page_content
stringlengths
51
3.15k
Islamic medicine Medical ethics Arabic_medicine > Medical ethics The Islamic medical ethics can be discovered as two types of topics, the Adab literature and the classic Islamic legal tradition. With Adab literature, its main course of action is to mainly promote the universal virtues and morals that exists. Its main goal is to promote the importance of ethical behaviors, good manners, and social etiquette that can then intern be applied to all human beings that exists no matter what their religious background is or even what cultural background that they derived from.
Quantum digital signature Requirements for a good and usable signature scheme Quantum_digital_signature > Quantum Digital Signature > Requirements for a good and usable signature scheme Most of the requirements for a classical digital signature scheme also apply to the quantum digital signature scheme. In detail The scheme has to provide security against tampering by The sender after the message was signed (see bit commitment) The receiver A third party Creating a signed message has to be easy Every recipient has to get the same answer, when testing the message for validity (Valid, Non-Valid)
Isomap Summary Isomap Isomap is a nonlinear dimensionality reduction method. It is one of several widely used low-dimensional embedding methods. Isomap is used for computing a quasi-isometric, low-dimensional embedding of a set of high-dimensional data points. The algorithm provides a simple method for estimating the intrinsic geometry of a data manifold based on a rough estimate of each data point’s neighbors on the manifold. Isomap is highly efficient and generally applicable to a broad range of data sources and dimensionalities.
Combinatorial explosion Arithmetic Combinatorial_explosion > Examples > Arithmetic Suppose we take the factorial of n: n ! = n ⋅ ( n − 1 ) ⋅ … ⋅ 2 ⋅ 1 {\displaystyle n!=n\cdot (n-1)\cdot \ldots \cdot 2\cdot 1} Then 1! = 1, 2! = 2, 3!
Electrolytic conductivity Definitions Conductivity_(electrolytic) > Definitions If the resistance of the calibration solution is R*, a cell-constant, defined as the ratio of l and A (C = l⁄A), is derived. R ∗ = ρ × C {\displaystyle R^{*}=\rho \times C} The specific conductance (conductivity), κ (kappa) is the reciprocal of the specific resistance. κ = 1 ρ = C R {\displaystyle \kappa ={\frac {1}{\rho }}={\frac {C}{R}}} Conductivity is also temperature-dependent. Sometimes the conductance (reciprocical of the resistance) is denoted as G = 1⁄R. Then the specific conductance κ (kappa) is: κ = C × G {\displaystyle \kappa =C\times G}
Kenneth Boulding's evolutionary perspective Perspectives Kenneth_Boulding's_evolutionary_perspective > Perspectives In his classic work, The Entropy Law and the Economic Process, Georgescu-Roegen issued a call for the end of the circular flow diagrams used in mainstream thought and textbooks in which the production and circulation process are detached from the physical reality, the scale, of the planet's resources and pollution sinks. He called for greater attention to be given to the second law of thermodynamics – that it be treated as a cornerstone of the mainstream paradigm. Boulding can be seen as addressing this call.
Determinant (mathematics) Generalizations and related notions Determinant_of_a_matrix > Generalizations and related notions Determinants as treated above admit several variants: the permanent of a matrix is defined as the determinant, except that the factors sgn ⁡ ( σ ) {\displaystyle \operatorname {sgn}(\sigma )} occurring in Leibniz's rule are omitted. The immanant generalizes both by introducing a character of the symmetric group S n {\displaystyle S_{n}} in Leibniz's rule.
Discrete Weibull distribution Summary Discrete_Weibull_distribution In probability theory and statistics, the discrete Weibull distribution is the discrete variant of the Weibull distribution. It was first described by Nakagawa and Osaki in 1975.
Lint (material) External links and further reading Lint_(material) > External links and further reading "World record navel lint collection". feargod.net. "Bellybutton Lint Collecters".
Fixed-point arithmetic Overflow Fixed-point_arithmetic > Hardware support > Overflow Overflow happens when the result of an arithmetic operation is too large to be stored in the designated destination area. In addition and subtraction, the result may require one bit more than the operands. In multiplication of two unsigned integers with m and n bits, the result may have m+n bits.
Bulk encryption Summary Link_encryption if the communications link operates continuously and carries an unvarying level of traffic, link encryption defeats traffic analysis.On the other hand, end-to-end encryption ensures only the intended recipient has access to the plaintext. Link encryption can be used with end-to-end systems by superencrypting the messages. Bulk encryption refers to encrypting a large number of circuits at once, after they have been multiplexed. == References ==
Instructional Simulation Summary Instructional_Simulation An instructional simulation, also called an educational simulation, is a simulation of some type of reality (system or environment) but which also includes instructional elements that help a learner explore, navigate or obtain more information about that system or environment that cannot generally be acquired from mere experimentation. Instructional simulations are typically goal oriented and focus learners on specific facts, concepts, or applications of the system or environment. Today, most universities make lifelong learning possible by offering a virtual learning environment (VLE).
Mathematical models Prediction of empirical data Mathematical_modelling > Construction > Evaluation and assessment > Prediction of empirical data This practice is referred to as cross-validation in statistics. Defining a metric to measure distances between observed and predicted data is a useful tool for assessing model fit. In statistics, decision theory, and some economic models, a loss function plays a similar role.
Jugular venous pressure Abdominojugular test Jugular_venous_pressure > Method > Abdominojugular test The term "hepatojugular reflux" was previously used as it was thought that compression of the liver resulted in "reflux" of blood out of the hepatic sinusoids into the inferior vena cava, thereby elevating right atrial pressure and visualized as jugular venous distention. The exact physiologic mechanism of jugular venous distention with a positive test is much more complex and the commonly accepted term is now "abdominojugular test".In a prospective randomized study involving 86 patients who underwent right and left cardiac catheterization, the abdominojugular test was shown to correlate best with the pulmonary arterial wedge pressure. Furthermore, patients with a positive response had lower left ventricular ejection fractions and stroke volumes, higher left ventricular filling pressure, higher mean pulmonary arterial, and higher right atrial pressures.The abdominojugular test, when done in a standardized fashion, correlates best with the pulmonary arterial wedge pressure, and therefore, is probably a reflection of an increased central blood volume. In the absence of isolated right ventricular failure, seen in some patients with right ventricular infarction, a positive abdominojugular test suggests a pulmonary artery wedge pressure of 15 mm Hg or greater.
Lean Manufacturing Summary Just-in-time_manufacturing Lean manufacturing also involves people who work outside of the manufacturing process, such as in marketing and customer service. Lean manufacturing is particularly related to the operational model implemented in the post-war 1950s and 1960s by the Japanese automobile company Toyota called Toyota Production System (TPS), known in the USA as "The Toyota Way". Toyota's system was erected on the two pillars of just-in-time inventory management and automated quality control.
Find-me signals Failure to remove dying cells Find-me_signals > In Apoptosis > Failure to remove dying cells If the body's immune system, or more specifically phagocytes, fail to clear dying cells in the body, symptoms such as chronic inflammation, autoimmune disorders, and developmental abnormalities have been shown to occur. As long as the engulfment process is functioning and efficient, uncleared apoptotic cells go unnoticed in the body and do not cause any long-term symptoms. If this process is disrupted in any way, the accumulation of secondary necrotic cells in tissues of the body can occur. This is associated with autoimmune disorders, causing the immune system to attack self-antigens on the uncleared cells.
Dose (biochemistry) Prescription drugs Dose_(biochemistry) > Medicines > Prescription drugs Prescription drug dosage is based typically on body weight. Drugs come with a recommended dose in milligrams or micrograms per kilogram of body weight, and that is used in conjunction with the patient's body weight to determine a safe dosage. In single dosage scenarios, the patient's body weight and the drug's recommended dose per kilogram are used to determine a safe one-time dose. In drugs where multiple doses of treatment are needed in a day, the physician must take into account information regarding the total amount of the drug which is safe to use in one day, and how that should be broken up into intervals for the most effective treatment for the patient. Medication underdosing occurs commonly when physicians write prescriptions for a dosage that is correct for a certain time, but fails to increase the dosage as the patient needs (i.e. weight based dosing in children, or increasing dosages of chemotherapy drugs if a patient's condition worsens).
Volcanic lithic fragment Sedimentary (Ls) Lithic_fragment > Types > Sedimentary (Ls) These can include shale siltstone fragments, and (at times) chert.
Oseltamivir Pharmacokinetics Oseltamivir > Pharmacokinetics Its oral bioavailability is over 80% and is extensively metabolised to its active form upon first-pass through the liver. It has a volume of distribution of 23–26 litres. Its half-life is about 1–3 hours and its active carboxylate metabolite has a half-life of 6–10 hours. More than 90% of the oral dose is eliminated in the urine as the active metabolite.
Opioid agonist Low sex hormone levels Opioid-induced_constipation > Adverse effects > Other adverse effects > Low sex hormone levels One study found that the depressed testosterone levels of heroin addicts returned to normal within one month of abstinence, suggesting that the effect is readily reversible and is not permanent. As of 2013, the effect of low-dose or acute opioid use on the endocrine system is unclear. Long-term use of opioids can affect the other hormonal systems as well.
Data Warehouse Versus operational system Data_Warehouses > Versus operational system Analytic access patterns generally involve selecting specific fields and rarely if ever select *, which selects all fields/columns, as is more common in operational databases. Because of these differences in access patterns, operational databases (loosely, OLTP) benefit from the use of a row-oriented DBMS whereas analytics databases (loosely, OLAP) benefit from the use of a column-oriented DBMS. Unlike operational systems which maintain a snapshot of the business, data warehouses generally maintain an infinite history which is implemented through ETL processes that periodically migrate data from the operational systems over to the data warehouse.
Computer Program Algol Computer_code > Programming paradigms and languages > Imperative languages > Algol This led to syntax-directed compilers. It added features like: block structure, where variables were local to their block. arrays with variable bounds.
Tendex line Summary Tendex_line A tendex line (from the Latin "tendere": To stretch) is a traversal line describing the path matter takes through the accretion disc of a black hole. A tendex line typically follows a spiral around the black hole descending to the event horizon. Matter on this line experiences a stretching effect, while vortex lines describe a twisting effect.Both of these types of lines can be used to visualise black holes, and the ways in which spacetime warps around them. They may also help to explain phenomena such as the 'kicks' observed in simulations of merging black holes as they are flung away from their host galaxies, and may also help in the search for gravitational waves.
Equilibrium catalyst Spent catalyst disposal Equilibrium_catalyst > Spent catalyst disposal The disposal of spent catalyst is gaining importance, particularly because of strict environmental regulations and high prices of fresh catalyst. Landfills and approved dumping sites have been predominantly used to get rid of the spent catalyst. Catalysts containing metals (nickel, vanadium, molybdenum) classified as hazardous are pre-treated before disposal. Sale of spent catalyst to the cement industry or its reuse in construction sites, metal casting industry, in road building offers immediate disposal solutions but with no economic benefits.
Magnocellular cell Schizophrenia Magnocellular_cell > Clinical significance > Schizophrenia Schizophrenia is a mental disorder in which people are unable to differentiate what is real and what is not. It is believed that the magnocellular pathway may help with facial recognition and discrimination in children, but when this pathway is not developed completely or correctly, facial processing is more difficult for individuals later in life. This is seen in people with schizophrenia and occurs when there are issues in the integration of information from the M cell and P cell pathways, making it difficult for individuals with schizophrenia to differentiate between reality and hallucinations.
Discovery and development of neuraminidase inhibitors Mechanism of enzyme catalysis Discovery_and_development_of_neuraminidase_inhibitors > Mechanism of action > Mechanism of enzyme catalysis Step three involves nucleophilic attack of tyrosine on the sialosyl cation. The fourth step is the formation and release of Neu5Ac. A similar mechanism has been proposed by Janakiraman et al. where the double bond of Neu5Ac2en forces the pyranose of sugar ring into a planar structure were resembled the transition-state structure.
System On Chip Memory System_On_Chip > Structure > Functional components > Memory As in other computer systems, RAM can be subdivided into relatively faster but more expensive static RAM (SRAM) and the slower but cheaper dynamic RAM (DRAM). When an SoC has a cache hierarchy, SRAM will usually be used to implement processor registers and cores' built-in caches whereas DRAM will be used for main memory. "Main memory" may be specific to a single processor (which can be multi-core) when the SoC has multiple processors, in this case it is distributed memory and must be sent via § Intermodule communication on-chip to be accessed by a different processor. For further discussion of multi-processing memory issues, see cache coherence and memory latency.
Fourier inversion Summary Fourier_inversion_theorem This last equation is called the Fourier integral theorem. Another way to state the theorem is that if R {\displaystyle R} is the flip operator i.e. ( R f ) ( x ) := f ( − x ) {\displaystyle (Rf)(x):=f(-x)} , then F − 1 = F R = R F . {\displaystyle {\mathcal {F}}^{-1}={\mathcal {F}}R=R{\mathcal {F}}.}
Quantitative genetics Gene effects Polygenic_trait > Gene effects The diagram depicts the idea. However, in reality we measure phenotypes, and the figure also shows how observed phenotypes relate to the gene effects.
Hardware accelerator Applications Hardware_accelerator > Applications Examples of hardware acceleration include bit blit acceleration functionality in graphics processing units (GPUs), use of memristors for accelerating neural networks and regular expression hardware acceleration for spam control in the server industry, intended to prevent regular expression denial of service (ReDoS) attacks. The hardware that performs the acceleration may be part of a general-purpose CPU, or a separate unit called a hardware accelerator, though they are usually referred with a more specific term, such as 3D accelerator, or cryptographic accelerator. Traditionally, processors were sequential (instructions are executed one by one), and were designed to run general purpose algorithms controlled by instruction fetch (for example moving temporary results to and from a register file). Hardware accelerators improve the execution of a specific algorithm by allowing greater concurrency, having specific datapaths for their temporary variables, and reducing the overhead of instruction control in the fetch-decode-execute cycle.
CHARMM Force fields CHARMM > Force fields It "covers a wide range of chemical groups present in biomolecules and drug-like molecules, including a large number of heterocyclic scaffolds". The general force field is designed to cover any combination of chemical groups.
Circulatory collapse Pathophysiology Circulatory_collapse > Pathophysiology There are four stages of shock. Shock is a complex and continuous condition, and there is no sudden transition from one stage to the next. At a cellular level, shock is the process of oxygen demand becoming greater than oxygen supply.One of the key dangers of shock is that it progresses by a positive feedback loop. Poor blood supply leads to cellular damage, which results in an inflammatory response to increase blood flow to the affected area.
Human embryonic stem cell Cell cycle control Stem_cell_biology > Embryonic > Cell cycle control mESCs showed a cell cycle with highly abbreviated G1 phase, which enabled cells to rapidly alternate between M phase and S phase. In a somatic cell cycle, oscillatory activity of Cyclin-Cdk complexes is observed in sequential action, which controls crucial regulators of the cell cycle to induce unidirectional transitions between phases: Cyclin D and Cdk4/6 are active in the G1 phase, while Cyclin E and Cdk2 are active during the late G1 phase and S phase; and Cyclin A and Cdk2 are active in the S phase and G2, while Cyclin B and Cdk1 are active in G2 and M phase. However, in mESCs, this typically ordered and oscillatory activity of Cyclin-Cdk complexes is absent.
Homologous chromosome Overview Homologous_chromosome > Overview In diploid (2n) organisms, the genome is composed of one set of each homologous chromosome pair, as compared to tetraploid organisms which may have two sets of each homologous chromosome pair. The alleles on the homologous chromosomes may be different, resulting in different phenotypes of the same genes. This mixing of maternal and paternal traits is enhanced by crossing over during meiosis, wherein lengths of chromosomal arms and the DNA they contain within a homologous chromosome pair are exchanged with one another.
Automated vacuum collection Summary Automated_vacuum_collection An automated vacuum waste collection system, also known as pneumatic refuse collection, or automated vacuum collection (AVAC), transports waste at a high speed through underground pneumatic tubes to a collection station where it is compacted and sealed in containers. When the container is full, it is transported away and then emptied. The system helps facilitate the separation and recycling of waste.The process begins with the deposition of trash into intake hatches, called portholes, which may be specialized for waste, recycling, or compost. Portholes are located in public areas and on private property where the owner has opted in. The waste is then pulled through an underground pipeline by an air pressure difference created by large industrial fans, in response to porthole sensors that indicate when the trash needs to be emptied and help ensure that only one kind of waste material travels through the pipe at a time. The pipelines converge on a central processing facility that uses automated software to direct the waste to the proper container, and then be trucked to its final location, such as a landfill or composting a plant.
Weak-Link Approach Metal centers utilized in the WLA Weak-Link_Approach > Weak-Link Approach components > Metal centers utilized in the WLA Due to the well-developed understanding of the reactions between the hemilabile ligands and d8 metal ions, the WLA has relied extensively on this type of metal center within its methodology. Initial reports focused on the use of Rh(I), but Ir(I), Ni(II), Pd(II), and Pt(II) have all been successfully employed. While d8 metal centers dominate the WLA literature, d6 Ru(II) and d9 Cu(I) have also been utilized. Importantly, the choice of metal centers tunes the identity and selectivity of the various allosteric effectors.
Hölder exponent Examples Hölder_exponent > Examples If 0 < α ≤ β ≤ 1 then all C 0 , β ( Ω ¯ ) {\displaystyle C^{0,\beta }({\overline {\Omega }})} Hölder continuous functions on a bounded set Ω are also C 0 , α ( Ω ¯ ) {\displaystyle C^{0,\alpha }({\overline {\Omega }})} Hölder continuous. This also includes β = 1 and therefore all Lipschitz continuous functions on a bounded set are also C0,α Hölder continuous. The function f(x) = xβ (with β ≤ 1) defined on serves as a prototypical example of a function that is C0,α Hölder continuous for 0 < α ≤ β, but not for α > β. Further, if we defined f analogously on by f(0) = 0 and by f(x) = 1/log(x) otherwise is continuous, and therefore uniformly continuous by the Heine-Cantor theorem. It does not satisfy a Hölder condition of any order, however.
Split-complex number Geometry Split-complex_number > Geometry {\displaystyle \mathbb {R} .} The hyperbola consists of a right and left branch passing through (a, 0) and (−a, 0). The case a = 1 is called the unit hyperbola.
Photoelectric receiver Based on mechanism of operation Photoelectric_receiver > Classification > Based on mechanism of operation Photodetectors may be classified by their mechanism for detection: Photoconductive effect: These detectors work by changing their electrical conductivity when exposed to light. The incident light generates electron-hole pairs in the material, altering its conductivity. Photoconductive detectors are typically made of semiconductors.Photoemission or photoelectric effect: Photons cause electrons to transition from the conduction band of a material to free electrons in a vacuum or gas. Thermal: Photons cause electrons to transition to mid-gap states then decay back to lower bands, inducing phonon generation and thus heat.
Medical records Privacy Medical_records > Privacy The federal Health Insurance Portability and Accessibility Act (HIPAA) addresses the issue of privacy by providing medical information handling guidelines. Not only is it bound by the Code of Ethics of its profession (in the case of doctors and nurses), but also by the legislation on data protection and criminal law. Professional secrecy applies to practitioners, psychologists, nursing, physiotherapists, occupational therapists, nursing assistants, chiropodists, and administrative personnel, as well as auxiliary hospital staff. The maintenance of the confidentiality and privacy of patients implies first of all in the medical history, which must be adequately guarded, remaining accessible only to the authorized personnel. However, the precepts of privacy must be observed in all fields of hospital life: privacy at the time of the conduct of the anamnesis and physical exploration, the privacy at the time of the information to the relatives, the conversations between healthcare providers in the corridors, maintenance of adequate patient data collection in hospital nursing controls (planks, slates), telephone conversations, open intercoms etc.
General Purpose Heat Source Summary General-purpose_heat_source The general-purpose heat source is a U.S. DOE-designed radioactive heat source for radioisotope thermoelectric generators (RTG) or Stirling radioisotope generators (SRG). It is meant for space applications and is packaged as a stackable module.
Molecule Theoretical aspects Molecular_size > Theoretical aspects When trying to define rigorously whether an arrangement of atoms is sufficiently stable to be considered a molecule, IUPAC suggests that it "must correspond to a depression on the potential energy surface that is deep enough to confine at least one vibrational state". This definition does not depend on the nature of the interaction between the atoms, but only on the strength of the interaction. In fact, it includes weakly bound species that would not traditionally be considered molecules, such as the helium dimer, He2, which has one vibrational bound state and is so loosely bound that it is only likely to be observed at very low temperatures. Whether or not an arrangement of atoms is sufficiently stable to be considered a molecule is inherently an operational definition. Philosophically, therefore, a molecule is not a fundamental entity (in contrast, for instance, to an elementary particle); rather, the concept of a molecule is the chemist's way of making a useful statement about the strengths of atomic-scale interactions in the world that we observe.
Underwater survey Platforms Underwater_survey > Tools > Remote measurement through water > Platforms Autonomous underwater vehicles are more economical than manned vehicles. Researchers have focused on the development of AUVs for long-term data collection in oceanography and coastal management.
Atmospheric Infrared Sounder Technology Atmospheric_Infrared_Sounder > Technology Within the instrument, an advanced, high-resolution spectrometer separates the infrared energy into wavelengths. Each infrared wavelength is sensitive to temperature and water vapor over a range of heights in the atmosphere, from the surface up into the stratosphere. By having multiple infrared detectors, each sensing a particular wavelength, a temperature profile, or sounding of the atmosphere, can be made.
Set (abstract data type) Language support Multiset_(abstract_data_type) > Language support One of the earliest languages to support sets was Pascal; many languages now include it, whether in the core language or in a standard library. In C++, the Standard Template Library (STL) provides the set template class, which is typically implemented using a binary search tree (e.g. red–black tree); SGI's STL also provides the hash_set template class, which implements a set using a hash table. C++11 has support for the unordered_set template class, which is implemented using a hash table. In sets, the elements themselves are the keys, in contrast to sequenced containers, where elements are accessed using their (relative or absolute) position.
Type 3 hypersensitivity Pathogenesis Immune_complex_diseases > Pathogenesis Immune complex size depends on both the quantity of antigen and antibody, with smaller complexes occurring at both a great excess of antigen and a relatively small amount. Another determinant of immune complex properties is its charge, and in particular the charge of the antigen. Positively charged antigens have an affinity for negatively charged surfaces such as the basement membrane of glomeruli in the kidney or skin; however this may also be because the antigens are trafficking to those sites before the immune complex is formed.
Acknowledgement (data networks) Summary Acknowledgement_(data_networks) Checksums are used to detect data corruption. If a message is received with an invalid checksum (that is, the data received would have a different checksum than the message had), the receiver can know that some information was corrupted. Most often, when checksums are employed, a corrupted message received will either not be served an ACK signal, or will be served a NAK signal.
Interactome Summary Interaction_network In molecular biology, an interactome is the whole set of molecular interactions in a particular cell. The term specifically refers to physical interactions among molecules (such as those among proteins, also known as protein–protein interactions, PPIs; or between small molecules and proteins) but can also describe sets of indirect interactions among genes (genetic interactions). The word "interactome" was originally coined in 1999 by a group of French scientists headed by Bernard Jacq. Mathematically, interactomes are generally displayed as graphs. Though interactomes may be described as biological networks, they should not be confused with other networks such as neural networks or food webs.
Capsule neural network Transformations Capsule_neural_network > Transformations Equivariant properties such as a spatial relationship are captured in a pose, data that describes an object's translation, rotation, scale and reflection. Translation is a change in location in one or more dimensions. Rotation is a change in orientation.
Integrity (operating system) INTEGRITY Integrity_(operating_system) > INTEGRITY INTEGRITY is POSIX-certified and intended for use in embedded systems of 32-bits or 64-bits. Supported computer architectures include variants of: ARM, Blackfin, ColdFire, MIPS, PowerPC, XScale, and x86. INTEGRITY is supported by popular SSL/TLS libraries such as wolfSSL.
Electronic visual display Classification Electronic_display > Classification Electronic visual displays present visual information according to the electrical input signal (analog or digital) either by emitting light (then they are called active displays) or, alternatively, by modulating available light during the process of reflection or transmission (light modulators are called passive displays).
Multigrid methods Algorithm Multigrid_method > Algorithm For a discrete 2D problem, F-Cycle takes 83% more time to compute than a V-Cycle iteration while a W-Cycle iteration takes 125% more. If the problem is set up in a 3D domain, then a F-Cycle iteration and a W-Cycle iteration take about 64% and 75% more time respectively than a V-Cycle iteration ignoring overheads. Typically, W-Cycle produces similar convergence to F-Cycle.
Elastic Deformation Summary Plastic_deformation_in_solids In engineering, deformation refers to the change in size or shape of an object. Displacements are the absolute change in position of a point on the object. Deflection is the relative change in external displacements on an object. Strain is the relative internal change in shape of an infinitesimally small cube of material and can be expressed as a non-dimensional change in length or angle of distortion of the cube.
Discrete components Magnetic (inductive) devices Photoelectric_devices > Passive components > Magnetic (inductive) devices Electrical components that use magnetism in the storage and release of electrical charge through current: Inductor, coil, choke Variable inductor Saturable inductor Transformer Magnetic amplifier (toroid) ferrite impedances, beads Motor / Generator Solenoid Loudspeaker and microphone
Immune privilege Central nervous system Immune_privilege > Immunologically privileged sites > Central nervous system The central nervous system (CNS), which includes the brain and spinal cord, is a sensitive system with limited capacity for regeneration. In that regard, the concept of "immune privilege" within the CNS was once thought to be critical in limiting inflammation. The blood–brain barrier plays an important role in maintaining the separation of CNS from the systemic immune system but the presence of the blood–brain barrier, does not, on its own, provide immune privilege. It is thought that immune privilege within the CNS varies throughout the different compartments of the system, being most pronounced in the parenchyma tissue or "white matter".The concept of CNS as an "immune-privileged" organ system, however, has been overwhelmingly challenged and re-evaluated over the last two decades.
Fluid resistance Very low Reynolds numbers: Stokes' drag Drag_(physics) > Very low Reynolds numbers: Stokes' drag The equation for viscous resistance or linear drag is appropriate for objects or particles moving through a fluid at relatively slow speeds where there is no turbulence (i.e. low Reynolds number, R e < 1 {\displaystyle R_{e}<1} ). Note that purely laminar flow only exists up to Re = 0.1 under this definition. In this case, the force of drag is approximately proportional to velocity. The equation for viscous resistance is: where: b {\displaystyle b} is a constant that depends on both the material properties of the object and fluid, as well as the geometry of the object; and v {\displaystyle \mathbf {v} } is the velocity of the object.When an object falls from rest, its velocity will be where: ρ {\displaystyle \rho } is the density of the object, ρ 0 {\displaystyle \rho _{0}} is density of the fluid, V {\displaystyle V} is the volume of the object, g {\displaystyle g} is the acceleration due to gravity (i.e., 9.8 m/s 2 {\displaystyle ^{2}} ), and m {\displaystyle m} is mass of the object.The velocity asymptotically approaches the terminal velocity v t = ( ρ − ρ 0 ) V g b {\displaystyle v_{t}={\frac {(\rho -\rho _{0})Vg}{b}}} .
GraphBLAS Example code GraphBLAS > Example code The following is a GraphBLAS 2.0-compliant example of a breadth-first search in the C programming language. : 283
Film capacitor Paper (film) capacitors (MP) and mixed film capacitors Snubber_capacitor > Characteristics of film materials for film capacitors > Paper (film) capacitors (MP) and mixed film capacitors Power film capacitors using metallized paper as carrier of the electrodes, their different configurations and their usual abbreviated designations Historically, the first "film" type capacitors were paper capacitors of film/foil configuration. They were fairly bulky, and not particularly reliable. As of 2012, paper is used in the form of metallized paper for MP capacitors with self-healing properties used for EMI suppression. Paper is also used as an insulating mechanical carrier of metallized-layer electrodes, and combined with polypropylene dielectric, mostly in power capacitors rated for high current AC and high voltage DC applications.
BLAKE (hash function) Tweaks BLAKE_(hash_function) > Tweaks Throughout the NIST hash function competition, entrants are permitted to "tweak" their algorithms to address issues that are discovered. Changes that have been made to BLAKE are: the number of rounds was increased from 10/14 to 14/16. This is to be more conservative about security while still being fast.
Absolute continuity Properties Domination_(measure_theory) > Absolute continuity of functions > Properties Every (globally) Lipschitz-continuous function is absolutely continuous. If f: → R is absolutely continuous, then it is of bounded variation on . If f: → R is absolutely continuous, then it can be written as the difference of two monotonic nondecreasing absolutely continuous functions on .
Information processing theory Other Cognitive processes Information_processing_theory > Other Cognitive processes Cognitive processes include perception, recognition, imagining, remembering, thinking, judging, reasoning, problem solving, conceptualizing, and planning. These cognitive processes can emerge from human language, thought, imagery, and symbols. In addition to these specific cognitive processes, many cognitive psychologists study language-acquisition, altered states of mind and consciousness, visual perception, auditory perception, short-term memory, long-term memory, storage, retrieval, perceptions of thought and much more. Cognitive processes emerge through senses, thoughts, and experiences. The first step is aroused by paying attention, it allows processing of the information given. Cognitive processing cannot occur without learning, they work hand in hand to fully grasp the information.cognitive process
Transcription factor Summary Upstream_transcription_factor Transcription factors are members of the proteome as well as regulome. TFs work alone or with other proteins in a complex, by promoting (as an activator), or blocking (as a repressor) the recruitment of RNA polymerase (the enzyme that performs the transcription of genetic information from DNA to RNA) to specific genes.A defining feature of TFs is that they contain at least one DNA-binding domain (DBD), which attaches to a specific sequence of DNA adjacent to the genes that they regulate. TFs are grouped into classes based on their DBDs. Other proteins such as coactivators, chromatin remodelers, histone acetyltransferases, histone deacetylases, kinases, and methylases are also essential to gene regulation, but lack DNA-binding domains, and therefore are not TFs.TFs are of interest in medicine because TF mutations can cause specific diseases, and medications can be potentially targeted toward them.
Vanishing gradient problem Residual networks Vanishing_gradient_problem > Solutions > Residual networks Skip connections are a critical component of what allowed successful training of deeper neural networks. ResNets yielded lower training error (and test error) than their shallower counterparts simply by reintroducing outputs from shallower layers in the network to compensate for the vanishing data. Note that ResNets are an ensemble of relatively shallow nets and do not resolve the vanishing gradient problem by preserving gradient flow throughout the entire depth of the network – rather, they avoid the problem simply by constructing ensembles of many short networks together. (Ensemble by Construction)
Edge network Evolved EDGE Edge_network > Evolved EDGE Mobile operators have invested billions in GSM networks, many of which are already capable of supporting EDGE data speeds up to 236.8 kbit/s. With a software upgrade and a new device compliant with Evolved EDGE (like an Evolved EDGE smartphone) for the user, these data rates can be boosted to speeds approaching 1 Mbit/s (i.e. 98.6 kbit/s per timeslot for 32QAM). Many service providers may not invest in a completely new technology like 3G networks.Considerable research and development happened throughout the world for this new technology.
Right isosceles triangle 45° - 45° - 90° triangle Special_right_triangles > Angle-based > 45° - 45° - 90° triangle In plane geometry, constructing the diagonal of a square results in a triangle whose three angles are in the ratio 1: 1: 2, adding up to 180° or π radians. Hence, the angles respectively measure 45° (π/4), 45° (π/4), and 90° (π/2). The sides in this triangle are in the ratio 1: 1: √2, which follows immediately from the Pythagorean theorem. Of all right triangles, the 45° - 45° - 90° degree triangle has the smallest ratio of the hypotenuse to the sum of the legs, namely √2/2.
Henri Lebesgue Mathematical career Henri_Lebesgue > Mathematical career In measure-theoretic analysis and related branches of mathematics, the Lebesgue–Stieltjes integral generalizes Riemann–Stieltjes and Lebesgue integration, preserving the many advantages of the latter in a more general measure-theoretic framework. During the course of his career, Lebesgue also made forays into the realms of complex analysis and topology. He also had a disagreement with Émile Borel about whose integral was more general. However, these minor forays pale in comparison to his contributions to real analysis; his contributions to this field had a tremendous impact on the shape of the field today and his methods have become an essential part of modern analysis. These have important practical implications for fundamental physics of which Lebesgue would have been completely unaware, as noted below.
VSI mill Operating characteristic VSI_mill > Operating characteristic Strength of material - up to 200 MPa Mohs hardness - up to 7 Absolute humidity - up to 1% (strong condition) Feed size - up to 40 mm Product size - less than 0.5 mm Capacity - up to 20 t/hMill uses for hard and friable materials. Wood, most metals and plastics are inoperable. Raw material must be dry. Capacity strongly depends on characteristics of material and a product size.
Multilayer optics Antireflection coatings Optical_coating > Types of coating > Antireflection coatings Antireflection coatings are used to reduce reflection from surfaces. Whenever a ray of light moves from one medium to another (such as when light enters a sheet of glass after travelling through air), some portion of the light is reflected from the surface (known as the interface) between the two media. A number of different effects are used to reduce reflection. The simplest is to use a thin layer of material at the interface, with an index of refraction between those of the two media.
Bias tee Capacitor Bias_tee > Construction > A particular construction > Capacitor At one point a small slice is cut out of the center conductor, therefore a capacitor is formed and low frequencies are blocked. This kind of capacitor has the advantage that it is nearly invisible to higher frequencies. To pass frequencies down to 1 MHz the capacitance has to be increased. A dielectric like NPO multiplies the capacitance by a factor of 65. The thickness of the capacitor has to be minimal without leading to electric breakdown in the dielectric, this means to avoid any peaks in the electric field and this means smooth electrodes with rounded edges and a dielectric protruding between the electrodes (doorknob design). A stack of capacitors can be used, but every capacitor needs access to the surface of the inner conductor, because if it's hidden behind another capacitor the high frequencies won't see it, because the electric field needs a lot of time to travel through a dielectric with a high dielectric constant
Fracture Mechanics Crack tip plastic zone Plastic_zone > Linear elastic fracture mechanics > Crack tip plastic zone If a crack is present in a specimen that undergoes cyclic loading, the specimen will plastically deform at the crack tip and delay the crack growth. In the event of an overload or excursion, this model changes slightly to accommodate the sudden increase in stress from that which the material previously experienced. At a sufficiently high load (overload), the crack grows out of the plastic zone that contained it and leaves behind the pocket of the original plastic deformation.
Basic salt Examples Alkali_salt > Examples Sodium carbonate Sodium acetate Potassium cyanide Sodium sulfide Sodium bicarbonate Sodium hydroxide
Krivine machine The state Krivine_machine > Description > The state The state has three components a term, a stack, an environment.The term is a λ-term with de Bruijn indices. The stack and the environment belong to the same recursive data structure. More precisely, the environment and the stack are lists of pairs , that are called closures. In what follows, the insertion as the head of a list ℓ (stack or environment) of an element a is written a:ℓ, whereas the empty list is written □.
Vortex theory of the atom Description Vortex_theory_of_the_atom > Description The vortex theory of the atom was based on the observation that a stable vortex can be created in a fluid by making it into a ring with no ends. Such vortices could be sustained in the luminiferous aether, a hypothetical fluid thought at the time to pervade all of space. In the vortex theory of the atom, a chemical atom is modelled by such a vortex in the aether. Knots can be tied in the core of such a vortex, leading to the hypothesis that each chemical element corresponds to a different kind of knot.
Windows Vista I/O technologies I/O subsystem Windows_Vista_I/O_technologies > I/O subsystem In Windows Vista, there is no limit on the size of I/O requests. This means an entire I/O operation can be completed by issuing fewer requests, which in turn may lead to higher performance. Windows Explorer and the Command Prompt's copy command have been modified to issue 1 MB requests.
Programming language reference Summary Programming_language_reference In computing, a programming language reference or language reference manual is part of the documentation associated with most mainstream programming languages. It is written for users and developers, and describes the basic elements of the language and how to use them in a program. For a command-based language, for example, this will include details of every available command and of the syntax for using it.
Remote sensing (oceanography) Sea surface temperature (thermal infrared radiometry) Remote_sensing_(oceanography) > Remote sensing use cases > Sea surface temperature (thermal infrared radiometry) The ocean surface emits electromagnetic radiation B {\displaystyle B} dependent on the temperature T {\displaystyle T} at a certain frequency ν {\displaystyle \nu } following Planck's law for black body radiation, scaled by the emissivity ϵ {\displaystyle \epsilon } of the surface since the ocean is not a perfect black body. B ( ν , T ) = 2 h ν 3 c 2 1 e h ν k B T − 1 ⋅ ϵ {\displaystyle B(\nu ,T)={\frac {2h\nu ^{3}}{c^{2}}}{\frac {1}{e^{\frac {h\nu }{k_{\mathrm {B} }T}}-1}}\cdot \epsilon } With B ( ν , T ) {\displaystyle B(\nu ,T)} the spectral radiance, h {\displaystyle h} the Planck constant; c {\displaystyle c} the speed of light and k {\displaystyle k} the Boltzmann constant. Most radiation emitted by earth is in the thermal-infrared spectrum which is part of the atmospheric window, the spectral region for which the atmosphere does not significantly absorb radiation. The radiation coming from the earth's surface with a wavelength within the atmospheric window can be captured by a passive radiometry sensor at satellite height.
Rejuvenation Historical and cultural background Rejuvenation > Historical and cultural background Noteworthy people who had the surgery included Harold McCormick, chairman of the board of International Harvester Company, and the aging premier of Turkey.Swiss doctor Paul Niehans, who was one of the fathers of cellular therapy, developed in 1931–1949 years the so-called Fresh cell therapy. Fresh cell therapy is mainly the use of live animal embryo organs cells which are injected into the patient with the purpose of achieving a revitalizing effect. These cells are generally extracted from sheep’s fetuses because in comparison to other animals, like pigs, rabbits and cows, sheep are clean animals and rarely contract diseases.
Plateau Principle Equations for the approach to steady state Plateau_Principle > Equations for the approach to steady state Derivation of equations that describe the time course of change for a system with zero-order input and first-order elimination are presented in the articles Exponential decay and Biological half-life, and in scientific literature. C t = C 0 e − k e t {\displaystyle C_{t}=C_{0}e^{-k_{e}t}\,} Ct is concentration after time t C0 is the initial concentration (t = 0) ke is the elimination rate constantThe relationship between the elimination rate constant and half-life is given by the following equation: k e = ln ⁡ 2 t 1 / 2 {\displaystyle k_{e}={\frac {\ln 2}{t_{1/2}}}\,} Because ln 2 equals 0.693, the half-life is readily calculated from the elimination rate constant. Half-life has units of time, and the elimination rate constant has units of 1/time, e.g., per hour or per day. An equation can be used to forecast the concentration of a compound at any future time when the fractional degration rate and steady state concentration are known: C t = C 0 + ( C s s − C 0 ) ( 1 − e − k e t ) {\displaystyle C_{t}=C_{0}+(C_{ss}-C_{0})(1-e^{-k_{e}t})\,} Css is concentration after the steady state has been achieved.The exponential function in parentheses corresponds to the fraction of total change that has been achieved as time passes and the difference between Css and C0 equals the total amount of change.
Penalized least squares Feature maps and Mercer's theorem Regularized_least_squares > Feature maps and Mercer's theorem {\displaystyle \min _{c\in \mathbb {R} ^{n}}\|Y-\Phi \Phi ^{T}c\|_{\mathbb {R} ^{n}}^{2}+\lambda c^{T}\Phi \Phi ^{T}c.} This approach is known as the kernel trick. This technique can significantly simplify the computational operations.
Space-charge limited current Drift regime (Mott–Gurney law) Space-charge_limited_current > Space-charge-limited current > In semiconductors > Drift regime (Mott–Gurney law) The Child's law behavior of a space-charge-limited current that applies in a vacuum diode doesn't generally apply to a semiconductor/insulator in a single-carrier device, and is replaced by the Mott–Gurney law. For a thin slab of material of thickness L {\displaystyle L} , sandwiched between two selective Ohmic contacts, the electric current density, J {\displaystyle J} , flowing through the slab is given by: where V {\displaystyle V} is the voltage that has been applied across the slab and ε {\displaystyle \varepsilon } is the permittivity of the solid. The Mott–Gurney law offers some crucial insight into charge-transport across an intrinsic semiconductor, namely that one should not expect the drift current to increase linearly with the applied voltage, i.e., from Ohm's law, as one would expect from charge-transport across a metal or highly doped semiconductor. Since the only unknown quantity in the Mott–Gurney law is the charge-carrier mobility, μ {\displaystyle \mu } , the equation is commonly used to characterize charge transport in intrinsic semiconductors.
Epigenetic robotics Mechanisms and constraints Developmental_robotics > Research directions > Mechanisms and constraints The sensorimotor and social spaces in which humans and robot live are so large and complex that only a small part of potentially learnable skills can actually be explored and learnt within a life-time. Thus, mechanisms and constraints are necessary to guide developmental organisms in their development and control of the growth of complexity. There are several important families of these guiding mechanisms and constraints which are studied in developmental robotics, all inspired by human development: Motivational systems, generating internal reward signals that drive exploration and learning, which can be of two main types: extrinsic motivations push robots/organisms to maintain basic specific internal properties such as food and water level, physical integrity, or light (e.g. in phototropic systems); intrinsic motivations push robot to search for novelty, challenge, compression or learning progress per se, thus generating what is sometimes called curiosity-driven learning and exploration, or alternatively active learning and exploration; Social guidance: as humans learn a lot by interacting with their peers, developmental robotics investigates mechanisms that can allow robots to participate to human-like social interaction. By perceiving and interpreting social cues, this may allow robots both to learn from humans (through diverse means such as imitation, emulation, stimulus enhancement, demonstration, etc. ...) and to trigger natural human pedagogy.
Protein NMR Homonuclear nuclear magnetic resonance Protein_nuclear_magnetic_resonance > Resonance assignment > Homonuclear nuclear magnetic resonance The continuous chain of protons are the sidechain of the individual amino acids. Thus these two experiments are used to build so called spin systems, that is build a list of resonances of the chemical shift of the peptide proton, the alpha protons and all the protons from each residue’s sidechain. Which chemical shifts corresponds to which nuclei in the spin system is determined by the conventional correlation spectroscopy connectivities and the fact that different types of protons have characteristic chemical shifts.
Plant expressed vaccine Summary Plant_expressed_vaccine A gene from the protein is transferred to bacteria, which are then used to “infect” plant cells. The plants then start producing the exact protein that will be used for vaccinations. Other uses of plant-expressed vaccines including the successful creation of edible bananas that protect against the Norwalk virus. == References ==
Elastic interaction Summary Elastic_collision A useful special case of elastic collision is when the two bodies have equal mass, in which case they will simply exchange their momenta. The molecules—as distinct from atoms—of a gas or liquid rarely experience perfectly elastic collisions because kinetic energy is exchanged between the molecules’ translational motion and their internal degrees of freedom with each collision. At any instant, half the collisions are, to a varying extent, inelastic collisions (the pair possesses less kinetic energy in their translational motions after the collision than before), and half could be described as “super-elastic” (possessing more kinetic energy after the collision than before).
Lebesgue integrability condition Examples Riemann_integrability > Examples Choose ε > 0. The ti have already been chosen, and we can't change the value of f at those points. But if we cut the partition into tiny pieces around each ti, we can minimize the effect of the ti.
Line regression Epidemiology Linear_trend > Applications > Epidemiology Early evidence relating tobacco smoking to mortality and morbidity came from observational studies employing regression analysis. In order to reduce spurious correlations when analyzing observational data, researchers usually include several variables in their regression models in addition to the variable of primary interest. For example, in a regression model in which cigarette smoking is the independent variable of primary interest and the dependent variable is lifespan measured in years, researchers might include education and income as additional independent variables, to ensure that any observed effect of smoking on lifespan is not due to those other socio-economic factors. However, it is never possible to include all possible confounding variables in an empirical analysis.
Data mining Privacy concerns and ethics Data_mining > Privacy concerns and ethics However, even "anonymized" data sets can potentially contain enough information to allow identification of individuals, as occurred when journalists were able to find several individuals based on a set of search histories that were inadvertently released by AOL.The inadvertent revelation of personally identifiable information leading to the provider violates Fair Information Practices. This indiscretion can cause financial, emotional, or bodily harm to the indicated individual. In one instance of privacy violation, the patrons of Walgreens filed a lawsuit against the company in 2011 for selling prescription information to data mining companies who in turn provided the data to pharmaceutical companies.
HTTP protocol Summary of HTTP milestone versions HTTP_GET > History > Summary of HTTP milestone versions In January 1997, RFC 2068 was officially released as HTTP/1.1 specifications. In June 1999, RFC 2616 was released to include all improvements and updates based on previous (obsolete) HTTP/1.1 specifications. W3C HTTP-NG Working Group Resuming the old 1995 plan of previous HTTP Working Group, in 1997 an HTTP-NG Working Group was formed to develop a new HTTP protocol named HTTP-NG (HTTP New Generation).
Quantum Liouville equation Definition and motivation Density_Matrix > Definition and motivation Conversely, it follows from the spectral theorem that every operator with these properties can be written as ∑ j p j | ψ j ⟩ ⟨ ψ j | {\textstyle \sum _{j}p_{j}\left|\psi _{j}\right\rangle \left\langle \psi _{j}\right|} for some states | ψ j ⟩ {\displaystyle \left|\psi _{j}\right\rangle } and coefficients p j {\displaystyle p_{j}} that are non-negative and add up to one. : 102 However, this representation will not be unique, as shown by the Schrödinger–HJW theorem. Another motivation for the definition of density operators comes from considering local measurements on entangled states.
Artificial gravity Summary Artificial_gravity Artificial gravity is the creation of an inertial force that mimics the effects of a gravitational force, usually by rotation. Artificial gravity, or rotational gravity, is thus the appearance of a centrifugal force in a rotating frame of reference (the transmission of centripetal acceleration via normal force in the non-rotating frame of reference), as opposed to the force experienced in linear acceleration, which by the equivalence principle is indistinguishable from gravity. In a more general sense, "artificial gravity" may also refer to the effect of linear acceleration, e.g. by means of a rocket engine.Rotational simulated gravity has been used in simulations to help astronauts train for extreme conditions. Rotational simulated gravity has been proposed as a solution in human spaceflight to the adverse health effects caused by prolonged weightlessness.
Regular complex polytope Summary Complex_polytope In geometry, a complex polytope is a generalization of a polytope in real space to an analogous structure in a complex Hilbert space, where each real dimension is accompanied by an imaginary one. A complex polytope may be understood as a collection of complex points, lines, planes, and so on, where every point is the junction of multiple lines, every line of multiple planes, and so on. Precise definitions exist only for the regular complex polytopes, which are configurations. The regular complex polytopes have been completely characterized, and can be described using a symbolic notation developed by Coxeter. Some complex polytopes which are not fully regular have also been described.
Levi–Lechicki theorem Summary Levi–Lechicki_theorem Wijsman convergence is a variation of Hausdorff convergence suitable for work with unbounded sets. Intuitively, Wijsman convergence is to convergence in the Hausdorff metric as pointwise convergence is to uniform convergence.
Fault diagnosis Mathematics and logic Laboratory_diagnostics > Mathematics and logic Bayesian probability Block Hackam's dictum Occam's razor Regression diagnostics Sutton's law
Torque steer Summary Torque_steer Torque steer is directly related to differences in the forces in the contact patches of the left and right drive wheels. The effect becomes more evident when high torques are applied to the drive wheels because of a high overall reduction ratio between the engine and wheels, high engine torque, or some combination of the two. Torque steer is distinct from steering kickback.
Document summarization Unsupervised approach: TextRank Automatic_summarisation > Applications and systems for summarization > Keyphrase extraction > Unsupervised approach: TextRank For example, in a text about machine learning, the unigram "learning" might co-occur with "machine", "supervised", "un-supervised", and "semi-supervised" in four different sentences. Thus, the "learning" vertex would be a central "hub" that connects to these other modifying words. Running PageRank/TextRank on the graph is likely to rank "learning" highly.
Simulation of production systems Flight Simulation_of_production_systems > More examples of simulation > Flight Another advantage is reduced environmental impact, as simulators don't contribute directly to carbon or noise emissions.There also exist "engineering flight simulators" which are a key element of the aircraft design process. Many benefits that come from a lower number of test flights like cost and safety improvements are described above, but there are some unique advantages. Having a simulator available allows for faster design iteration cycle or using more test equipment than could be fit into a real aircraft.
Turing equivalence (recursion theory) Post's problem and the priority method Recursively_enumerable_Turing_degree > Post's problem and the priority method degrees, which came to be known as the priority method. The priority method is now the main technique for establishing results about r.e. sets.
Semiconductor Devices Improvements in transistor design Semiconductor_electronics > History of semiconductor device development > Improvements in transistor design From the late 1950s, most transistors were silicon-based. Within a few years transistor-based products, most notably easily portable radios, were appearing on the market. "Zone melting", a technique using a band of molten material moving through the crystal, further increased crystal purity.
Hard privacy technologies Summary Hard_privacy_technologies Hard privacy technologies are methods of protecting data. Hard privacy technologies and soft privacy technologies both fall under the category of privacy enchancing technologies. Hard privacy technologies allow online users to protect their privacy through different services and applications without the trust of the third-parties. The data protection goal is data minimization and reduction of the trust in third-parties and the freedom (and techniques) to conceal information or to communicate. Applications of hard privacy technologies include onion routing, VPNs and the secret ballot used for democratic elections.
Secure Enclave Address Space Layout Randomization Secure_Enclave > Security and privacy > Address Space Layout Randomization Address Space Layout Randomization (ASLR) is a low-level technique of preventing memory corruption attacks such as buffer overflows. It involves placing data in randomly selected locations in memory in order to make it more difficult to predict ways to corrupt the system and create exploits. ASLR makes app bugs more likely to crash the app than to silently overwrite memory, regardless of whether the behavior is accidental or malicious.