source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Sound%20level%20meter | A sound level meter (also called sound pressure level meter (SPL)) is used for acoustic measurements. It is commonly a hand-held instrument with a microphone. The best type of microphone for sound level meters is the condenser microphone, which combines precision with stability and reliability. The diaphragm of the mic... |
https://en.wikipedia.org/wiki/Wow%20and%20flutter%20measurement | Measurement of wow and flutter is carried out on audio tape machines, cassette recorders and players, and other analog recording and reproduction devices with rotary components (e.g. movie projectors, turntables (vinyl recording), etc.) This measurement quantifies the amount of 'frequency wobble' (caused by speed fluct... |
https://en.wikipedia.org/wiki/Ruderal%20species | A ruderal species is a plant species that is first to colonize disturbed lands. The disturbance may be natural for example, wildfires or avalanchesor the consequences of human activities, such as construction (of roads, of buildings, mining, etc.) or agriculture (abandoned fields, irrigation, etc.).
The term ruderal o... |
https://en.wikipedia.org/wiki/KEGG | KEGG (Kyoto Encyclopedia of Genes and Genomes) is a collection of databases dealing with genomes, biological pathways, diseases, drugs, and chemical substances. KEGG is utilized for bioinformatics research and education, including data analysis in genomics, metagenomics, metabolomics and other omics studies, modeling a... |
https://en.wikipedia.org/wiki/Dipmeter%20Advisor | The Dipmeter Advisor was an early expert system developed in the 1980s by Schlumberger with the help of artificial-intelligence workers at MIT to aid in the analysis of data gathered during oil exploration. The Advisor was generally not merely an inference engine and a knowledge base of ~90 rules, but generally was a ... |
https://en.wikipedia.org/wiki/International%20Conference%20on%20Mobile%20Computing%20and%20Networking | MobiCom, the International Conference on Mobile Computing and Networking, is a series of annual conferences sponsored by ACM SIGMOBILE dedicated to addressing the challenges in the areas of mobile computing and wireless and mobile networking. Although no rating system for computer networking conferences exists, MobiCom... |
https://en.wikipedia.org/wiki/SCR-584%20radar | The SCR-584 (short for Set, Complete, Radio # 584) was an automatic-tracking microwave radar developed by the MIT Radiation Laboratory during World War II. It was one of the most advanced ground-based radars of its era, and became one of the primary gun laying radars used worldwide well into the 1950s. A trailer-mounte... |
https://en.wikipedia.org/wiki/Deterministic%20pushdown%20automaton | In automata theory, a deterministic pushdown automaton (DPDA or DPA) is a variation of the pushdown automaton. The class of deterministic pushdown automata accepts the deterministic context-free languages, a proper subset of context-free languages.
Machine transitions are based on the current state and input symbol, a... |
https://en.wikipedia.org/wiki/Z8%20Encore%21 | The Zilog Z8 Encore! is a microcontroller based on the popular Z8 microcontroller.
The Z8 Encore! offers a wide range of features for use in embedded applications, most notably the use of three DMA channels to read for example from the analog-to-digital converter (ADC).
The Z8 Encore! instruction set is compatible wi... |
https://en.wikipedia.org/wiki/Sun-4 | Sun-4 is a series of Unix workstations and servers produced by Sun Microsystems, launched in 1987. The original Sun-4 series were VMEbus-based systems similar to the earlier Sun-3 series, but employing microprocessors based on Sun's own SPARC V7 RISC architecture in place of the 68k family processors of previous Sun mo... |
https://en.wikipedia.org/wiki/Taylor%20expansions%20for%20the%20moments%20of%20functions%20of%20random%20variables | In probability theory, it is possible to approximate the moments of a function f of a random variable X using Taylor expansions, provided that f is sufficiently differentiable and that the moments of X are finite.
First moment
Given and , the mean and the variance of , respectively, a Taylor expansion of the expected... |
https://en.wikipedia.org/wiki/Plastic%20bending | Plastic bending is a nonlinear behavior particular to members made of ductile materials that frequently achieve much greater ultimate bending strength than indicated by a linear elastic bending analysis. In both the plastic and elastic bending analyses of a straight beam, it is assumed that the strain distribution is ... |
https://en.wikipedia.org/wiki/Psophometric%20weighting | Psophometric weighting refers to any weighting curve used in the measurement of noise. In the field of audio engineering it has a more specific meaning, referring to noise weightings used especially in measuring noise on telecommunications circuits. Key standards are ITU-T O.41 and C-message weighting as shown here.
U... |
https://en.wikipedia.org/wiki/Electrophoretic%20mobility%20shift%20assay | An electrophoretic mobility shift assay (EMSA) or mobility shift electrophoresis, also referred as a gel shift assay, gel mobility shift assay, band shift assay, or gel retardation assay, is a common affinity electrophoresis technique used to study protein–DNA or protein–RNA interactions. This procedure can determine ... |
https://en.wikipedia.org/wiki/VAX-11 | The VAX-11 is a discontinued family of 32-bit superminicomputers, running the Virtual Address eXtension (VAX) instruction set architecture (ISA), developed and manufactured by Digital Equipment Corporation (DEC). Development began in 1976. In addition to being powerful machines in their own right, they also offer the a... |
https://en.wikipedia.org/wiki/Path%20expression | In query languages, path expressions identify an object by describing how to navigate to it
in some graph (possibly implicit) of objects. For example, the path expression p.Manager.Home.City might refer the city of residence of someone's manager.
Path expressions have been extended to support regular expression-like fl... |
https://en.wikipedia.org/wiki/Inverse%20demand%20function | In economics, an inverse demand function is the mathematical relationship that expresses price as a function of quantity demanded (is is therefore also known as a price function).
Historically, the economists first expressed the price of a good as a function of demand (holding the other economic variables, like income... |
https://en.wikipedia.org/wiki/Mohammad-Ali%20Najafi | Mohammad-Ali Najafi (; born 13 January 1952) is an Iranian mathematician and reformist politician who was the Mayor of Tehran, serving in the post for eight months, until April 2018. He held cabinet portfolios during the 1980s, 1990s and 2010s. He is also a retired professor of mathematics at Sharif University of Techn... |
https://en.wikipedia.org/wiki/Correlation%20sum | In chaos theory, the correlation sum is the estimator of the correlation integral, which reflects the mean probability that the states at two different times are close:
where is the number of considered states , is a threshold distance, a norm (e.g. Euclidean norm) and the Heaviside step function. If only a time s... |
https://en.wikipedia.org/wiki/Building%20information%20modeling | Building information modeling (BIM) is a process involving the generation and management of digital representations of the physical and functional characteristics of places. BIM is supported by various tools, technologies and contracts. Building information models (BIMs) are computer files (often but not always in pro... |
https://en.wikipedia.org/wiki/IEEE%20802.1ag | IEEE 802.1ag is an amendment to the IEEE 802.1Q networking standard which introduces Connectivity Fault Management (CFM). This defines protocols and practices for the operations, administration, and maintenance (OAM) of paths through 802.1 bridges and local area networks (LANs). The final version was approved by the IE... |
https://en.wikipedia.org/wiki/Exogenote | An exogenote is a piece of donor DNA that is involved in the mating of prokaryotic organisms.
Transferred DNA of Hfr (high frequency of recombination) is called exogenote and homologous part of F (fertility factor) genophore is called endogenote. An exogenote is genetic material that is released into the environment b... |
https://en.wikipedia.org/wiki/Shadow%20and%20highlight%20enhancement | Shadow and highlight enhancement refers to an image processing technique used to correct exposure.
The use of this technique has been gaining popularity, making its way onto magazine covers, digital media, and photos. It is, however, considered by some to be akin to other destructive Photoshop filters, such as the Wat... |
https://en.wikipedia.org/wiki/Computational%20scientist | A computational scientist is a person skilled in scientific computing. This person is usually a scientist, a statistician, an applied mathematician, or an engineer who applies high-performance computing and sometimes cloud computing in different ways to advance the state-of-the-art in their respective applied disciplin... |
https://en.wikipedia.org/wiki/Longest%20repeated%20substring%20problem | In computer science, the longest repeated substring problem is the problem of finding the longest substring of a string that occurs at least twice.
This problem can be solved in linear time and space by building a suffix tree for the string (with a special end-of-string symbol like '$' appended), and finding the dee... |
https://en.wikipedia.org/wiki/Epsilon%20number | In mathematics, the epsilon numbers are a collection of transfinite numbers whose defining property is that they are fixed points of an exponential map. Consequently, they are not reachable from 0 via a finite series of applications of the chosen exponential map and of "weaker" operations like addition and multiplicat... |
https://en.wikipedia.org/wiki/German%20locomotive%20classification | The different railway companies in Germany have used various schemes to classify their rolling stock.
From the beginning
As widely known the first few locomotives had names. The first locomotive in public service in Germany from 1835 was named Adler. The first railway lines were built by privately owned companies. Tha... |
https://en.wikipedia.org/wiki/Turret%20lathe | A turret lathe is a form of metalworking lathe that is used for repetitive production of duplicate parts, which by the nature of their cutting process are usually interchangeable. It evolved from earlier lathes with the addition of the turret, which is an indexable toolholder that allows multiple cutting operations to ... |
https://en.wikipedia.org/wiki/Lattice%20of%20subgroups | In mathematics, the lattice of subgroups of a group is the lattice whose elements are the subgroups of , with the partial order relation being set inclusion.
In this lattice, the join of two subgroups is the subgroup generated by their union, and the meet of two subgroups is their intersection.
Example
The dihedral... |
https://en.wikipedia.org/wiki/List%20of%20contaminated%20cell%20lines | Many cell lines that are widely used for biomedical research have been overgrown by other, more aggressive cells. For example, supposed thyroid lines were actually melanoma cells, supposed prostate tissue was actually bladder cancer, and supposed normal uterine cultures were actually breast cancer. This is a list of ce... |
https://en.wikipedia.org/wiki/Linear%20group | In mathematics, a matrix group is a group G consisting of invertible matrices over a specified field K, with the operation of matrix multiplication. A linear group is a group that is isomorphic to a matrix group (that is, admitting a faithful, finite-dimensional representation over K).
Any finite group is linear, beca... |
https://en.wikipedia.org/wiki/Omega%20language | In formal language theory within theoretical computer science, an infinite word is an infinite-length sequence (specifically, an ω-length sequence) of symbols, and an ω-language is a set of infinite words. Here, ω refers to the first ordinal number, the set of natural numbers.
Formal definition
Let Σ be a set of symb... |
https://en.wikipedia.org/wiki/Ensonido | Ensonido is a real-time post processing algorithm that allows users to play back MP3 Surround files in standard headphones.
Ensonido was developed by the Fraunhofer Society. It simulates the natural reception of surround sound by the human ear, which usually receives tones from surrounding loudspeakers and from reflect... |
https://en.wikipedia.org/wiki/Sun-3 | Sun-3 is a series of UNIX computer workstations and servers produced by Sun Microsystems, launched on September 9, 1985. The Sun-3 series are VMEbus-based systems similar to some of the earlier Sun-2 series, but using the Motorola 68020 microprocessor, in combination with the Motorola 68881 floating-point co-processor ... |
https://en.wikipedia.org/wiki/Ripple%20%28electrical%29 | Ripple (specifically ripple voltage) in electronics is the residual periodic variation of the DC voltage within a power supply which has been derived from an alternating current (AC) source. This ripple is due to incomplete suppression of the alternating waveform after rectification. Ripple voltage originates as the ... |
https://en.wikipedia.org/wiki/Broadcast%20Markup%20Language | Broadcast Markup Language, or BML, is an XML-based standard developed by Japan's Association of Radio Industries and Businesses as a data broadcasting specification for digital television broadcasting. It is a data-transmission service allowing text to be displayed on a 1seg TV screen.
The text contains news, sports, ... |
https://en.wikipedia.org/wiki/Unimate | Unimate was the first industrial robot,
which worked on a General Motors assembly line at the Inland Fisher Guide Plant in Ewing Township, New Jersey, in 1961.
It was invented by George Devol in the 1950s using his original patent filed in 1954 and granted in 1961 (). The patent begins:
The present invention relates t... |
https://en.wikipedia.org/wiki/Logical%20truth | Logical truth is one of the most fundamental concepts in logic. Broadly speaking, a logical truth is a statement which is true regardless of the truth or falsity of its constituent propositions. In other words, a logical truth is a statement which is not only true, but one which is true under all interpretations of its... |
https://en.wikipedia.org/wiki/Syndetic%20set | In mathematics, a syndetic set is a subset of the natural numbers having the property of "bounded gaps": that the sizes of the gaps in the sequence of natural numbers is bounded.
Definition
A set is called syndetic if for some finite subset of
where . Thus syndetic sets have "bounded gaps"; for a syndetic set , th... |
https://en.wikipedia.org/wiki/Useful%20conversions%20and%20formulas%20for%20air%20dispersion%20modeling | Various governmental agencies involved with environmental protection and with occupational safety and health have promulgated regulations limiting the allowable concentrations of gaseous pollutants in the ambient air or in emissions to the ambient air. Such regulations involve a number of different expressions of conce... |
https://en.wikipedia.org/wiki/Parallel%20SCSI | Parallel SCSI (formally, SCSI Parallel Interface, or SPI) is the earliest of the interface implementations in the SCSI family. SPI is a parallel bus; there is one set of electrical connections stretching from one end of the SCSI bus to the other. A SCSI device attaches to the bus but does not interrupt it. Both ends ... |
https://en.wikipedia.org/wiki/The%20Music%20of%20the%20Primes | The Music of the Primes (British subtitle: Why an Unsolved Problem in Mathematics Matters; American subtitle: Searching to Solve the Greatest Mystery in Mathematics) is a 2003 book by Marcus du Sautoy, a professor in mathematics at the University of Oxford, on the history of prime number theory. In particular he examin... |
https://en.wikipedia.org/wiki/Course-of-values%20recursion | In computability theory, course-of-values recursion is a technique for defining number-theoretic functions by recursion. In a definition of a function f by course-of-values recursion, the value of f(n) is computed from the sequence .
The fact that such definitions can be converted into definitions using a simpler for... |
https://en.wikipedia.org/wiki/161%20%28number%29 | 161 (one hundred [and] sixty-one) is the natural number following 160 and preceding 162.
In mathematics
161 is the sum of five consecutive prime numbers: 23, 29, 31, 37, and 41
161 is a hexagonal pyramidal number.
161 is a semiprime. Since its prime factors 7 and 23 are both Gaussian primes, 161 is a Blum integer.
... |
https://en.wikipedia.org/wiki/Madge%20Networks | Madge Networks NV was a networking technology company founded by Robert Madge, and is best known for its work with Token Ring. It was a global leader and pioneer of high-speed networking solutions in the mid-1990s, and also made significant contributions to technologies such as Asynchronous Transfer Mode (ATM) and Ethe... |
https://en.wikipedia.org/wiki/Stringent%20response | The stringent response, also called stringent control, is a stress response of bacteria and plant chloroplasts in reaction to amino-acid starvation, fatty acid limitation, iron limitation, heat shock and other stress conditions. The stringent response is signaled by the alarmone (p)ppGpp, and modulates transcription o... |
https://en.wikipedia.org/wiki/CPU%20modes | CPU modes (also called processor modes, CPU states, CPU privilege levels and other names) are operating modes for the central processing unit of some computer architectures that place restrictions on the type and scope of operations that can be performed by certain processes being run by the CPU. This design allows the... |
https://en.wikipedia.org/wiki/Boot%20ROM | The boot ROM is a type of ROM that is used for booting a computer system. There are two types: a mask boot ROM that cannot be changed afterwards and a boot EEPROM, which can contain an UEFI implementation.
Purpose
Upon power up, hardware usually starts uninitialized. To continue booting, the system may need to read a... |
https://en.wikipedia.org/wiki/Oldest%20people | This is a list of tables of the oldest people in the world in ordinal ranks. To avoid including false or unconfirmed claims of old age, names here are restricted to those people whose ages have been validated by an international body dealing in longevity research, such as the Gerontology Research Group (GRG) or Guinnes... |
https://en.wikipedia.org/wiki/Argus%20%E2%80%93%20Audit%20Record%20Generation%20and%20Utilization%20System | Argus – the Audit Record Generation and Utilization System is the first implementation of network flow monitoring, and is an ongoing open source network flow monitor project. Started by Carter Bullard in 1984 at Georgia Tech, and developed for cyber security at Carnegie Mellon University in the early 1990s, Argus has ... |
https://en.wikipedia.org/wiki/The%20Sacred%20Armour%20of%20Antiriad | The Sacred Armour of Antiriad is an action-adventure game published by Palace Software in 1986 for Amstrad CPC, Commodore 64, DOS, TRS-80, and ZX Spectrum. In North America, the game was published by Epyx as Rad Warrior. The original game came with a 16-page comic book created by graphic artist Daniel Malone. The game ... |
https://en.wikipedia.org/wiki/Network%20Computer%20Reference%20Profile | Network Computer Reference Profile (NC reference profile, NCRP) was a specification for a network computer put forward by Oracle Corporation, endorsed by Sun Microsystems, IBM, Apple Computer, and Netscape, and finalized in 1996.
NC1
The first version of this specification was known as the NC1 Reference Profile.
NCR... |
https://en.wikipedia.org/wiki/Enclosure%20Services%20Interface | The Enclosure Services Interface (ESI) is a computer protocol used in SCSI enclosures. This is part of a chain of connections that allows a host computer to communicate with the enclosure to access its power, cooling, and other non-data characteristics. This overall approach is called SCSI attached enclosure services... |
https://en.wikipedia.org/wiki/Alt%20code | On personal computers with numeric keypads that use Microsoft operating systems, such as Windows, many characters that do not have a dedicated key combination on the keyboard may nevertheless be entered using the Alt code (the Alt numpad input method). This is done by pressing and holding the key, then typing a number... |
https://en.wikipedia.org/wiki/AMPRNet | The AMPRNet (AMateur Packet Radio Network) or Network 44 is used in amateur radio for packet radio and digital communications between computer networks managed by amateur radio operators. Like other amateur radio frequency allocations, an IP range of was provided in 1981 for Amateur Radio Digital Communications (a ge... |
https://en.wikipedia.org/wiki/Carrier-to-noise%20ratio | In telecommunications, the carrier-to-noise ratio, often written CNR or C/N, is the signal-to-noise ratio (SNR) of a modulated signal. The term is used to distinguish the CNR of the radio frequency passband signal from the SNR of an analog base band message signal after demodulation. For example, with FM radio, the str... |
https://en.wikipedia.org/wiki/Piecewise%20syndetic%20set | In mathematics, piecewise syndeticity is a notion of largeness of subsets of the natural numbers.
A set is called piecewise syndetic if there exists a finite subset G of such that for every finite subset F of there exists an such that
where . Equivalently, S is piecewise syndetic if there is a constant b such tha... |
https://en.wikipedia.org/wiki/Richard%20Klein%20%28paleoanthropologist%29 | Richard G. Klein (born April 11, 1941) is a Professor of Biology and Anthropology at Stanford University. He is the Anne T. and Robert M. Bass Professor in the School of Humanities and Sciences. He earned his PhD at the University of Chicago in 1966, and was elected to the National Academy of Sciences in April 2003. Hi... |
https://en.wikipedia.org/wiki/Thick%20set | In mathematics, a thick set is a set of integers that contains arbitrarily long intervals. That is, given a thick set , for every , there is some such that .
Examples
Trivially is a thick set. Other well-known sets that are thick include non-primes and non-squares. Thick sets can also be sparse, for example:
Gene... |
https://en.wikipedia.org/wiki/WDC%2065C21 | The W65C21S is a very flexible Peripheral Interface Adapter (PIA) for use with WDC’s 65xx and other 8-bit microprocessor families. It is produced by Western Design Center (WDC).
The W65C21S provides programmed microprocessor control of up to two peripheral devices (Port A and Port B). Peripheral device control is acco... |
https://en.wikipedia.org/wiki/Vop%C4%9Bnka%27s%20principle | In mathematics, Vopěnka's principle is a large cardinal axiom.
The intuition behind the axiom is that the set-theoretical universe is so large that in every proper class, some members are similar to others, with this similarity formalized through elementary embeddings.
Vopěnka's principle was first introduced by Petr... |
https://en.wikipedia.org/wiki/WDC%2065C22 | The W65C22 versatile interface adapter (VIA) is an input/output device for use with the 65xx series microprocessor family.
Overview
Designed by the Western Design Center, the W65C22 is made in two versions, both of which are rated for 14 megahertz operation, and available in DIP-40 or PLCC-44 packages.
W65C22N: This... |
https://en.wikipedia.org/wiki/WDC%2065C51 | The CMOS W65C51 Asynchronous Communications Interface Adapter (ACIA) provides an easily implemented, program controlled interface between microprocessor based systems and serial communication data sets and modems. It is produced by Western Design Center (WDC) and is a drop-in replacement for the MOS Technology 6551.
T... |
https://en.wikipedia.org/wiki/Mercator%20series | In mathematics, the Mercator series or Newton–Mercator series is the Taylor series for the natural logarithm:
In summation notation,
The series converges to the natural logarithm (shifted by 1) whenever .
History
The series was discovered independently by Johannes Hudde and Isaac Newton. It was first published by N... |
https://en.wikipedia.org/wiki/Sun-2 | The Sun-2 series of UNIX workstations and servers was launched by Sun Microsystems in November 1983. As the name suggests, the Sun-2 represented the second generation of Sun systems, superseding the original Sun-1 series. The Sun-2 series used a 10 MHz Motorola 68010 microprocessor with a proprietary Sun-2 Memory Manag... |
https://en.wikipedia.org/wiki/RIAA%20equalization | RIAA equalization is a specification for the recording and playback of phonograph records, established by the Recording Industry Association of America (RIAA). The purposes of the equalization are to permit greater recording times (by decreasing the mean width of each groove), to improve sound quality, and to reduce th... |
https://en.wikipedia.org/wiki/MicroMUSE | MicroMUSE is a MUD started in 1990. It is based on the TinyMUSE system, which allows members to interact in a virtual environment called Cyberion City, as well as to create objects and modify their environment. MicroMUSE was conceived as an environment to allow people in far-flung locations to interact with each other... |
https://en.wikipedia.org/wiki/Max%20q | The max q, or maximum dynamic pressure, condition is the point when an aerospace vehicle's atmospheric flight reaches the maximum difference between the fluid dynamics total pressure and the ambient static pressure. For an airplane, this occurs at the maximum speed at minimum altitude corner of the flight envelope. For... |
https://en.wikipedia.org/wiki/IP%20set | In mathematics, an IP set is a set of natural numbers which contains all finite sums of some infinite set.
The finite sums of a set D of natural numbers are all those numbers that can be obtained by adding up the elements of some finite nonempty subset of D.
The set of all finite sums over D is often denoted as FS(D).... |
https://en.wikipedia.org/wiki/Partition%20regularity | In combinatorics, a branch of mathematics, partition regularity is one notion of largeness for a collection of sets.
Given a set , a collection of subsets is called partition regular if every set A in the collection has the property that, no matter how A is partitioned into finitely many subsets, at least one of the... |
https://en.wikipedia.org/wiki/Luminescent%20bacteria | Luminescent bacteria emit light as the result of a chemical reaction during which chemical energy is converted to light energy. Luminescent bacteria exist as symbiotic organisms carried within a larger organism, such as many deep sea organisms, including the Lantern Fish, the Angler fish, certain jellyfish, certain cla... |
https://en.wikipedia.org/wiki/Grigore%20Moisil | Grigore Constantin Moisil (; 10 January 1906 – 21 May 1973) was a Romanian mathematician, computer pioneer, and titular member of the Romanian Academy. His research was mainly in the fields of mathematical logic (Łukasiewicz–Moisil algebra), algebraic logic, MV-algebra, and differential equations. He is viewed as the f... |
https://en.wikipedia.org/wiki/Power-on%20reset | A power-on reset (PoR, POR) generator is a microcontroller or microprocessor peripheral that generates a reset signal when power is applied to the device. It ensures that the device starts operating in a known state.
PoR generator
In VLSI devices, the power-on reset (PoR) is an electronic device incorporated into the... |
https://en.wikipedia.org/wiki/Logarithmic%20growth | In mathematics, logarithmic growth describes a phenomenon whose size or cost can be described as a logarithm function of some input. e.g. y = C log (x). Any logarithm base can be used, since one can be converted to another by multiplying by a fixed constant. Logarithmic growth is the inverse of exponential growth and i... |
https://en.wikipedia.org/wiki/Biogenic%20silica | Biogenic silica (bSi), also referred to as opal, biogenic opal, or amorphous opaline silica, forms one of the most widespread biogenic minerals. For example, microscopic particles of silica called phytoliths can be found in grasses and other plants.
Silica is an amorphous metalloid oxide formed by complex inorganic po... |
https://en.wikipedia.org/wiki/Sun-1 | Sun-1 was the first generation of UNIX computer workstations and servers produced by Sun Microsystems, launched in May 1982. These were based on a CPU board designed by Andy Bechtolsheim while he was a graduate student at Stanford University and funded by DARPA. The Sun-1 systems ran SunOS 0.9, a port of UniSoft's UniP... |
https://en.wikipedia.org/wiki/Dynamic%20synchronous%20transfer%20mode | Dynamic synchronous transfer mode (DTM) is an optical networking technology standardized by the European Telecommunications Standards Institute (ETSI) in 2001 beginning with specification ETSI ES 201 803-1. DTM is a time-division multiplexing and a circuit-switching network technology that combines switching and tran... |
https://en.wikipedia.org/wiki/Multiscale%20modeling | Multiscale modeling or multiscale mathematics is the field of solving problems that have important features at multiple scales of time and/or space. Important problems include multiscale modeling of fluids, solids, polymers, proteins, nucleic acids as well as various physical and chemical phenomena (like adsorption, c... |
https://en.wikipedia.org/wiki/Quotient%20category | In mathematics, a quotient category is a category obtained from another category by identifying sets of morphisms. Formally, it is a quotient object in the category of (locally small) categories, analogous to a quotient group or quotient space, but in the categorical setting.
Definition
Let C be a category. A congrue... |
https://en.wikipedia.org/wiki/Belarusian%20State%20Technological%20University | Belarusian State Technological University (; ) is a university in Minsk, Belarus specialized in engineering and technology. It was established in Gomel in 1930 as the Forestry Institute. In 1941, it was evacuated to Sverdlovsk, now Yekaterinburg. Returned to Gomel in 1944, but in 1946 relocated to Minsk as the Belarus... |
https://en.wikipedia.org/wiki/Transactional%20memory | In computer science and engineering, transactional memory attempts to simplify concurrent programming by allowing a group of load and store instructions to execute in an atomic way. It is a concurrency control mechanism analogous to database transactions for controlling access to shared memory in concurrent computing.
... |
https://en.wikipedia.org/wiki/Gene%20expression%20profiling | In the field of molecular biology, gene expression profiling is the measurement of the activity (the expression) of thousands of genes at once, to create a global picture of cellular function. These profiles can, for example, distinguish between cells that are actively dividing, or show how the cells react to a particu... |
https://en.wikipedia.org/wiki/Immunogenicity | Immunogenicity is the ability of a foreign substance, such as an antigen, to provoke an immune response in the body of a human or other animal. It may be wanted or unwanted:
Wanted immunogenicity typically relates to vaccines, where the injection of an antigen (the vaccine) provokes an immune response against the pat... |
https://en.wikipedia.org/wiki/Viral%20eukaryogenesis | Viral eukaryogenesis is the hypothesis that the cell nucleus of eukaryotic life forms evolved from a large DNA virus in a form of endosymbiosis within a methanogenic archaeon or a bacterium. The virus later evolved into the eukaryotic nucleus by acquiring genes from the host genome and eventually usurping its role. The... |
https://en.wikipedia.org/wiki/Edinburgh%20Parallel%20Computing%20Centre | EPCC, formerly the Edinburgh Parallel Computing Centre, is a supercomputing centre based at the University of Edinburgh. Since its foundation in 1990, its stated mission has been to accelerate the effective exploitation of novel computing throughout industry, academia and commerce.
The University has supported high pe... |
https://en.wikipedia.org/wiki/F-score | In statistical analysis of binary classification, the F-score or F-measure is a measure of a test's accuracy. It is calculated from the precision and recall of the test, where the precision is the number of true positive results divided by the number of all positive results, including those not identified correctly, an... |
https://en.wikipedia.org/wiki/Pseudomonas%20virus%20phi6 | Φ6 (Phi 6) is the best-studied bacteriophage of the virus family Cystoviridae. It infects Pseudomonas bacteria (typically plant-pathogenic P. syringae). It has a three-part, segmented, double-stranded RNA genome, totalling ~13.5 kb in length. Φ6 and its relatives have a lipid membrane around their nucleocapsid, a rare ... |
https://en.wikipedia.org/wiki/Normalization%20%28image%20processing%29 | In image processing, normalization is a process that changes the range of pixel intensity values. Applications include photographs with poor contrast due to glare, for example. Normalization is sometimes called contrast stretching or histogram stretching. In more general fields of data processing, such as digital signa... |
https://en.wikipedia.org/wiki/Systematic%20reconnaissance%20flight | Systematic Reconnaissance Flight (SRF) is a scientific method in wildlife survey for assessing the distribution and abundance of wild animals. It is widely used in Africa, Australia and North America for assessment of plains and woodland wildlife and other species.
The method involves systematic or random flight lines... |
https://en.wikipedia.org/wiki/Frans%C3%A9n%E2%80%93Robinson%20constant | The Fransén–Robinson constant, sometimes denoted F, is the mathematical constant that represents the area between the graph of the reciprocal Gamma function, , and the positive x axis. That is,
Other expressions
The Fransén–Robinson constant has numerical value , and continued fraction representation [2; 1, 4, 4, 1, ... |
https://en.wikipedia.org/wiki/Packet%20crafting | Packet crafting is a technique that allows network administrators to probe firewall rule-sets and find entry points into a targeted system or network. This is done by manually generating packets to test network devices and behaviour, instead of using existing network traffic. Testing may target the firewall, IDS, TCP/... |
https://en.wikipedia.org/wiki/Coordinative%20definition | A coordinative definition is a postulate which assigns a partial meaning to the theoretical terms of a scientific theory by correlating the mathematical objects of the pure or formal/syntactical aspects of a theory with physical objects in the world. The idea was formulated by the logical positivists and arises out of... |
https://en.wikipedia.org/wiki/KYK-13 | The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check word. The KYK-13 is battery powered and uses the DS-102 protocol for key transfer. Its National Stock Number is 5810-01-0... |
https://en.wikipedia.org/wiki/Password%20notification%20email | Password notification email is a common password recovery technique used by websites. If a user forgets their password then a password notification email is sent containing enough information for the user to access their account again. This method of password retrieval relies on the assumption that only the legitimate ... |
https://en.wikipedia.org/wiki/Filamentation | Filamentation is the anomalous growth of certain bacteria, such as Escherichia coli, in which cells continue to elongate but do not divide (no septa formation). The cells that result from elongation without division have multiple chromosomal copies.
In the absence of antibiotics or other stressors, filamentation occur... |
https://en.wikipedia.org/wiki/Charge-transfer%20amplifier | The charge-transfer amplifier (CTA) is an electronic amplifier circuit. Also known as transconveyance amplifiers, CTAs amplify electronic signals by dynamically conveying charge between capacitive nodes in proportion to the size of a differential input voltage. By appropriately selecting the relative node capacitances,... |
https://en.wikipedia.org/wiki/Sicherman%20dice | Sicherman dice are a pair of 6-sided dice with non-standard numbers–one with the sides 1, 2, 2, 3, 3, 4 and the other with the sides 1, 3, 4, 5, 6, 8. They are notable as the only pair of 6-sided dice that are not normal dice , bear only positive integers, and have the same probability distribution for the sum as nor... |
https://en.wikipedia.org/wiki/Reliable%20Server%20Pooling | Reliable Server Pooling (RSerPool) is a computer protocol framework for management of and access to multiple, coordinated (pooled) servers. RSerPool is an IETF standard, which has been developed by the IETF RSerPool Working Group and documented in RFC 5351, RFC 5352, RFC 5353, RFC 5354, RFC 5355 and RFC 5356.
Introduc... |
https://en.wikipedia.org/wiki/Aggregate%20Server%20Access%20Protocol | As a communications protocol the Aggregate Server Access Protocol is used by the Reliable server pooling (RSerPool) framework for the communication between
Pool Elements and Pool Registrars (Application Layer)
Pool Users and Pool Registrars (Application Layer)
Pool Users and Pool Elements (Session Layer)
Standards ... |
https://en.wikipedia.org/wiki/Endpoint%20Handlespace%20Redundancy%20Protocol | The Endpoint Handlespace Redundancy Protocol is used by the Reliable server pooling (RSerPool) framework for the communication between Pool Registrars to maintain and synchronize a handlespace.
It is allocated on the application layer like the Aggregate Server Access Protocol. It is a work in progress within the IETF... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.