source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Hin%20recombinase | Hin recombinase is a 21kD protein composed of 198 amino acids that is found in the bacteria Salmonella. Hin belongs to the serine recombinase family (B2) of DNA invertases in which it relies on the active site serine to initiate DNA cleavage and recombination. The related protein, gamma-delta resolvase shares high simi... |
https://en.wikipedia.org/wiki/Sentry%202020 | Sentry 2020 is a commercial software program for "transparent" disk encryption for PC and PDA. It has two compatible versions, one for desktop Windows XP and one for Windows Mobile 6.5.3, which allows using the same encrypted volume on both platforms.
The latest versions have been released in February 2011. Windows Vi... |
https://en.wikipedia.org/wiki/Bucket-brigade%20device | A bucket brigade or bucket-brigade device (BBD) is a discrete-time analogue delay line, developed in 1969 by F. Sangster and K. Teer of the Philips Research Labs in the Netherlands. It consists of a series of capacitance sections C0 to Cn. The stored analogue signal is moved along the line of capacitors, one step at ea... |
https://en.wikipedia.org/wiki/Geometry%20of%20interaction | The Geometry of Interaction (GoI) was introduced by Jean-Yves Girard shortly after his work on linear logic. In linear logic, proofs can be seen as various kinds of networks as opposed to the flat tree structures of sequent calculus. To distinguish the real proof nets from all the possible networks, Girard devised a cr... |
https://en.wikipedia.org/wiki/Electroluminescent%20wire | Electroluminescent wire (often abbreviated as EL wire) is a thin copper wire coated in a phosphor that produces light through electroluminescence when an alternating current is applied to it. It can be used in a wide variety of applications—vehicle and structure decoration, safety and emergency lighting, toys, clothin... |
https://en.wikipedia.org/wiki/VMware%20Fusion | VMware Fusion is a software hypervisor developed by VMware for macOS systems. It allows Macs with Intel or the Apple M series of chips to run virtual machines with guest operating systems, such as Microsoft Windows, Linux, or macOS, within the host macOS operating system.
Overview
VMware Fusion can virtualize a multit... |
https://en.wikipedia.org/wiki/Rippling | In computer science, more particularly in automated theorem proving, rippling refers to a group of meta-level heuristics, developed primarily in the Mathematical Reasoning Group in the School of Informatics at the University of Edinburgh, and most commonly used to guide inductive proofs in automated theorem proving sys... |
https://en.wikipedia.org/wiki/Antistatic%20device | An antistatic device is any device that reduces, dampens, or otherwise inhibits electrostatic discharge, or ESD, which is the buildup or discharge of static electricity. ESD can damage electrical components such as computer hard drives, and even ignite flammable liquids and gases.
Many methods exist for neutralizing s... |
https://en.wikipedia.org/wiki/OMDoc | OMDoc (Open Mathematical Documents) is a semantic markup format for mathematical documents. While MathML only covers mathematical formulae and the related OpenMath standard only supports formulae and “content dictionaries” containing definitions of the symbols used in formulae, OMDoc covers the whole range of written m... |
https://en.wikipedia.org/wiki/After%20the%20War%20%28video%20game%29 | After The War is a side-scrolling beat 'em up video game published in 1989 by Dinamic Software, in which the player must navigate through a hostile post-apocalyptic city. Although the name of the city is not mentioned in the game itself, both official promotional and unreleased artwork by Luis Royo and Alfonso Azpiri s... |
https://en.wikipedia.org/wiki/Genesi | Genesi is an international group of technology and consulting companies in the United States, Mexico and Germany. It is most widely known for designing and manufacturing ARM architecture and Power ISA-based computing devices. The Genesi Group consists of Genesi USA Inc., Genesi Americas LLC, Genesi Europe UG, Red Efika... |
https://en.wikipedia.org/wiki/Bogdanov%E2%80%93Takens%20bifurcation | In bifurcation theory, a field within mathematics, a Bogdanov–Takens bifurcation is a well-studied example of a bifurcation with co-dimension two, meaning that two parameters must be varied for the bifurcation to occur. It is named after Rifkat Bogdanov and Floris Takens, who independently and simultaneously described ... |
https://en.wikipedia.org/wiki/Chain%20rule%20for%20Kolmogorov%20complexity | The chain rule for Kolmogorov complexity is an analogue of the chain rule for information entropy, which states:
That is, the combined randomness of two sequences X and Y is the sum of the randomness of X plus whatever randomness is left in Y once we know X.
This follows immediately from the definitions of conditional... |
https://en.wikipedia.org/wiki/Pacific%20Symposium%20on%20Biocomputing | The Pacific Symposium on Biocomputing (PSB) is an annual multidisciplinary scientific meeting co-founded in 1996 by Dr. Teri Klein, Dr. Lawrence Hunter and Sharon Surles. The conference is to presentation and discuss research in the theory and application of computational methods for biology. Papers and presentations ... |
https://en.wikipedia.org/wiki/Years%20of%20potential%20life%20lost | Years of potential life lost (YPLL) or potential years of life lost (PYLL) is an estimate of the average years a person would have lived if they had not died prematurely. It is, therefore, a measure of premature mortality. As an alternative to death rates, it is a method that gives more weight to deaths that occur amon... |
https://en.wikipedia.org/wiki/Performance%20prediction | In computer science, performance prediction means to estimate the execution time or other performance factors (such as cache misses) of a program on a given computer. It is being widely used for computer architects to evaluate new computer designs, for compiler writers to explore new optimizations, and also for advanc... |
https://en.wikipedia.org/wiki/Micro%20Electronics%2C%20Inc. | Micro Electronics, Inc. (MEI) is an American privately owned corporation headquartered in Hilliard, Ohio. Founded in 1979 by John Baker, it serves as the parent company of the computer retailer Micro Center, its online division Micro Center Online, and its brand iPSG, which houses PowerSpec PC, WinBook, and Inland(incl... |
https://en.wikipedia.org/wiki/Mishnat%20ha-Middot | The Mishnat ha-Middot (, 'Treatise of Measures') is the earliest known Hebrew treatise on geometry, composed of 49 mishnayot in six chapters. Scholars have dated the work to either the Mishnaic period or the early Islamic era.
History
Date of composition
Moritz Steinschneider dated the Mishnat ha-Middot to between 8... |
https://en.wikipedia.org/wiki/Nuclear%20Energy%20Institute | The Nuclear Energy Institute (NEI) is a nuclear industry trade association in the United States, based in Washington, D.C.
Synopsis
The Nuclear Energy Institute represents the nuclear technologies industry. NEI’s stated mission “is to promote the use and growth of nuclear energy through efficient operations and effe... |
https://en.wikipedia.org/wiki/Noise%2C%20vibration%2C%20and%20harshness | Noise, vibration, and harshness (NVH), also known as noise and vibration (N&V), is the study and modification of the noise and vibration characteristics of vehicles, particularly cars and trucks. While noise and vibration can be readily measured, harshness is a subjective quality, and is measured either via jury evalua... |
https://en.wikipedia.org/wiki/Self-certifying%20File%20System | In computing, Self-certifying File System (SFS) is a global and decentralized, distributed file system for Unix-like operating systems, while also providing transparent encryption of communications as well as authentication. It aims to be the universal distributed file system by providing uniform access to any availabl... |
https://en.wikipedia.org/wiki/Residual%20body | In lysosomal digestion, residual bodies are vesicles containing indigestible materials. Residual bodies are either secreted by the cell via exocytosis (this generally only occurs in macrophages), or they become lipofuscin granules that remain in the cytosol indefinitely. Longer-living cells like neurons and muscle cell... |
https://en.wikipedia.org/wiki/MSN%20WiFi%20Hotspots | MSN WiFi Hotspots, previously Windows Live WiFi Hotspot Locator, was a website that helped users to locate wireless Internet hotspots worldwide and view their positions on a map using Live Search Maps.
This service has been discontinued as of June 10, 2008.
Windows Live WiFi Center
Windows Live WiFi Center was part o... |
https://en.wikipedia.org/wiki/Apple%20File%20Exchange | Apple File Exchange (AFE) is a utility program for Apple Macintosh computers. It was included on the Apple "Tidbits" or "Install 2" disk in system versions 7.0 through 7.1. In System 7.5 (released in 1994), it was replaced by PC Exchange.
Apple File Exchange could read floppy disks from DOS/Windows and ProDOS (Apple I... |
https://en.wikipedia.org/wiki/Intra-frame%20coding | Intra-frame coding is a data compression technique used within a video frame, enabling smaller file sizes and lower bitrates, with little or no loss in quality. Since neighboring pixels within an image are often very similar, rather than storing each pixel independently, the frame image is divided into blocks and the t... |
https://en.wikipedia.org/wiki/System%20integration | System integration is defined in engineering as the process of bringing together the component sub-systems into one system (an aggregation of subsystems cooperating so that the system is able to deliver the overarching functionality) and ensuring that the subsystems function together as a system, and in information tec... |
https://en.wikipedia.org/wiki/Linux%20Mint | Linux Mint is a community-driven Linux distribution based on Ubuntu (which is in turn based on Debian), bundled with a variety of free and open-source applications. It can provide full out-of-the-box multimedia support for those who choose to include proprietary software such as multimedia codecs. Compared to Ubuntu, i... |
https://en.wikipedia.org/wiki/Methane%20reformer | A methane reformer is a device based on steam reforming, autothermal reforming or partial oxidation and is a type of chemical synthesis which can produce pure hydrogen gas from methane using a catalyst. There are multiple types of reformers in development but the most common in industry are autothermal reforming (ATR) ... |
https://en.wikipedia.org/wiki/Ortolani%20test | The Ortolani test is part of the physical examination for developmental dysplasia of the hip, along with the Barlow maneuver. Specifically, the Ortolani test is positive when a posterior dislocation of the hip is reducible with this maneuver. This is part of the standard infant exam performed preferably in early infanc... |
https://en.wikipedia.org/wiki/Stegosaurus%20in%20popular%20culture | Stegosaurus is one of the most recognizable types among cultural depictions of dinosaurs. It has been depicted on film, in cartoons, comics, as children's toys, as sculpture, and even was declared the state dinosaur of Colorado in 1982. Stegosaurus is a subject for inclusion in dinosaur toy and scale model lines, such ... |
https://en.wikipedia.org/wiki/Flood-meadow | A flood-meadow (or floodmeadow) is an area of grassland or pasture beside a river, subject to seasonal flooding. Flood-meadows are distinct from water-meadows in that the latter are artificially created and maintained, with flooding controlled on a seasonal and even daily basis.
Examples
Austria:
Hohenau an der Mar... |
https://en.wikipedia.org/wiki/T-function | In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as , or in simple words an update function in which each bit of the state is updated by a linear combination of the same bit and a function of a subset of its less significant bits. If every single le... |
https://en.wikipedia.org/wiki/Enrolled%20actuary | An enrolled actuary is an actuary enrolled by the Joint Board for the Enrollment of Actuaries under the Employee Retirement Income Security Act of 1974 (ERISA). Enrolled actuaries, under regulations of the Department of the Treasury and the Department of Labor, perform a variety of tasks with respect to pension plans i... |
https://en.wikipedia.org/wiki/Joint%20Board%20for%20the%20Enrollment%20of%20Actuaries | The Joint Board for the Enrollment of Actuaries licenses actuaries to perform a variety of actuarial tasks required of pension plans in the United States by the Employee Retirement Income Security Act of 1974 (ERISA). The Joint Board consists of five members – three appointed by the Secretary of the Treasury and two by... |
https://en.wikipedia.org/wiki/Arens%E2%80%93Fort%20space | In mathematics, the Arens–Fort space is a special example in the theory of topological spaces, named for Richard Friederich Arens and M. K. Fort, Jr.
Definition
The Arens–Fort space is the topological space where is the set of ordered pairs of non-negative integers A subset is open, that is, belongs to if and on... |
https://en.wikipedia.org/wiki/David%20Gries | David Gries (born April 26, 1939 in Flushing, Queens, New York) is an American computer scientist at Cornell University, United States mainly known for his books The Science of Programming (1981) and A Logical Approach to Discrete Math (1993, with Fred B. Schneider).
He was Associate Dean for Undergraduate Programs at... |
https://en.wikipedia.org/wiki/ATM25 | ATM25 is an ATM (Asynchronous Transfer Mode) version wherein data is transferred at 25.6 Mbit/s over Category 3 cable. ATM25 has no particular distinctions from other ATM versions. However, ATM25 chipsets are inexpensive in comparison to faster ATM chipsets, having the result of making ATM technology available for smal... |
https://en.wikipedia.org/wiki/Kaspersky%20Anti-Virus | Kaspersky Anti-Virus ( (Antivirus Kasperskogo); formerly known as AntiViral Toolkit Pro; often referred to as KAV) is a proprietary antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and macOS, although a version f... |
https://en.wikipedia.org/wiki/Comment%20%28computer%20programming%29 | In computer programming, a comment is a programmer-readable explanation or annotation in the source code of a computer program. They are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters. The syntax of comments in various programmi... |
https://en.wikipedia.org/wiki/Akmon | An akmon is a multi-ton concrete block used for breakwater and seawall armouring. It was originally designed in the Netherlands in the 1960s, as an improvement on the tetrapod.
References
External links
Official site (Japanese)
Wave-dissipating concrete blocks |
https://en.wikipedia.org/wiki/EXIT%20chart | An extrinsic information transfer chart, commonly called an EXIT chart, is a technique to aid the construction of good iteratively-decoded error-correcting codes (in particular low-density parity-check (LDPC) codes and Turbo codes).
EXIT charts were developed by Stephan ten Brink, building on the concept of extrinsic ... |
https://en.wikipedia.org/wiki/Caddy%20%28hardware%29 | In computer hardware, a caddy is a container used to hold some medium, such as a CD-ROM. If the medium is a hard disk drive, the caddy is also referred to as a disk enclosure. Its functionality is similar to that of the 3.5" floppy disk's jacket.
The purpose of a disk caddy is to protect the disk from damage when han... |
https://en.wikipedia.org/wiki/Comparison%20of%20disk%20encryption%20software | This is a technical feature comparison of different disk encryption software.
Background information
Operating systems
Features
Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for d... |
https://en.wikipedia.org/wiki/Crossband%20operation | Crossband (cross-band, cross band) operation is a method of telecommunication in which a radio station receives signals on one frequency and simultaneously transmits on another for the purpose of full duplex communication or signal relay.
To avoid interference within the equipment at the station, the two frequencies u... |
https://en.wikipedia.org/wiki/Navajo%20Lake | Navajo Lake is a reservoir located in San Juan County and Rio Arriba County in northwestern New Mexico, in the southwestern United States. Portions of the reservoir extend into Archuleta County in southern Colorado. The lake is part of the Colorado River Storage Project, which here manages the upper reaches of the Sa... |
https://en.wikipedia.org/wiki/Key%20wrap | In cryptography, key wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as protecting keys while in untrusted storage or transmitting keys over untrusted communications networks. The... |
https://en.wikipedia.org/wiki/Openmoko | Openmoko is a discontinued project to create a family of open source mobile phones, including the hardware specification, the operating system (Openmoko Linux), and actual smartphone development implementation like the Neo 1973 and Neo FreeRunner. The whole project was sponsored by Openmoko Inc.
The first sub-project ... |
https://en.wikipedia.org/wiki/Key%20encapsulation%20mechanism | In cryptographic protocols, a key encapsulation mechanism (KEM) or key encapsulation method is used to secure symmetric key material for transmission using asymmetric (public-key) algorithms. It is commonly used in hybrid cryptosystems. In practice, public key systems are clumsy to use in transmitting long messages. In... |
https://en.wikipedia.org/wiki/Gravitational%20biology | Gravitational biology is the study of the effects gravity has on living organisms. Throughout the history of the Earth life has evolved to survive changing conditions, such as changes in the climate and habitat. However, one constant factor in evolution since life first began on Earth is the force of gravity. As a cons... |
https://en.wikipedia.org/wiki/List%20of%20therapeutic%20monoclonal%20antibodies | Therapeutic, diagnostic and preventive monoclonal antibodies are clones of a single parent cell. When used as drugs, the International Nonproprietary Names (INNs) end in -mab. The remaining syllables of the INNs, as well as the column Source, are explained in Nomenclature of monoclonal antibodies.
The abbreviations in... |
https://en.wikipedia.org/wiki/Procyanidin | Procyanidins are members of the proanthocyanidin (or condensed tannins) class of flavonoids. They are oligomeric compounds, formed from catechin and epicatechin molecules. They yield cyanidin when depolymerized under oxidative conditions.
See the box below entitled "Types of procyanidins" for links to articles on the ... |
https://en.wikipedia.org/wiki/Video%20wall | A video wall is a special multi-monitor setup that consists of multiple computer monitors, video projectors, or television sets tiled together contiguously or overlapped in order to form one large screen. Typical display technologies include LCD panels, Direct View LED arrays, blended projection screens, Laser Phospho... |
https://en.wikipedia.org/wiki/Plasma-enhanced%20chemical%20vapor%20deposition | Plasma-enhanced chemical vapor deposition (PECVD) is a chemical vapor deposition process used to deposit thin films from a gas state (vapor) to a solid state on a substrate. Chemical reactions are involved in the process, which occur after creation of a plasma of the reacting gases. The plasma is generally created by r... |
https://en.wikipedia.org/wiki/ExcelStor%20Technology | ExcelStor Technology () was established in 2000 as a small hard disk drive manufacturer and has evolved into a contract manufacturer and a system integrator. ExcelStor bought the bankrupt Conner Technology PLC, its products and factory. It has a manufacturing plant in Shenzhen, China, and an R&D center in Longmont, Col... |
https://en.wikipedia.org/wiki/ISO%206438 | ISO 6438:1983, Documentation — African coded character set for bibliographic information interchange, is an ISO standard for an 8-bit character encoding for African languages. Developed separately from the African reference alphabet but apparently based on the same data sets, it has had little use; its forms are retain... |
https://en.wikipedia.org/wiki/Entropic%20security | Entropic security is a security definition used in the field of cryptography. Modern encryption schemes are generally required to protect communications even when the attacker has substantial information about the messages being encrypted. For example, even if an attacker knows that an intercepted ciphertext encrypts... |
https://en.wikipedia.org/wiki/Position%20sensitive%20device | A position sensitive device and/or position sensitive detector (PSD) is an optical position sensor (OPS) that can measure a position of a light spot in one or two-dimensions on a sensor surface.
Principles
PSDs can be divided into two classes which work according to different principles: In the first class, the senso... |
https://en.wikipedia.org/wiki/Straw%20wine | Straw wine, or raisin wine, is a wine made from grapes that have been dried off the vine to concentrate their juice. Under the classic method, after a careful hand harvest, selected bunches of ripe grapes will be laid out on mats in full sun. (Originally the mats were made of straw, but these days the plastic nets for ... |
https://en.wikipedia.org/wiki/Butasan | (also known as Mr. Pig and Pig and Bombers) is a arcade video game developed by NMK and Jaleco and released in 1987. It was ported to the ZX Spectrum, Commodore 64, MSX, and Amstrad CPC by U.S. Gold as Psycho Pigs U.X.B.
Gameplay
The player controls a pig and the aim of the game is to blow up other pigs by throwing b... |
https://en.wikipedia.org/wiki/Single-instance%20storage | Single-instance storage (SIS) is a system's ability to take multiple copies of content and replace them by a single shared copy. It is a means to eliminate data duplication and to increase efficiency. SIS is frequently implemented in file systems, e-mail server software, data backup, and other storage-related computer... |
https://en.wikipedia.org/wiki/Paternal%20age%20effect | The paternal age effect is the statistical relationship between the father's age at conception and biological effects on the child. Such effects can relate to birthweight, congenital disorders, life expectancy and psychological outcomes. A 2017 review found that while severe health effects are associated with higher pa... |
https://en.wikipedia.org/wiki/List%20of%20medical%20roots%2C%20suffixes%20and%20prefixes | This is a used in medical terminology, their meanings, and their etymologies. Most of them are combining forms in Neo-Latin and hence international scientific vocabulary. There are a few general rules about how they combine. First, prefixes and suffixes, most of which are derived from ancient Greek or classical Latin,... |
https://en.wikipedia.org/wiki/Varnish%20%28software%29 | Varnish is a reverse caching proxy used as HTTP accelerator for content-heavy dynamic web sites as well as APIs. In contrast to other web accelerators, such as Squid, which began life as a client-side cache, or Apache and nginx, which are primarily origin servers, Varnish was designed as an HTTP accelerator. Varnish is... |
https://en.wikipedia.org/wiki/Relative%20interior | In mathematics, the relative interior of a set is a refinement of the concept of the interior, which is often more useful when dealing with low-dimensional sets placed in higher-dimensional spaces.
Formally, the relative interior of a set (denoted ) is defined as its interior within the affine hull of In other words... |
https://en.wikipedia.org/wiki/Habeas%20data | Habeas data is a writ and constitutional remedy available in certain nations. The literal translation from Latin of habeas data is "[we command] you have the data," or "you [the data subject] have the data." The remedy varies from country to country, but in general, it is designed to protect, by means of an individual ... |
https://en.wikipedia.org/wiki/Elongatedness | In image processing, elongatedness for a region is the ratio between the length and width of the minimum bounding rectangle of the region. It is considered a feature of the region. It can be evaluated as the ratio between the area of the region to its thickness squared:
.
where the maximum thickness, , of a holeless ... |
https://en.wikipedia.org/wiki/Inshore%20coastal%20areas%20of%20the%20United%20Kingdom | The inshore coastal areas of the United Kingdom are 15 fixed stretches of coastline that are used in weather forecasting especially for wind-powered or small coastal craft. Each area is delimited by geographical features such as headlands, seaports or estuaries. When used as part of a broadcast weather forecast they ar... |
https://en.wikipedia.org/wiki/Trench%20shield | Trench shields (also called trench boxes or trench sheets) are steel or aluminum structures used to avoid cave-ins and protect utility workers while performing their duties within a trench. They are customarily constructed with sidewalls of varying thicknesses held apart by steel or aluminum spreaders. Spreaders can... |
https://en.wikipedia.org/wiki/Low%20voltage | In electrical engineering, low voltage is a relative term, the definition varying by context. Different definitions are used in electric power transmission and distribution, compared with electronics design. Electrical safety codes define "low voltage" circuits that are exempt from the protection required at higher vo... |
https://en.wikipedia.org/wiki/Computational%20logic | Computational logic is the use of logic to perform or reason about computation. It bears a similar relationship to computer science and engineering as mathematical logic bears to mathematics and as philosophical logic bears to philosophy. It is synonymous with "logic in computer science".
The term “computational logic... |
https://en.wikipedia.org/wiki/Polytetrahedron | Polytetrahedron is a term used for three distinct types of objects, all based
on the tetrahedron:
A uniform convex 4-polytope made up of 600 tetrahedral cells. It is more commonly known as a 600-cell or hexacosichoron. Other derivative 4-polytope are identified as polytetrahedra, where a qualifying prefix such as rect... |
https://en.wikipedia.org/wiki/Chinese%20telegraph%20code | The Chinese telegraph code, Chinese telegraphic code, or Chinese commercial code ( or ) is a four-digit decimal code (character encoding) for electrically telegraphing messages written with Chinese characters.
Encoding and decoding
A codebook is provided for encoding and decoding the Chinese telegraph code. It shows ... |
https://en.wikipedia.org/wiki/Parallel%20compression | Parallel compression, also known as New York compression, is a dynamic range compression technique used in sound recording and mixing. Parallel compression, a form of upward compression, is achieved by mixing an unprocessed 'dry', or lightly compressed signal with a heavily compressed version of the same signal. Rathe... |
https://en.wikipedia.org/wiki/List%20of%20online%20encyclopedias | This is a list of well-known online encyclopedias—i.e., encyclopedias accessible or formerly accessible on the Internet.
The largest online encyclopedias are general reference works, though there are also many specialized ones. Some online encyclopedias are editions of a print encyclopedia, such as Encyclopædia Britan... |
https://en.wikipedia.org/wiki/List%20of%20online%20databases | This is a list of online databases accessible via the Internet.
A
Abandoned & Little-Known Airfields
Academic OneFile
Acronym Finder
Aeiou Encyclopedia
Airiti Inc
Airliners.net
All Media Guide
Allgame (down)
Allmovie
Allmusic
American National Corpus
Animal Diversity Web
Animal Genome Size Database
Anim... |
https://en.wikipedia.org/wiki/List%20of%20online%20dictionaries | An online dictionary is a dictionary that is accessible via the Internet through a web browser. They can be made available in a number of ways: free, free with a paid subscription for extended or more professional content, or a paid-only service. Many dictionaries have been digitized from their print versions and are a... |
https://en.wikipedia.org/wiki/T-Square%20%28software%29 | T-Square is an early drafting program written by Peter Samson assisted by Alan Kotok and possibly Robert A. Saunders while they were students at the Massachusetts Institute of Technology and members of the Tech Model Railroad Club.
T-Square was written for the PDP-1 computer and its Type 30 precision CRT that Digital ... |
https://en.wikipedia.org/wiki/Current%20differencing%20transconductance%20amplifier | Current differencing transconductance amplifier (CDTA) is a new active circuit element.
Properties
The CDTA is not free from parasitic input capacitances and it can operate in a wide frequency range due to current-mode operation. Some voltage and current mode applications using this element have already been reported ... |
https://en.wikipedia.org/wiki/Pallet%20inverter | A pallet inverter or pile turner is a machine that is used to turn over full pallet loads of packages or products. The term pallet inverter is also used to cover machines that turn the palletised load through 90 degrees only.
Use
The reasons for needing to turn over a pallet are varied. The primary reason is have acc... |
https://en.wikipedia.org/wiki/SVI-728 | The SVI-728 is the first home computer from Spectravideo that complied fully with the MSX home computer specification. It was introduced in 1984. The design is virtually identical to that of the earlier SV-328, which did not comply fully with the MSX standard.
The SVI-738 is a portable version of this computer.
Techn... |
https://en.wikipedia.org/wiki/Hardware%20performance%20counter | In computers, hardware performance counters (HPC), or hardware counters are a set of special-purpose registers built into modern microprocessors to store the counts of hardware-related activities within computer systems. Advanced users often rely on those counters to conduct low-level performance analysis or tuning.
I... |
https://en.wikipedia.org/wiki/Common%20species | Common species and uncommon species are designations used in ecology to describe the population status of a species. Commonness is closely related to abundance. Abundance refers to the frequency with which a species is found in controlled samples; in contrast, species are defined as common or uncommon based on their ... |
https://en.wikipedia.org/wiki/Regular%20Polytopes%20%28book%29 | Regular Polytopes is a geometry book on regular polytopes written by Harold Scott MacDonald Coxeter. It was originally published by Methuen in 1947 and by Pitman Publishing in 1948, with a second edition published by Macmillan in 1963 and a third edition by Dover Publications in 1973.
The Basic Library List Committee o... |
https://en.wikipedia.org/wiki/Flap%20endonuclease | Flap endonucleases (FENs, also known as 5' durgs in older references) are a class of nucleolytic enzymes that act as both 5'-3' exonucleases and structure-specific endonucleases on specialised DNA structures that occur during the biological processes of DNA replication, DNA repair, and DNA recombination. Flap endonucle... |
https://en.wikipedia.org/wiki/Glycosome | The glycosome is a membrane-enclosed organelle that contains the glycolytic enzymes. The term was first used by Scott and Still in 1968 after they realized that the glycogen in the cell was not static but rather a dynamic molecule. It is found in a few species of protozoa including the Kinetoplastida which include the ... |
https://en.wikipedia.org/wiki/Comparison%20of%20content-control%20software%20and%20providers | This is a list of content-control software and services. The software is designed to control what content may or may not be viewed by a reader, especially when used to restrict material delivered over the Internet via the Web, e-mail, or other means. Restrictions can be applied at various levels: a government can apply... |
https://en.wikipedia.org/wiki/Software%20metering | Software metering is the monitoring and controlling of software for analytics and the enforcement of agreements. It can be either passive, where data is simply collected and no action is taken, or active, where access is restricted for enforcement.
Types
Software metering refers to several areas:
Tracking and mainta... |
https://en.wikipedia.org/wiki/PowerPC%20600 | The PowerPC 600 family was the first family of PowerPC processors built. They were designed at the Somerset facility in Austin, Texas, jointly funded and staffed by engineers from IBM and Motorola as a part of the AIM alliance. Somerset was opened in 1992 and its goal was to make the first PowerPC processor and then ke... |
https://en.wikipedia.org/wiki/Cottonera%20Lines | The Cottonera Lines (), also known as the Valperga Lines (), are a line of fortifications in Bormla and Birgu, Malta. They were built in the 17th and 18th centuries on higher ground and further outwards than the earlier line of fortifications, known as the Santa Margherita or Firenzuola lines, which also surround Borml... |
https://en.wikipedia.org/wiki/Floriana%20Lines | The Floriana Lines () are a line of fortifications in Floriana, Malta, which surround the fortifications of Valletta and form the capital city's outer defences. Construction of the lines began in 1636 and they were named after the military engineer who designed them, Pietro Paolo Floriani. The Floriana Lines were modif... |
https://en.wikipedia.org/wiki/Security%20bug | A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system. Security bugs introduce security vulnerabilities by compromising one or more of:
Authentication of users and other entities
Authorization of access rights and privileges
Data co... |
https://en.wikipedia.org/wiki/Weakly%20contractible | In mathematics, a topological space is said to be weakly contractible if all of its homotopy groups are trivial.
Property
It follows from Whitehead's Theorem that if a CW-complex is weakly contractible then it is contractible.
Example
Define to be the inductive limit of the spheres . Then this space is weakly contra... |
https://en.wikipedia.org/wiki/Lake%20capture | In geology, lake capture is the process of capture (see Stream capture) of the waters collected in a lake by a neighbor river basin.
The occurrence of a lake capture is mainly controlled by the water balance at the lake's basin and the changes in topography due to erosion, sedimentation, and tectonism. If evaporation ... |
https://en.wikipedia.org/wiki/Jim%20Al-Khalili | Jameel Sadik "Jim" Al-Khalili (; born 20 September 1962) is an Iraqi-British theoretical physicist, author and broadcaster. He is professor of theoretical physics and chair in the public engagement in science at the University of Surrey. He is a regular broadcaster and presenter of science programmes on BBC radio and ... |
https://en.wikipedia.org/wiki/TCP-Illinois | TCP-Illinois is a variant of TCP congestion control protocol, developed at the University of Illinois at Urbana–Champaign. It is especially targeted at high-speed, long-distance networks. A sender side modification to the standard TCP congestion control algorithm, it achieves a higher average throughput than the standa... |
https://en.wikipedia.org/wiki/Link-local%20address | In computer networking, a link-local address is a unicast network address that is valid only for communications within the subnetwork that the host is connected to. Link-local addresses are most often assigned automatically with a process known as stateless address autoconfiguration or link-local address autoconfigurat... |
https://en.wikipedia.org/wiki/Pompeiu%27s%20theorem | Pompeiu's theorem is a result of plane geometry, discovered by the Romanian mathematician Dimitrie Pompeiu. The theorem is simple, but not classical. It states the following:
Given an equilateral triangle ABC in the plane, and a point P in the plane of the triangle ABC, the lengths PA, PB, and PC form the sides of a (... |
https://en.wikipedia.org/wiki/Reaction%E2%80%93diffusion%20system | Reaction–diffusion systems are mathematical models which correspond to several physical phenomena. The most common is the change in space and time of the concentration of one or more chemical substances: local chemical reactions in which the substances are transformed into each other, and diffusion which causes the sub... |
https://en.wikipedia.org/wiki/Amorphous%20computing | Amorphous computing refers to computational systems that use very large numbers of identical, parallel processors each having limited computational ability and local interactions. The term Amorphous Computing was coined at MIT in 1996 in a paper entitled "Amorphous Computing Manifesto" by Abelson, Knight, Sussman, et ... |
https://en.wikipedia.org/wiki/George%20W.%20Hart | George William Hart (born 1955) is an American sculptor and geometer. Before retiring, he was an associate professor of Electrical Engineering at Columbia University in New York City and then an interdepartmental research professor at Stony Brook University. His work includes both academic and artistic approaches to ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.