state.
The Poincaré recurrence tim... |
https://en.wikipedia.org/wiki/Voltage%20reference | A voltage reference is an electronic device that ideally produces a fixed (constant) voltage irrespective of the loading on the device, power supply variations, temperature changes, and the passage of time. Voltage references are used in power supplies, analog-to-digital converters, digital-to-analog converters, and ot... |
https://en.wikipedia.org/wiki/Immunopathology | Immunopathology is a branch of medicine that deals with immune responses associated with disease. It includes the study of the pathology of an organism, organ system, or disease with respect to the immune system, immunity, and immune responses. In biology, it refers to damage caused to an organism by its own immune re... |
https://en.wikipedia.org/wiki/Portable%20character%20set | Portable Character Set is a set of 103 characters which, according to the POSIX standard, must be present in any character set. Compared to ASCII, the Portable Character Set lacks some control characters, and does not prescribe any particular value encoding.
The Portable Character Set is a superset of the Basic Executi... |
https://en.wikipedia.org/wiki/Email%20privacy | Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user... |
https://en.wikipedia.org/wiki/Comparison%20of%20accounting%20software | The following comparison of accounting software documents the various features and differences between different professional accounting software, personal and small enterprise software, medium-sized and large-sized enterprise software, and other accounting packages. The comparison only focus considering financial and ... |
https://en.wikipedia.org/wiki/Data%20buffer | In computer science, a data buffer (or just buffer) is a region of a memory used to store data temporarily while it is being moved from one place to another. Typically, the data is stored in a buffer as it is retrieved from an input device (such as a microphone) or just before it is sent to an output device (such as sp... |
https://en.wikipedia.org/wiki/Adelphogamy | Adelphogamy is a form of sexual partnership between sibling eukaryotes, especially in some species of fungi, flowering plants or ants, or in humans. In flowering plants, adelphogamy refers to sibling pollination: pollen and stigma belong to two individuals which derives from same mother plant.
In sociology, the term a... |
https://en.wikipedia.org/wiki/Embedded%20C%2B%2B | Embedded C++ (EC++) is a dialect of the C++ programming language for embedded systems. It was defined by an industry group led by major Japanese central processing unit (CPU) manufacturers, including NEC, Hitachi, Fujitsu, and Toshiba, to address the shortcomings of C++ for embedded applications. The goal of the effort... |
https://en.wikipedia.org/wiki/Dynamic%20imaging | Dynamic imaging is the amalgamation of digital imaging, image editing, and workflow automation. It is used to automate the creation of images by zooming, panning, colorize and performing other image processing and color management operations on a copy of a digital master.
Categories
Dynamic imaging technology falls in... |
https://en.wikipedia.org/wiki/Kaczmarz%20method | The Kaczmarz method or Kaczmarz's algorithm is an iterative algorithm for solving linear equation systems . It was first discovered by the Polish mathematician Stefan Kaczmarz, and was rediscovered in the field of image reconstruction from projections by Richard Gordon, Robert Bender, and Gabor Herman in 1970, where it... |
https://en.wikipedia.org/wiki/North%20%26%20South%20%28video%20game%29 | North & South is a strategy action game released in 1989 for the Amiga, and Atari ST and ported to the Nintendo Entertainment System, Amstrad CPC, MSX, MS-DOS, Commodore 64 and ZX Spectrum. It was developed and published by Infogrames.
North & South is an offshoot of the Belgian comic series Les Tuniques Bleues (by Ra... |
https://en.wikipedia.org/wiki/DesktopBSD | DesktopBSD is a Unix-derived, desktop-oriented operating system based on FreeBSD. Its goal was to combine the stability of FreeBSD with the ease-of-use of K Desktop Environment 3, which is the default graphical user interface.
History and development
DesktopBSD is essentially a customized installation of FreeBSD and ... |
https://en.wikipedia.org/wiki/Hydrolyzed%20vegetable%20protein | Hydrolyzed vegetable protein (HVP) products are foodstuffs obtained by protein hydrolysis and are used as ingredients to create a bouillon (broth) taste without the vegetables, bones, simmering, or other standard elements of creating bouillon from scratch.
Regarding the production process, a distinction can be made be... |
https://en.wikipedia.org/wiki/Sagittal%20plane | The sagittal plane (; also known as the longitudinal plane) is an anatomical plane that divides the body into right and left sections. It is perpendicular to the transverse and coronal planes. The plane may be in the center of the body and divide it into two equal parts (mid-sagittal), or away from the midline and divi... |
https://en.wikipedia.org/wiki/Calcium%20caseinate | Calcium caseinate is one of several milk proteins derived from casein in skim and 1% milk. Calcium caseinate has a papery, sweet and overall bland flavor, and is primarily used in meal preparation and fat breakdown. Caseinates are produced by adding an alkali to another derivative of casein, acid casein. The type of ca... |
https://en.wikipedia.org/wiki/Inter-Language%20Unification | Inter-Language Unification or ILU is a method for computer systems to exchange data, bridging differences in the way systems represent the various kinds of data. Even if two systems run on the same computer, or on identical computer hardware, many differences arise from the use of different computer languages to build... |
https://en.wikipedia.org/wiki/Commemorative%20plaque | A commemorative plaque, or simply plaque, or in other places referred to as a historical marker, historic marker, or historic plaque, is a plate of metal, ceramic, stone, wood, or other material, typically attached to a wall, stone, or other vertical surface, and bearing text or an image in relief, or both, to commemor... |
https://en.wikipedia.org/wiki/HoneyMonkey | HoneyMonkey, short for Strider HoneyMonkey Exploit Detection System, is a Microsoft Research honeypot. The implementation uses a network of computers to crawl the World Wide Web searching for websites that use browser exploits to install malware on the HoneyMonkey computer. A snapshot of the memory, executables and reg... |
https://en.wikipedia.org/wiki/Isolated%20system | In physical science, an isolated system is either of the following:
a physical system so far removed from other systems that it does not interact with them.
a thermodynamic system enclosed by rigid immovable walls through which neither mass nor energy can pass.
Though subject internally to its own gravity, an isolat... |
https://en.wikipedia.org/wiki/Heart%20symbol | The heart symbol is an ideograph used to express the idea of the "heart" in its metaphorical or symbolic sense. Represented by an anatomically inaccurate shape, the heart symbol is often used to represent the center of emotion, including affection and love, especially romantic love. It is sometimes accompanied or super... |
https://en.wikipedia.org/wiki/Monopole%20%28mathematics%29 | In mathematics, a monopole is a connection over a principal bundle G with a section of the associated adjoint bundle.
Physical interpretation
Physically, the section can be interpreted as a Higgs field, where the connection and Higgs field should satisfy the Bogomolny equations and be of finite action.
See also
N... |
https://en.wikipedia.org/wiki/Differential%20graded%20algebra | In mathematics, in particular in homological algebra, a differential graded algebra is a graded associative algebra with an added chain complex structure that respects the algebra structure.
Definition
A differential graded algebra (or DG-algebra for short) A is a graded algebra equipped with a map which has eithe... |
https://en.wikipedia.org/wiki/Point%20of%20interface | In telecommunications a point of interface (POI) is used to show the physical interface between two different carriers, such as a local exchange carrier (LEC) and a wireless carrier, or an LEC and an IntereXchange Carrier (IXC). This demarcation point often defines responsibility as well as serving as a point for testi... |
https://en.wikipedia.org/wiki/Sound%20recording%20and%20reproduction | Sound recording and reproduction is the electrical, mechanical, electronic, or digital inscription and re-creation of sound waves, such as spoken voice, singing, instrumental music, or sound effects. The two main classes of sound recording technology are analog recording and digital recording.
Acoustic analog recordin... |
https://en.wikipedia.org/wiki/RSA%20Secret-Key%20Challenge | The RSA Secret-Key Challenge was a series of cryptographic contests organised by RSA Laboratories with the intent of helping to demonstrate the relative security of different encryption algorithms. The challenge ran from 28 January 1997 until May 2007.
Contest details
For each contest, RSA had posted on its website a... |
https://en.wikipedia.org/wiki/Self-documenting%20code | In computer programming, self-documenting (or self-describing) source code and user interfaces follow naming conventions and structured programming conventions that enable use of the system without prior specific knowledge. In web development, self-documenting refers to a website that exposes the entire process of its ... |
https://en.wikipedia.org/wiki/All-or-nothing%20transform | In cryptography, an all-or-nothing transform (AONT), also known as an all-or-nothing protocol, is an encryption mode which allows the data to be understood only if all of it is known. AONTs are not encryption, but frequently make use of symmetric ciphers and may be applied before encryption. In exact terms, "an AONT is... |
https://en.wikipedia.org/wiki/Salesforce | Salesforce, Inc. is an American cloud-based software company headquartered in San Francisco, California. It provides customer relationship management (CRM) software and applications focused on sales, customer service, marketing automation, e-commerce, analytics, and application development.
Founded by former Oracle ex... |
https://en.wikipedia.org/wiki/Mobile%20malware | Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become i... |
https://en.wikipedia.org/wiki/Auto-defrost | Auto-defrost, automatic defrost or self-defrosting is a technique which regularly defrosts the evaporator in a refrigerator or freezer. Appliances using this technique are often called frost free, frostless, or no-frost.
Mechanism
The defrost mechanism in a refrigerator heats the cooling element (evaporator coil) fo... |
https://en.wikipedia.org/wiki/Ice%20pack | An ice pack or gel pack is a portable bag filled with water, refrigerant gel, or liquid, meant to provide cooling. They can be divided into the reusable type, which works as a thermal mass and requires freezing, or the instant type, which cools itself down using chemicals but can only be used once. The instant type is ... |
https://en.wikipedia.org/wiki/Medoid | Medoids are representative objects of a data set or a cluster within a data set whose sum of dissimilarities to all the objects in the cluster is minimal. Medoids are similar in concept to means or centroids, but medoids are always restricted to be members of the data set. Medoids are most commonly used on data when a ... |
https://en.wikipedia.org/wiki/JAUS | Joint Architecture for Unmanned Systems (JAUS), formerly known as Joint Architecture for Unmanned Ground Systems (JAUGS), was originally an initiative started in 1998 by the United States Department of Defense to develop an open architecture for the domain of unmanned systems.
In order to ensure that the component arc... |
https://en.wikipedia.org/wiki/Admissible%20numbering | In computability theory, admissible numberings are enumerations (numberings) of the set of partial computable functions that can be converted to and from the standard numbering. These numberings are also called acceptable numberings and acceptable programming systems.
Rogers' equivalence theorem shows that all accepta... |
https://en.wikipedia.org/wiki/Coal%20pollution%20mitigation | Coal Pollution Mitigation, sometimes also known as Clean Coal, is a series of systems and technologies that seek to mitigate (reduce harmful or unpleasant chemicals) health and environmental impact of coal; in particular air pollution from coal-fired power stations, and from coal burnt by heavy industry. Clean Coal pri... |
https://en.wikipedia.org/wiki/Clone%20tool | The clone tool, as it is known in Adobe Photoshop, Inkscape, GIMP, and Corel PhotoPaint, is used in digital image editing to replace information for one part of a picture with information from another part. In other image editing software, its equivalent is sometimes called a rubber stamp tool or a clone brush.
Applic... |
https://en.wikipedia.org/wiki/Tetrameric%20protein | A tetrameric protein is a protein with a quaternary structure of four subunits (tetrameric). Homotetramers have four identical subunits (such as glutathione S-transferase), and heterotetramers are complexes of different subunits. A tetramer can be assembled as dimer of dimers with two homodimer subunits (such as sorbit... |
https://en.wikipedia.org/wiki/Redaction | Redaction or sanitization is the process of removing sensitive information from a document so that it may be distributed to a broader audience. It is intended to allow the selective disclosure of information. Typically, the result is a document that is suitable for publication or for dissemination to others rather than... |
https://en.wikipedia.org/wiki/Penultimate%20hop%20popping | Penultimate hop popping (PHP) is a function performed by certain routers in an MPLS enabled network. It refers to the process whereby the outermost label of an MPLS tagged packet is removed by a label switch router (LSR) before the packet is passed to an adjacent label edge router (LER). The benefit is that the LSR ha... |
https://en.wikipedia.org/wiki/Pathfinding | Pathfinding or pathing is the plotting, by a computer application, of the shortest route between two points. It is a more practical variant on solving mazes. This field of research is based heavily on Dijkstra's algorithm for finding the shortest path on a weighted graph.
Pathfinding is closely related to the shortest... |
https://en.wikipedia.org/wiki/Criticality%20matrix | In operations research and engineering, a criticality matrix is a representation (often graphical) of failure modes along with their probabilities and severities.
Example
For example, an aircraft might have the following matrix:
Industrial engineering |
https://en.wikipedia.org/wiki/Passive%20dynamics | Passive dynamics refers to the dynamical behavior of actuators, robots, or organisms when not drawing energy from a supply (e.g., batteries, fuel, ATP). Depending on the application, considering or altering the passive dynamics of a powered system can have drastic effects on performance, particularly energy economy, s... |
https://en.wikipedia.org/wiki/Euler%20diagram | An Euler diagram (, ) is a diagrammatic means of representing sets and their relationships. They are particularly useful for explaining complex hierarchies and overlapping definitions. They are similar to another set diagramming technique, Venn diagrams. Unlike Venn diagrams, which show all possible relations between... |
https://en.wikipedia.org/wiki/False%20nearest%20neighbor%20algorithm | Within abstract algebra, the false nearest neighbor algorithm is an algorithm for estimating the embedding dimension. The concept was proposed by Kennel et al. (1992). The main idea is to examine how the number of neighbors of a point along a signal trajectory change with increasing embedding dimension. In too low an... |
https://en.wikipedia.org/wiki/Potentiostat | A potentiostat is the electronic hardware required to control a three electrode cell and run most electroanalytical experiments. A Bipotentiostat and polypotentiostat are potentiostats capable of controlling two working electrodes and more than two working electrodes, respectively.
The system functions by maintaini... |
https://en.wikipedia.org/wiki/Immunoelectrophoresis | Immunoelectrophoresis is a general name for a number of biochemical methods for separation and characterization of proteins based on electrophoresis and reaction with antibodies. All variants of immunoelectrophoresis require immunoglobulins, also known as antibodies, reacting with the proteins to be separated or charac... |
https://en.wikipedia.org/wiki/Cell%20migration | Cell migration is a central process in the development and maintenance of multicellular organisms. Tissue formation during embryonic development, wound healing and immune responses all require the orchestrated movement of cells in particular directions to specific locations. Cells often migrate in response to specific ... |
https://en.wikipedia.org/wiki/TwoOStwo | twoOStwo was a commercial software product developed by Parallels Software Studio (prior to its acquisition by SWsoft). The workstation software consisted of a virtual machine suite for Intel x86-compatible computers which allowed the creation and execution of multiple x86 virtual computers simultaneously. Each virtual... |
https://en.wikipedia.org/wiki/Cockcroft%E2%80%93Walton%20generator | The Cockcroft–Walton (CW) generator, or multiplier, is an electric circuit that generates a high DC voltage from a low-voltage AC or pulsing DC input. It was named after the British and Irish physicists John Douglas Cockcroft and Ernest Thomas Sinton Walton, who in 1932 used this circuit design to power their particle... |
https://en.wikipedia.org/wiki/Windows%20Communication%20Foundation | The Windows Communication Foundation (WCF), previously known as Indigo, is a free and open-source runtime and a set of APIs in the .NET Framework for building connected, service-oriented applications.
.NET Core 1.0, released 2016, did not support WCF server side code. WCF support was added to the platform with support... |
https://en.wikipedia.org/wiki/SVISTA | SVISTA (Serenity Virtual Station) is a former commercial virtual machine software product marketed by Serenity Systems International. Windows, OS/2, Linux and FreeBSD hosted versions were available.
This product is no longer available nor supported.
Description
SVISTA was developed under contract with Parallels Softw... |
https://en.wikipedia.org/wiki/Box%20truss | A box truss is a structure composed of three or more chords connected by transverse and/or diagonal structural elements.
Application
Box trusses are commonly used in certain types of aircraft fuselages, electric power pylons, large radio antennas, and many bridge structures. (For various truss arrangements used see tr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.