source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/KXVO
KXVO (channel 15) is a television station in Omaha, Nebraska, United States, airing programming from the digital multicast network TBD. It is owned by Mitts Telecasting Company LLC, which maintains a local marketing agreement (LMA) with the Sinclair Broadcast Group, owner of dual Fox/CW affiliate KPTM (channel 42), for...
https://en.wikipedia.org/wiki/Subsolar%20point
The subsolar point on a planet is the point at which its Sun is perceived to be directly overhead (at the zenith); that is, where the Sun's rays strike the planet exactly perpendicular to its surface. It can also mean the point closest to the Sun on an astronomical object, even though the Sun might not be visible. T...
https://en.wikipedia.org/wiki/Safe%40Office
Safe@Office is a line of firewall and virtual private network (VPN) appliances developed by SofaWare Technologies, a Check Point company. The Check Point Safe@Office product line is targeted at the small and medium business segment, and includes the 500 and 500W (with Wi-Fi) series of internet security appliance. The ...
https://en.wikipedia.org/wiki/Theorem%20on%20friends%20and%20strangers
The theorem on friends and strangers is a mathematical theorem in an area of mathematics called Ramsey theory. Statement Suppose a party has six people. Consider any two of them. They might be meeting for the first time—in which case we will call them mutual strangers; or they might have met before—in which case we w...
https://en.wikipedia.org/wiki/Verifiable%20random%20function
In cryptography, a verifiable random function (VRF) is a public-key pseudorandom function that provides proofs that its outputs were calculated correctly. The owner of the secret key can compute the function value as well as an associated proof for any input value. Everyone else, using the proof and the associated publ...
https://en.wikipedia.org/wiki/ACPI
Advanced Configuration and Power Interface (ACPI) is an open standard that operating systems can use to discover and configure computer hardware components, to perform power management (e.g. putting unused hardware components to sleep), auto configuration (e.g. Plug and Play and hot swapping), and status monitoring. Fi...
https://en.wikipedia.org/wiki/Bouillon%20cube
A bouillon cube (Canada and US), stock cube (Australia, Ireland, New Zealand, South Africa and UK), or broth cube (Asia) is dehydrated broth or stock formed into a small cube or other cuboid shape. The most common format is a cube about wide. It is typically made from dehydrated vegetables or meat stock, a small port...
https://en.wikipedia.org/wiki/Variable-frequency%20transformer
A variable-frequency transformer (VFT) is used to transmit electricity between two (asynchronous or synchronous) alternating current frequency domains. The VFT is a relatively recent development. Most asynchronous grid inter-ties use high-voltage direct current converters, while synchronous grid inter-ties are connecte...
https://en.wikipedia.org/wiki/Preferred%20frame
In theoretical physics, a preferred frame or privileged frame is usually a special hypothetical frame of reference in which the laws of physics might appear to be identifiably different (simpler) from those in other frames. In theories that apply the principle of relativity to inertial motion, physics is the same in a...
https://en.wikipedia.org/wiki/Comparison%20of%20Unicode%20encodings
This article compares Unicode encodings. Two situations are considered: 8-bit-clean environments (which can be assumed), and environments that forbid use of byte values that have the high bit set. Originally such prohibitions were to allow for links that used only seven data bits, but they remain in some standards and ...
https://en.wikipedia.org/wiki/MP6
The Rise mP6 was a superpipelined and superscalar microprocessor designed by Rise Technology to compete with the Intel Pentium line. History Rise Technology had spent 5 years developing a x86 compatible microprocessor, and finally introduced it in November 1998 as a low-cost, low-power alternative for the Super Socket...
https://en.wikipedia.org/wiki/List%20of%20Puerto%20Rico%20state%20forests
Puerto Rico state forests (Spanish: Bosques estatales de Puerto Rico), sometimes referred to as Puerto Rico Commonwealth forests in English, are protected forest reserves managed by the government of Puerto Rico, particularly by the Puerto Rico Department of Natural and Environmental Resources. In addition to their fun...
https://en.wikipedia.org/wiki/Local%20reference%20frame
In theoretical physics, a local reference frame (local frame) refers to a coordinate system or frame of reference that is only expected to function over a small region or a restricted region of space or spacetime. The term is most often used in the context of the application of local inertial frames to small regions ...
https://en.wikipedia.org/wiki/Non-inertial%20reference%20frame
A non-inertial reference frame (also known as an accelerated reference frame) is a frame of reference that undergoes acceleration with respect to an inertial frame. An accelerometer at rest in a non-inertial frame will, in general, detect a non-zero acceleration. While the laws of motion are the same in all inertial fr...
https://en.wikipedia.org/wiki/Chicken%20gun
A chicken gun or flight impact simulator is a large-diameter, compressed-air gun used to fire bird carcasses at aircraft components in order to simulate high-speed bird strikes during the aircraft's flight. Jet engines and aircraft windshields are particularly vulnerable to damage from such strikes, and are the most co...
https://en.wikipedia.org/wiki/Memory%20map
In computer science, a memory map is a structure of data (which usually resides in memory itself) that indicates how memory is laid out. The term "memory map" has different meanings in different contexts. It is the fastest and most flexible cache organization that uses an associative memory. The associative memory stor...
https://en.wikipedia.org/wiki/SAPHO%20syndrome
SAPHO syndrome includes a variety of inflammatory bone disorders that may be associated with skin changes. These diseases share some clinical, radiologic, and pathologic characteristics. An entity initially known as chronic recurrent multifocal osteomyelitis was first described in 1972. Subsequently, in 1978, several ...
https://en.wikipedia.org/wiki/Fictitious%20play
In game theory, fictitious play is a learning rule first introduced by George W. Brown. In it, each player presumes that the opponents are playing stationary (possibly mixed) strategies. At each round, each player thus best responds to the empirical frequency of play of their opponent. Such a method is of course adeq...
https://en.wikipedia.org/wiki/Spin%20coating
Spin coating is a procedure used to deposit uniform thin films onto flat substrates. Usually a small amount of coating material is applied on the center of the substrate, which is either spinning at low speed or not spinning at all. The substrate is then rotated at speeds up to 10,000 rpm to spread the coating material...
https://en.wikipedia.org/wiki/Dubna%2048K
The Dubna 48K (Дубна 48К) is a Soviet clone of the ZX Spectrum home computer launched in 1991. It was based on an analogue of the Zilog Z80 microprocessor. Its name comes from Dubna, a town near Moscow, where it was produced on the "TENSOR" instrument factory, and "48K" stands for 48 KBs of RAM. Overview According to ...
https://en.wikipedia.org/wiki/Rope%20stretcher
In ancient Egypt, a rope stretcher (or harpedonaptai) was a surveyor who measured real property demarcations and foundations using knotted cords, stretched so the rope did not sag. The practice is depicted in tomb paintings of the Theban Necropolis. Rope stretchers used 3-4-5 triangles and the plummet, which are still ...
https://en.wikipedia.org/wiki/Architectural%20technologist
The architectural technologist, also known as a building technologist, provides technical building design services and is trained in architectural technology, building technical design and construction. Architectural technologists apply the science of architecture and typically concentrate on the technology of buildin...
https://en.wikipedia.org/wiki/Solar%20conjunction
Solar conjunction generally occurs when a planet or other Solar System object is on the opposite side of the Sun from the Earth. From an Earth reference, the Sun will pass between the Earth and the object. Communication with any spacecraft in solar conjunction will be severely limited due to the Sun's interference on ...
https://en.wikipedia.org/wiki/Line%202%20%28Shanghai%20Metro%29
Line 2 is an east–west line in the Shanghai Metro network. With a length of nearly , it is the second longest line in the metro system after line 11. Line 2 runs from in the west to in the east, passing Hongqiao Airport, the Huangpu river, and the Lujiazui Financial District in Pudong. With a daily ridership of over ...
https://en.wikipedia.org/wiki/Hybrid%20integrated%20circuit
A hybrid integrated circuit (HIC), hybrid microcircuit, hybrid circuit or simply hybrid is a miniaturized electronic circuit constructed of individual devices, such as semiconductor devices (e.g. transistors, diodes or monolithic ICs) and passive components (e.g. resistors, inductors, transformers, and capacitors), b...
https://en.wikipedia.org/wiki/Property%20list
In the macOS, iOS, NeXTSTEP, and GNUstep programming frameworks, property list files are files that store serialized objects. Property list files use the filename extension .plist, and thus are often referred to as p-list files. Property list files are often used to store a user's settings. They are also used to st...
https://en.wikipedia.org/wiki/Sister%20group
In phylogenetics, a sister group or sister taxon, also called an adelphotaxon, comprises the closest relative(s) of another given unit in an evolutionary tree. Definition The expression is most easily illustrated by a cladogram: Taxon A and taxon B are sister groups to each other. Taxa A and B, together with any oth...
https://en.wikipedia.org/wiki/Longest%20uncrossed%20knight%27s%20path
The longest uncrossed (or nonintersecting) knight's path is a mathematical problem involving a knight on the standard 8×8 chessboard or, more generally, on a square n×n board. The problem is to find the longest path the knight can take on the given board, such that the path does not intersect itself. A further distinct...
https://en.wikipedia.org/wiki/Stuck-at%20fault
A stuck-at fault is a particular fault model used by fault simulators and automatic test pattern generation (ATPG) tools to mimic a manufacturing defect within an integrated circuit. Individual signals and pins are assumed to be stuck at Logical '1', '0' and 'X'. For example, an input is tied to a logical 1 state duri...
https://en.wikipedia.org/wiki/Aristotle%27s%20wheel%20paradox
Aristotle's wheel paradox is a paradox or problem appearing in the pseudo-Aristotelian Greek work Mechanica It states as follows: A wheel is depicted in two-dimensional space as two circles. Its larger, outer circle is tangential to a horizontal surface (e.g. a road that it rolls on), while the smaller, inner one has t...
https://en.wikipedia.org/wiki/Focal%20adhesion
In cell biology, focal adhesions (also cell–matrix adhesions or FAs) are large macromolecular assemblies through which mechanical force and regulatory signals are transmitted between the extracellular matrix (ECM) and an interacting cell. More precisely, focal adhesions are the sub-cellular structures that mediate the ...
https://en.wikipedia.org/wiki/Medical%20geology
Medical geology is an interdisciplinary scientific field studying the relationship between natural geological factors and their effects on human and animal health. The Commission on Geological Sciences for Environmental Planning defines medical geology as "the science dealing with the influence of ordinary environmenta...
https://en.wikipedia.org/wiki/Variable%20envelope%20return%20path
Variable envelope return path (VERP) is a technique used by some electronic mailing list software to enable automatic detection and removal of undeliverable e-mail addresses. It works by using a different return path (also called "envelope sender") for each recipient of a message. Motivation Any long-lived mailing li...
https://en.wikipedia.org/wiki/B-Method
The B method is a method of software development based on B, a tool-supported formal method based on an abstract machine notation, used in the development of computer software. Overview B was originally developed in the 1980s by Jean-Raymond Abrial in France and the UK. B is related to the Z notation (also originated ...
https://en.wikipedia.org/wiki/Jean-Raymond%20Abrial
Jean-Raymond Abrial (born 6 November 1938) is a French computer scientist and inventor of the Z and B formal methods. Abrial was a student at the École Polytechnique (class of 1958). Abrial's 1974 paper Data Semantics laid the foundation for a formal approach to Data Models; although not adopted directly by practitio...
https://en.wikipedia.org/wiki/Hessian%20%28Web%20service%20protocol%29
Hessian is a binary Web service protocol that makes Web services usable without requiring a large framework, and without learning a new set of protocols . Because it is a binary protocol, it is well-suited to sending binary data without any need to extend the protocol with attachments. Hessian was developed by Caucho ...
https://en.wikipedia.org/wiki/Deep%20reactive-ion%20etching
Deep reactive-ion etching (DRIE) is a highly anisotropic etch process used to create deep penetration, steep-sided holes and trenches in wafers/substrates, typically with high aspect ratios. It was developed for microelectromechanical systems (MEMS), which require these features, but is also used to excavate trenches ...
https://en.wikipedia.org/wiki/Formulario%20mathematico
Formulario Mathematico (Latino sine flexione: Formulary for Mathematics) is a book by Giuseppe Peano which expresses fundamental theorems of mathematics in a symbolic language developed by Peano. The author was assisted by Giovanni Vailati, Mario Pieri, Alessandro Padoa, Giovanni Vacca, Vincenzo Vivanti, Gino Fano and ...
https://en.wikipedia.org/wiki/Maemo
Maemo is a software platform originally developed by Nokia, now developed by the community, for smartphones and Internet tablets. The platform comprises both the Maemo operating system and SDK. Maemo played a key role in Nokia's strategy to compete with Apple and Android, and that strategy failed for complex, instituti...
https://en.wikipedia.org/wiki/Broad%20Institute
The Eli and Edythe L. Broad Institute of MIT and Harvard (IPA: , pronunciation respelling: ), often referred to as the Broad Institute, is a biomedical and genomic research center located in Cambridge, Massachusetts, United States. The institute is independently governed and supported as a 501(c)(3) nonprofit research ...
https://en.wikipedia.org/wiki/Colonisation%20%28biology%29
Colonisation or colonization is the process in biology by which a species spreads to new areas. Colonisation often refers to successful immigration where a population becomes integrated into an ecological community, having resisted initial local extinction. In ecology, it is represented by the symbol λ (lowercase lambd...
https://en.wikipedia.org/wiki/VideoCrypt
VideoCrypt is a cryptographic, smartcard-based conditional access television encryption system that scrambles analogue pay-TV signals. It was introduced in 1989 by News Datacom and was used initially by Sky TV and subsequently by several other broadcasters on SES' Astra satellites at 19.2° east. Users Versions Three...
https://en.wikipedia.org/wiki/Loren%20Kohnfelder
Loren Kohnfelder invented what is today called public key infrastructure (PKI) in his May 1978 MIT S.B. (BSCSE) thesis, which described a practical means of using public key cryptography to secure network communications. The Kohnfelder thesis introduced the terms 'certificate' and 'certificate revocation list' as well...
https://en.wikipedia.org/wiki/Phantasy%20Star%20Universe
(PSU) is an action role-playing video game developed by Sega's Sonic Team for the Microsoft Windows, PlayStation 2 and Xbox 360 platforms. It was released in Japan for the PC and PlayStation 2 on August 31, 2006; the Xbox 360 version was released there on December 14, 2006. Its North American release was in October 200...
https://en.wikipedia.org/wiki/Velocity%20potential
A velocity potential is a scalar potential used in potential flow theory. It was introduced by Joseph-Louis Lagrange in 1788. It is used in continuum mechanics, when a continuum occupies a simply-connected region and is irrotational. In such a case, where denotes the flow velocity. As a result, can be represented a...
https://en.wikipedia.org/wiki/Xsupplicant
Xsupplicant is a supplicant that allows a workstation to authenticate with a RADIUS server using 802.1X and the Extensible Authentication Protocol (EAP). It can be used for computers with wired or wireless LAN connections to complete a strong authentication before joining the network and supports the dynamic assignment...
https://en.wikipedia.org/wiki/Index%20ellipsoid
In crystal optics, the index ellipsoid (also known as the optical indicatrix or sometimes as the dielectric ellipsoid) is a geometric construction which concisely represents the refractive indices and associated polarizations of light, as functions of the orientation of the wavefront, in a doubly-refractive crystal (pr...
https://en.wikipedia.org/wiki/Guillermo%20Owen
Guillermo Owen (born 1938) is a Colombian mathematician, and professor of applied mathematics at the Naval Postgraduate School in Monterey, California, known for his work in game theory. He is also the son of the Mexican Poet and Diplomat Gilberto Owen. Biography Guillermo Owen was born May 4, 1938, in Bogotá, Colomb...
https://en.wikipedia.org/wiki/Security%20Administrator%20Tool%20for%20Analyzing%20Networks
Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in PC Magazine and drawing threats from the United States Department of Justice. It featured a web interface, comp...
https://en.wikipedia.org/wiki/Range%20of%20motion
Range of motion (or ROM) is the linear or angular distance that a moving object may normally travel while properly attached to another. In biomechanics and strength training, ROM refers to the angular distance and direction a joint can move between the flexed position and the extended position. The act of attempting ...
https://en.wikipedia.org/wiki/Simple%20set
In computability theory, a subset of the natural numbers is called simple if it is computably enumerable (c.e.) and co-infinite (i.e. its complement is infinite), but every infinite subset of its complement is not c.e.. Simple sets are examples of c.e. sets that are not computable. Relation to Post's problem Simple ...
https://en.wikipedia.org/wiki/Prone%20position
Prone position () is a body position in which the person lies flat with the chest down and the back up. In anatomical terms of location, the dorsal side is up, and the ventral side is down. The supine position is the 180° contrast. Etymology The word prone, meaning "naturally inclined to something, apt, liable," has ...
https://en.wikipedia.org/wiki/Semi-Thue%20system
In theoretical computer science and mathematical logic a string rewriting system (SRS), historically called a semi-Thue system, is a rewriting system over strings from a (usually finite) alphabet. Given a binary relation between fixed strings over the alphabet, called rewrite rules, denoted by , an SRS extends the rew...
https://en.wikipedia.org/wiki/List%20of%20anatomical%20isthmi
In anatomy, isthmus refers to a constriction between organs. This is a list of anatomical isthmi: Aortic isthmus, section of the aortic arch Cavo-tricuspid isthmus of the right atrium of the heart, a body of fibrous tissue in the lower atrium between the inferior vena cava, and the tricuspid valve Isthmus, the ear ...
https://en.wikipedia.org/wiki/Mario%20Pieri
Mario Pieri (22 June 1860 – 1 March 1913) was an Italian mathematician who is known for his work on foundations of geometry. Biography Pieri was born in Lucca, Italy, the son of Pellegrino Pieri and Ermina Luporini. Pellegrino was a lawyer. Pieri began his higher education at University of Bologna where he drew the at...
https://en.wikipedia.org/wiki/Vagrancy%20%28biology%29
Vagrancy is a phenomenon in biology whereby an individual animal (usually a bird) appears well outside its normal range; they are known as vagrants. The term accidental is sometimes also used. There are a number of poorly understood factors which might cause an animal to become a vagrant, including internal causes such...
https://en.wikipedia.org/wiki/Tunnel%20broker
In the context of computer networking, a tunnel broker is a service which provides a network tunnel. These tunnels can provide encapsulated connectivity over existing infrastructure to another infrastructure. There are a variety of tunnel brokers, including IPv4 tunnel brokers, though most commonly the term is used to...
https://en.wikipedia.org/wiki/NBName
NBName (note capitalization) is a computer program that can be used to carry out denial-of-service attacks that can disable NetBIOS services on Windows machines. It was written by Sir Dystic of CULT OF THE DEAD COW (cDc) and released July 29, 2000 at the DEF CON 8 convention in Las Vegas. The program decodes and prov...
https://en.wikipedia.org/wiki/Super%2035
Super 35 (originally known as Superscope 235) is a motion picture film format that uses exactly the same film stock as standard 35 mm film, but puts a larger image frame on that stock by using the space normally reserved for the optical analog sound track. History Super 35 was revived from a similar Superscope varian...
https://en.wikipedia.org/wiki/Shared%20web%20hosting%20service
A shared web hosting service is a web hosting service where many websites reside on one web server connected to the Internet. The overall cost of server maintenance is spread over many customers. By using shared hosting, the website will share a physical server with one or more other websites. Description The service...
https://en.wikipedia.org/wiki/Table%20of%20explosive%20detonation%20velocities
This is a compilation of published detonation velocities for various high explosive compounds. Detonation velocity is the speed with which the detonation shock wave travels through the explosive. It is a key, directly measurable indicator of explosive performance, but depends on density which must always be specified, ...
https://en.wikipedia.org/wiki/Seiberg%20duality
In quantum field theory, Seiberg duality, conjectured by Nathan Seiberg in 1994, is an S-duality relating two different supersymmetric QCDs. The two theories are not identical, but they agree at low energies. More precisely under a renormalization group flow they flow to the same IR fixed point, and so are in the same...
https://en.wikipedia.org/wiki/Heirloom%20tomato
An heirloom tomato (also called heritage tomato in the UK) is an open-pollinated, non-hybrid heirloom cultivar of tomato. They are classified as family heirlooms, commercial heirlooms, mystery heirlooms, or created heirlooms. They usually have a shorter shelf life and are less disease resistant than hybrids. They are ...
https://en.wikipedia.org/wiki/Shlaer%E2%80%93Mellor%20method
The Shlaer–Mellor method, also known as object-oriented systems analysis (OOSA) or object-oriented analysis (OOA) is an object-oriented software development methodology introduced by Sally Shlaer and Stephen Mellor in 1988. The method makes the documented analysis so precise that it is possible to implement the analysi...
https://en.wikipedia.org/wiki/Thinking%20in%20Java
Thinking in Java () is a book about the Java programming language, written by Bruce Eckel and first published in 1998. Prentice Hall published the 4th edition of the work in 2006. The book represents a print version of Eckel’s “Hands-on Java” seminar. Bruce Eckel wrote “On Java8” as a sequel for Thinking in Java and ...
https://en.wikipedia.org/wiki/Gnotobiosis
Gnotobiosis (from Greek roots gnostos "known" and bios "life") refers to an engineered state of an organism in which all forms of life (i.e., microorganisms) in or on it, including its microbiota, have been identified. The term gnotobiotic organism, or gnotobiote, can refer to a model organism that is colonized with a ...
https://en.wikipedia.org/wiki/Route%20reestablishment%20notification
Route Reestablishment Notification (RRN) is a type of notification that is used in some communications protocols that use time-division multiplexing. Network protocols
https://en.wikipedia.org/wiki/Conserved%20quantity
A conserved quantity is a property or value that remains constant over time in a system even when changes occur in the system. In mathematics, a conserved quantity of a dynamical system is formally defined as a function of the dependent variables, the value of which remains constant along each trajectory of the system....
https://en.wikipedia.org/wiki/Nightshade%20%281985%20video%20game%29
Nightshade is an action video game developed and published by Ultimate Play the Game. It was first released for the ZX Spectrum in 1985, and was then ported to the Amstrad CPC and BBC Micro later that year. It was also ported to the MSX exclusively in Japan in 1986. In the game, the player assumes the role of a knight ...
https://en.wikipedia.org/wiki/IBM%20System%20z9
IBM System z9 is a line of IBM mainframe computers. The first models were available on September 16, 2005. The System z9 also marks the end of the previously used eServer zSeries naming convention. It was also the last mainframe computer that NASA ever used. Background System z9 is a mainframe using the z/Architec...
https://en.wikipedia.org/wiki/Modular%20Approach%20to%20Software%20Construction%20Operation%20and%20Test
The Modular Approach to Software Construction Operation and Test (MASCOT) is a software engineering methodology developed under the auspices of the United Kingdom Ministry of Defence starting in the early 1970s at the Royal Radar Establishment and continuing its evolution over the next twenty years. The co-originators ...
https://en.wikipedia.org/wiki/Data%20assimilation
Data assimilation is a mathematical discipline that seeks to optimally combine theory (usually in the form of a numerical model) with observations. There may be a number of different goals sought – for example, to determine the optimal state estimate of a system, to determine initial conditions for a numerical forecast...
https://en.wikipedia.org/wiki/Spin%20polarization
In particle physics, spin polarization is the degree to which the spin, i.e., the intrinsic angular momentum of elementary particles, is aligned with a given direction. This property may pertain to the spin, hence to the magnetic moment, of conduction electrons in ferromagnetic metals, such as iron, giving rise to spin...
https://en.wikipedia.org/wiki/Wall%20of%20Shame
"Wall of Shame" () is a phrase that is most commonly associated with the Berlin Wall. In this context, the phrase was coined by Willy Brandt, and it was used by the government of West Berlin, and later popularized in the English-speaking world and elsewhere from the beginning of the 1960s. Inspired by its usage in re...
https://en.wikipedia.org/wiki/Australian%20Nuclear%20Science%20and%20Technology%20Organisation
The Australian Nuclear Science & Technology Organisation (ANSTO) is Australia's national nuclear organisation and the centre of Australian nuclear expertise. It is a statutory body of the Australian government formed in 1987 to replace the Australian Atomic Energy Commission. Its head office and main facilities are in...
https://en.wikipedia.org/wiki/Common%20Access%20Card
The Common Access Card, also commonly referred to as the CAC, is the standard identification for Active Duty United States Defense personnel. The card itself is a smart card about the size of a credit card. Defense personnel that use the CAC include the Selected Reserve and National Guard, United States Department of ...
https://en.wikipedia.org/wiki/Physical%20optics
In physics, physical optics, or wave optics, is the branch of optics that studies interference, diffraction, polarization, and other phenomena for which the ray approximation of geometric optics is not valid. This usage tends not to include effects such as quantum noise in optical communication, which is studied in the...
https://en.wikipedia.org/wiki/Balkan%20Mathematical%20Olympiad
The Balkan Mathematical Olympiad (BMO) is an international contest of winners of high-school national competitions from European countries. Participants (incomplete) Albania BMO 1991: 1.Julian Mulla 2.Erion Dasho 3.Elton Bojaxhi 4.Enkel Hysnelaj BMO 1993: 1.Gjergji Guri 2.Jonada Rrapo 3.Ermir Qeli 4.Mirela C...
https://en.wikipedia.org/wiki/Transitive%20set
In set theory, a branch of mathematics, a set is called transitive if either of the following equivalent conditions hold: whenever , and , then . whenever , and is not an urelement, then is a subset of . Similarly, a class is transitive if every element of is a subset of . Examples Using the definition of ordi...
https://en.wikipedia.org/wiki/Generalized%20Appell%20polynomials
In mathematics, a polynomial sequence has a generalized Appell representation if the generating function for the polynomials takes on a certain form: where the generating function or kernel is composed of the series with and and all and with Given the above, it is not hard to show that is a polynomial o...
https://en.wikipedia.org/wiki/Ristra
A ristra (), also known as a sarta, is an arrangement of drying chile pepper pods, garlic bulbs, or other vegetables for later consumption. In addition to its practical use, the ristra has come to be a trademark of decorative design in the state of New Mexico as well as southern Arizona. Typically, large chiles such as...
https://en.wikipedia.org/wiki/Sulfur%20cycle
The sulfur cycle is a biogeochemical cycle in which the sulfur moves between rocks, waterways and living systems. It is important in geology as it affects many minerals and in life because sulfur is an essential element (CHNOPS), being a constituent of many proteins and cofactors, and sulfur compounds can be used as ox...
https://en.wikipedia.org/wiki/Cold%20chain
Cold chain is defined as the series of actions and equipment applied to maintain a product within a specified low-temperature range from harvest/production to consumption. An unbroken cold chain is an uninterrupted sequence of refrigerated production, storage and distribution activities, along with associated equipment...
https://en.wikipedia.org/wiki/Metasystem%20transition
A metasystem transition is the emergence, through evolution, of a higher level of organization or control. A metasystem is formed by the integration of a number of initially independent components, such as molecules (as theorized for instance by hypercycles), cells, or individuals, and the emergence of a system steeri...
https://en.wikipedia.org/wiki/Plug%20compatible
Plug compatible refers to "hardware that is designed to perform exactly like another vendor's product." The term PCM was originally applied to manufacturers who made replacements for IBM peripherals. Later this term was used to refer to IBM-compatible computers. PCM and peripherals Before the rise of the PCM periphera...
https://en.wikipedia.org/wiki/Defense%20Information%20System%20Network
The Defense Information System Network (DISN) has been the United States Department of Defense's enterprise telecommunications network for providing data, video, and voice services for 40 years. The DISN end-to-end infrastructure is composed of three major segments: The sustaining base (I.e., base, post, camp, or sta...
https://en.wikipedia.org/wiki/P6%20%28microarchitecture%29
The P6 microarchitecture is the sixth-generation Intel x86 microarchitecture, implemented by the Pentium Pro microprocessor that was introduced in November 1995. It is frequently referred to as i686. It was planned to be succeeded by the NetBurst microarchitecture used by the Pentium 4 in 2000, but was revived for the ...
https://en.wikipedia.org/wiki/Intel%20Core%20%28microarchitecture%29
The Intel Core microarchitecture (provisionally referred to as Next Generation Micro-architecture, and developed as Merom) is a multi-core processor microarchitecture launched by Intel in mid-2006. It is a major evolution over the Yonah, the previous iteration of the P6 microarchitecture series which started in 1995 wi...
https://en.wikipedia.org/wiki/Conference%20on%20Automated%20Deduction
The Conference on Automated Deduction (CADE) is the premier academic conference on automated deduction and related fields. The first CADE was organized in 1974 at the Argonne National Laboratory near Chicago. Most CADE meetings have been held in Europe and the United States. However, conferences have been held all over...
https://en.wikipedia.org/wiki/Ciphertext%20expansion
In cryptography, the term ciphertext expansion refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some degree of expansion during the encryption process, for instance when the resulting ciphertext must include a message-unique Initialization Vector (IV). Probabilistic encr...
https://en.wikipedia.org/wiki/Fluidized%20bed
A fluidized bed is a physical phenomenon that occurs when a solid particulate substance (usually present in a holding vessel) is under the right conditions so that it behaves like a fluid. The usual way to achieve a fluidized bed is to pump pressurized fluid into the particles. The resulting medium then has many proper...
https://en.wikipedia.org/wiki/Hybrid%20drive
In computing, a hybrid drive (solid state hybrid drive – SSHD) is a logical or physical storage device that combines a faster storage medium such as solid-state drive (SSD) with a higher-capacity hard disk drive (HDD). The intent is adding some of the speed of SSDs to the cost-effective storage capacity of traditional ...
https://en.wikipedia.org/wiki/PEDOT%3APSS
poly(3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT:PSS) is a polymer mixture of two ionomers. One component in this mixture is made up of polystyrene sulfonate which is a sulfonated polystyrene. Part of the sulfonyl groups are deprotonated and carry a negative charge. The other component poly(3,4-ethylenedio...
https://en.wikipedia.org/wiki/Float-zone%20silicon
Float-zone silicon is very pure silicon obtained by vertical zone melting. The process was developed at Bell Labs by Henry Theuerer in 1955 as a modification of a method developed by William Gardner Pfann for germanium. In the vertical configuration molten silicon has sufficient surface tension to keep the charge from ...
https://en.wikipedia.org/wiki/IBM%20High%20Availability%20Cluster%20Multiprocessing
IBM PowerHA SystemMirror (formerly IBM PowerHA and HACMP) is IBM's solution for high-availability clusters on the AIX Unix and Linux for IBM System p platforms and stands for High Availability Cluster Multiprocessing. IBM's HACMP product was first shipped in 1991 and is now in its 20th release - PowerHA SystemMirror fo...
https://en.wikipedia.org/wiki/High-availability%20cluster
High-availability clusters (also known as HA clusters, fail-over clusters) are groups of computers that support server applications that can be reliably utilized with a minimum amount of down-time. They operate by using high availability software to harness redundant computers in groups or clusters that provide contin...
https://en.wikipedia.org/wiki/Newton%27s%20identities
In mathematics, Newton's identities, also known as the Girard–Newton formulae, give relations between two types of symmetric polynomials, namely between power sums and elementary symmetric polynomials. Evaluated at the roots of a monic polynomial P in one variable, they allow expressing the sums of the k-th powers of a...
https://en.wikipedia.org/wiki/FreeBSD%20jail
The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the same kernel, with very little overhead. It is implemented through a system call, jail(2), as w...
https://en.wikipedia.org/wiki/Video%20Disk%20Control%20Protocol
Video Disk Control Protocol (VDCP) is a proprietary communications protocol primarily used in broadcast automation to control hard disk video servers for broadcast television. VDCP was originally developed by Louth Automation and is commonly called the Louth Protocol. At the time it was developed when Hewlett Packard (...
https://en.wikipedia.org/wiki/Underglaze
Underglaze is a method of decorating pottery in which painted decoration is applied to the surface before it is covered with a transparent ceramic glaze and fired in a kiln. Because the glaze subsequently covers it, such decoration is completely durable, and it also allows the production of pottery with a surface that ...