sentence1
stringlengths
1
133k
sentence2
stringlengths
1
131k
Pregnancy Abortion, the termination of pregnancy Late-term abortion Abortion debate, ongoing debate surrounding abortion Spaceflight, particularly a mode resulting in the return of the spacecraft to Earth: Apollo abort modes Space Shuttle abort modes Arts, entertainment, and media Abort (album), a 1991 album by the ban...
of some process or relationship: Abort (computing), to terminate a computer processing or data transfer activity Paper abortion (also known as a financial abortion or a statutory abort), the proposed ability of a biological father, before the birth of the child, to opt out of any rights, privileges, and
may refer to: Gain (electronics), an increase in power or amplitude of a signal across a two-port circuit Antenna
directivity and electrical efficiency Absolute gain (international relations), in liberal international relations theory
song by Martin Garrix Access 5, a NASA program Access Linux Platform, an operating system for mobile devices Access network, the process of signing onto a network Access Virus, a German musical device Experimental Assembly of Structures in EVA and Assembly Concept for Construction of Erectable Space Structures (EASE an...
"Access" (The West Wing), an episode of The West Wing Other uses Access (group), a Japanese pop duo "Access" (song), a 2018 song by Martin Garrix Access 5, a NASA program Access Linux Platform, an operating system for mobile devices Access network, the process of signing onto a network Access Virus, a German musical de...
also controlled, a second reader is used on the opposite side of the entry.) Locking hardware, such as electric door strikes and electromagnetic locks A magnetic door switch for monitoring door position Request-to-exit (RTE) devices for allowing egress. When a RTE button is pushed, or the motion detector detects motion...
wasted capacity when using IP readers (e.g. a 4-door controller would have 25% of unused capacity if it was controlling only 3 doors). IP reader systems scale easily: there is no need to install new main or sub-controllers. Failure of one IP reader does not affect any other readers in the system. Disadvantages: In orde...
or the requested data returned In a computer, it is the time interval between the instant at which an instruction control unit initiates a call for data or a request to store data, and the instant at
delivery of the data is completed or the storage is started. See also Memory latency Mechanical latency Rotational latency Seek time References
In the case of a modem, this corresponds to 1000 tones per second; similarly, in the case of a line code, this corresponds to 1000 pulses per second. The symbol duration time is second (that is, 1 millisecond). In digital systems (i.e., using discrete/discontinuous values) with binary code, 1 Bd = 1 bit/s. By contrast,...
only one bit per symbol, such that binary digit "0" is represented by one symbol, and binary digit "1" by another symbol. In more advanced modems and data transmission techniques, a symbol may have more than two states, so it may represent more than one bit. A bit (binary digit) always represents one of two states. If ...
the telephone company, most had the same shape, simplifying the physical interface. A microphone and a speaker inside the modem box would pick up and transmit the signaling tones, and circuitry would convert those audio frequency-shift keying encoded binary signals for an RS232 output socket. With luck one could get 30...
sound from the ear piece of the telephone handset to electrical signals, and converted the electrical pulses coming from the teletypewriter to sound that goes into the mouth piece of the telephone handset. His acoustic coupler is known as the Weitbrecht Modem. The Weitbrecht Modem inspired other engineers to develop ot...
populated by a pump source. Examples of active laser media include: Certain crystals, typically doped with rare-earth ions (e.g. neodymium, ytterbium, or erbium) or transition metal ions (titanium or chromium); most often yttrium aluminium garnet (Y3Al5O12), yttrium orthovanadate (YVO4), or sapphire (Al2O3); and not of...
of amplification of optical signals, the lasing frequency is called signal frequency. If the externally provided energy required for the signal's amplification is optical, it would necessarily be at the same or higher pump frequency. Cross-sections The simple medium can be characterized with effective cross-sections of...
to resist degradation. The modification of a system parameter may be discrete, as in hard-switched diversity reception, or may be continuous, as
any communications system, or portion thereof, that automatically uses feedback information obtained from the system itself or from the signals carried by the system to modify dynamically one or more of the system
values of the quantized signals. APC is related to linear predictive coding (LPC) in that both use adaptive predictors. However, APC uses fewer prediction coefficients, thus requiring a higher sampling rate than LPC. References Digital signal
values of the quantized signals. APC is related to linear predictive coding (LPC) in that both use adaptive predictors. However, APC uses fewer prediction coefficients,
operations an ALU should perform (based on the op code being executed) and sets the ALU operation. The D input to the adder–subtractor above would be one such control line from the control unit. The adder–subtractor above could easily be extended to include more functions. For example, a 2-to-1 multiplexer could be int...
It is also possible to construct a circuit that performs both addition and subtraction at the same time. Construction Having an n-bit adder for A and B, then . Then, assume the numbers are in two's complement. Then to perform , two's complement theory says to invert each bit of A with a NOT gate then add one. This yiel...
The Address may also refer to: The Address (film), a 2014 film by Ken Burns Buildings Address Boulevard, a hotel in Dubai Address Downtown, a hotel in Dubai Computing , an HTML element An (often-virtual) location in an address space which corresponds to a logical or physical entity Other
entity Other uses Public speaking, the process of speaking to a group of people in a structured, deliberate manner Style (manner of address), a legal, official, or recognized title In golf, to line up the club with the
modulation products in FM systems), improper tuning or poor frequency control (in the reference channel, the interfering channel or both). ACI is distinguished from crosstalk. Origin The adjacent-channel interference which receiver A experiences from a transmitter B is the sum of the power that B emits into A's channel...
that B emits into A's channel—known as the "unwanted emission", and represented by the ACLR (Adjacent Channel Leakage Ratio)—and the power that A picks up from B's channel, which is represented by the ACS (Adjacent Channel Selectivity). B emitting power into A's channel is called adjacent-channel leakage (unwanted emis...
differences between the standards are mainly editorial, there is one meaningful difference: ADCCP's definition of the basic subset required to implement balanced asynchronous mode includes the RSET frame, while HDLC makes it optional. One major difference between the two is the unnumbered (U) format. When extended (7-b...
and ANSI standards writers coordinated their work, so the differences between the standards are mainly editorial, there is one meaningful difference: ADCCP's definition of the basic subset required to implement balanced asynchronous mode includes the RSET frame, while HDLC makes it optional. One major difference betwee...
ground to a point above ground, followed by an overhead run, e.g. on poles, followed by a drop back into the ground. An
that rises from ground to a point above ground, followed by an overhead run, e.g. on poles, followed by a drop back into the ground. An aerial insert is used in places
provide the President and the Federal Government, as well as multiple heads of state and local governments, or their designated representatives, and the aeronautical industry with an expeditious means of communications
or their designated representatives, and the aeronautical industry with an expeditious means of communications during an emergency. References Title 47 of the Code of Federal Regulations Telecommunications in the
PBX to the public switched telephone network or to switched service networks (e.g., EPSCS), so that a vendor can provide a detailed monthly bill identifying long distance calling usage by individual PBX stations, tie trunks, or the attendant console.
outward dialing (AIOD) data from a PBX to the public switched telephone network or to switched service networks (e.g., EPSCS), so that a vendor can
flexibility, or physical security of communications systems. The aircraft may be manned or unmanned aerial vehicles. Use in Vietnam One of the first uses of airborne radio relay was by the United States Army's 1st Cavalry Division in the Battle of Ia Drang during the Vietnam War, which employed the technique to improve...
the limitations of the aircraft used as relays. The 1st Cavalry Division had originally used C-7 Caribous as the relay aircraft, but when these planes were turned over to the Air Force, the equipment was installed in single-engine Otter aircraft, which were too underpowered to carry the heavy equipment required for rel...
condition within the system and provide a signal indicating the presence or nature of the abnormality to either a local or remote alarm indicator, and (b) may detect events ranging from a simple contact opening or closure to a time-phased automatic shutdown and restart cycle. 2. In a physical security system, an approv...
security system, an approved device used to indicate a change in the physical environment of a facility or a part thereof. 3. In electronic security systems, a physical device or change/presence of any electronic signal/logic which causes trigger to electronic circuit to perform application specific operation. In elect...
of worse proportional distortion for small signals. By convention, A-law is used for an international connection if at least one country uses it. See also μ-law algorithm Audio level compression Signal compression Companding G.711 DS0 Tapered floating point External links Waveform Coding Techniques - Has details of imp...
parameter. In Europe, . A-law expansion is given by the inverse function, The reason for this encoding is that the wide dynamic range of speech does not lend itself well to efficient linear digital encoding. A-law encoding effectively reduces the dynamic range of the signal, thereby increasing the coding efficiency and...
over observation time τ, the y(t) is the fractional-frequency error at time t, and τ is the observation time. Since y(t) is the derivative of x(t), we can without loss of generality rewrite it as Estimators This definition is based on the statistical expected value, integrating over infinite time. The real-world situat...
(PM). The following is the time variance estimation based on the modified Allan variance: and similarly for modified Allan deviation to time deviation: The TDEV is normalized so that it is equal to the classical deviation for white PM for time constant τ = τ0. To understand the normalization scale factor between the st...
the product of the investigation is a sound level contour map. Alternatively ambient noise levels may be measured to provide a reference point for analyzing an intrusive sound to a given environment. For example, sometimes aircraft noise is studied by measuring ambient sound without presence of any overflights, and the...
roadway noise is measured as ambient sound, prior to introducing a hypothetical noise barrier intended to reduce that ambient noise level. Ambient noise level is measured with a sound level meter. It is usually measured in dB relative to a reference pressure of 0.00002 Pa, i.e., 20 μPa (micropascals) in SI units. This ...
for integer m and n. Generally the size of the unwanted output falls rapidly as m and n increase. Due to the additional outputs, this form of distortion is definitely unwanted in audio, radio and telecommunication amplifiers, and it occurs for more than two waves as well. In a narrowband system such as a radio communic...
Ic is collector current and Ib is base current, following linear relation y=mx. When output is not in this portion, two forms of amplitude distortion might arise Harmonic distortion : The creation of harmonics of the fundamental frequency of a sine wave input to a system. Intermodulation distortion : This form of disto...
axes of source-to-waveguide, waveguide-to-waveguide, or waveguide-to-detector. The waveguide may be dielectric (an optical fiber) or metallic. Angular misalignment loss does not include
construction, angular misalignment loss is power loss caused by the deviation from optimum angular alignment of the axes of source-to-waveguide, waveguide-to-waveguide, or waveguide-to-detector. The waveguide may be
antenna blind cone. The antenna blind cone is also referred to as the "cone of silence", especially in America. This term is also used for weather radars. NEXRAD radars make two-dimensional scans at varying angles ranging from 0.5° above level to 19.5° above level (during a significant weather event). These levels beco...
cone. The antenna blind cone is also referred to as the "cone of silence", especially in America. This term is also used for weather radars. NEXRAD radars make two-dimensional scans at varying angles ranging from 0.5° above level to 19.5° above level (during a significant weather event). These levels become much closer...
ideal noise-free receiver that would generate the same output noise power per unit bandwidth as that at the antenna output at a specified frequency. In other words, antenna noise temperature is a parameter that describes how much noise an antenna produces in a given environment. This temperature is not the physical tem...
an antenna produces in a given environment. This temperature is not the physical temperature of the antenna. Moreover, an antenna does not have an intrinsic "antenna temperature" associated with it; rather the temperature depends on its gain pattern and the thermal environment that it is placed in. Antenna noise temper...
gain that can be realized in practice. Note 1: Aperture-to-medium coupling loss is related to the ratio of the scatter angle to the antenna beamwidth. Note 2: The "very large antennas" are referred to in wavelengths; thus,
1: Aperture-to-medium coupling loss is related to the ratio of the scatter angle to the antenna beamwidth. Note 2: The
and logical left shifts and multiplication Arithmetic left shifts are equivalent to multiplication by a (positive, integral) power of the radix (e.g., a multiplication by a power of 2 for binary numbers). Logical left shifts are also equivalent, except multiplication and arithmetic shifts may trigger arithmetic overflo...
However, the IDIV instruction (signed divide) divides a signed number, rounding towards zero. So a SAR instruction cannot be substituted for an IDIV by power of two instruction nor vice versa. Formal definition The formal definition of an arithmetic shift, from Federal Standard 1037C is that it is: A shift, applied to ...
three protocols usually use some form of sliding window protocol to help the sender determine which (if any) packets need to be retransmitted. These protocols reside in the data link or transport layers (layers 2 and 4) of the OSI model. Examples The Transmission Control Protocol uses a variant of Go-Back-N ARQ to ensu...
in the data link or transport layers (layers 2 and 4) of the OSI model. Examples The Transmission Control Protocol uses a variant of Go-Back-N ARQ to ensure reliable transmission of data over the Internet Protocol, which does not provide guaranteed delivery of packets; with Selective Acknowledgement (SACK), it uses Sel...
understood over a channel perturbed by interference. Articulation scores have been experimentally obtained as functions of varying word content, bandwidth, audio signal-to-noise ratio and the experience of the talkers
terms of the percentage of words correctly understood over a channel perturbed by interference. Articulation
used to simulate a real transmission line in one or more of these respects. Early artificial lines were used in telephony research and took the form of a cascade of lattice phase equalisers to
transmission time delay, phase shift, or other parameter(s) of a real transmission line. It can be used to simulate a real transmission line in one or more of these respects. Early artificial lines were
such that the operations are executed out of time coincidence with any event. It can also be an operation that occurs without a regular or
working is where a sequence of operations is executed such that the operations are executed out of time coincidence with any event. It can also be an operation that occurs without a regular or predictable time
atmospheric duct is a horizontal layer in the lower atmosphere in which the vertical refractive index gradients are such that radio signals (and light rays) are guided or ducted, tend to follow the curvature of the Earth, and experience less attenuation in the ducts than they would if the ducts were not present. The du...
higher altitudes in the Earth's atmosphere bends the signals back toward the Earth. Signals in a higher refractive index layer, i.e., duct, tend to remain in that layer because of the reflection and refraction encountered at the boundary with a lower refractive index material. In some weather conditions, such as invers...
at the input of a device or circuit exceeds the activation threshold of the device or circuit and the instant that the device or circuit reacts in a specified manner, or to a specified degree, to the input.
compressors, and voxes. See also Transmitter attack-time delay Federal Standard 1037C Fall time Overshoot (signal) ADSR envelope References Telecommunication theory Audio
Microsoft Windows during the early and mid-1990s. Parts of ARJ were covered by (expired). ARJ is well-documented and includes over 150 command line switches. File format support in other software ARJ archives can be unpacked with various tools other than the ARJ software. There exists a free software re-implementation ...
64-bit Intel architectures. ARJ was one of many file compression utilities for MS-DOS and Microsoft Windows during the early and mid-1990s. Parts of ARJ were covered by (expired). ARJ is well-documented and includes over 150 command line switches. File format support in other software ARJ archives can be unpacked with ...
a frequency of 1 MHz are listed below: There are two general ways of acoustic energy losses: absorption and scattering. Ultrasound propagation through homogeneous media is associated only with absorption and can be characterized with absorption coefficient only. Propagation through heterogeneous media requires taking i...
yellow wavelengths are totally absorbed at shallower depths, while blue and violet wavelengths reach deeper in the water column. Because the blue and violet wavelengths are absorbed least compared to the other wavelengths, open-ocean waters appear deep blue to the eye. Near the shore, coastal water contains more phytop...
a specific regulatory sequence transcribed into RNA. Impact attenuator, used on highways as a crumple zone in case of a car crash. See also
reduces the amplitude of an electronic signal. Optical attenuator, an electronic device that reduces the amplitude of an optical signal. Attenuator
of statistic for a fictional character See also Attribute clash, a display artefact on some home computers Attribute
Attribute (philosophy), an extrinsic property of an object Attribute (research), a characteristic of an object Grammatical modifier, in natural languages Attribute (computing), a specification
employee's usage. Auditing methods and consultants In business, companies with significant telecommunications costs or a telecommunications focus normally either conduct audits internally or hire a consultant. No matter the method, typical audits encompass one or more of the following: Telecom Expense Management (TEM):...
of telecommunication systems often conducted by an independent telecommunications consultant or firm. The simplest audits consist of comparing current telecommunications billing and usage to the underlying rate structure whether that is dictated by contract, tariff, or price list. Complex audits utilize software applic...
the trail file or database table with a trail should not be accessible to normal users. Another way of handling this issue is through the use of a role-based security model in the software. The software can operate with the closed-looped controls, or as a 'closed system', as required by many companies when using audit ...
data about a working framework, an application, or client exercises. Computer frameworks may have a few audit trails each gave to a specific sort of action. Related to proper apparatuses and systems, audit trails can help with distinguishing security infringement, execution issues and application issues. Routine log au...
Aurora, Texas Aurora, Utah Aurora, West Virginia Aurora, Florence County, Wisconsin, a town Aurora (community), Florence County, Wisconsin, an unincorporated community Aurora, Kenosha County, Wisconsin Aurora, Taylor County, Wisconsin Aurora, Washington County, Wisconsin Aurora, Waushara County, Wisconsin Other places ...
Aurora (Nico Touches the Walls album), 2009 Aurora (Susumu Hirasawa album), 1994 Aurora (Ben Frost album), 2014 Aurora (Bea Miller album), 2018 Aurora, a 2009 album by Avishai Cohen Aurora, a 1995 album by Crash Vegas Aurora, a 2013 album by Joey Moe Songs "Aurora" (Foo Fighters song), 1999 "Aurora" (Lights Action song...
4226 and RFC 6238, respectively. By OATH OTP, we mean either HOTP or TOTP. OATH certifies conformance with the HOTP and TOTP standards. A traditional password (something that one knows) is often combined with a one-time password (something that one has) to provide two-factor authentication. Both the password and the OT...
a TUP consists of a simple button push. A U2F authenticator interoperates with a conforming web user agent that implements the U2F JavaScript API. A U2F authenticator necessarily implements the CTAP1/U2F protocol, one of the two protocols specified in the FIDO Client to Authenticator Protocol. Unlike mobile push authen...
processing systems, networks, or other electronic information handling systems, and associated equipment. Management information systems are a common example of automated information systems. See also Federal Standard 1037C National Information Assurance Glossary References Information
are computers, word processing systems, networks, or other electronic information handling systems, and associated equipment. Management information systems are a common example of automated information systems. See also Federal Standard 1037C National Information Assurance Glossary References Information systems
computer hardware and software functions, characteristics and features; operational procedures; accountability procedures; and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices, such as computers, transmission lines, and p...
stored by automated information systems. The unauthorized disclosure, modification, or destruction may be accidental or intentional. Automated information systems security includes consideration of all computer hardware and software functions, characteristics and features; operational procedures; accountability procedu...
CALLBK when you hear the busy tone. Answer the callback by lifting the handset or pressing MON. Inter-Tel Eclipse IDS Integrated Operator Terminal Press the Call Back key at the busy signal. Press the RLS key. When your line is free and the extension you called is idle, your extension will ring. When the calls rings ba...
implemented in the terminal, in the telephone exchange, or shared between them. Automatic callback is not the same as camp-on. Using callback on popular business telephone systems Comdial Digitech, DSU, Impact Place an intercom call and press CAMP. Your phone will disconnect from the attempted call. When the phone you ...
"the invention of ACD technology made the concept of a call centre possible." Background Private Branch Exchange (PBX) was a telephone exchange device that acted as a mini-switchboard to route phone calls. The closed nature of PBXs limited flexibility, and a system was designed to enable common computing devices to mak...
can be shared amongst the contact center sites. An additional function for these external routing applications is to enable Computer telephony integration (CTI), which improves efficiency for call center agents by matching incoming phone calls with relevant data via screen pop. Criticism The system has been met with cr...
using mechanical or electronic equipment, Electronic
services company. Data processing using mechanical or electronic
and end-users of the existing coordinated architecture. Common applications An ALE radio system enables connection for voice conversation, alerting, data exchange, texting, instant messaging, email, file transfer, image, geo-position tracking, or telemetry. With a radio operator initiating a call, the process normally ...
with significantly improved capability and performance was included in MIL-STD-188-141B, retaining backward compatibility with 2G ALE, and was adopted in NATO STANAG 4538. Civilian and non-government adoption rates are much lower than 2G ALE due to the extreme cost as compared to surplus or entry-level 2G gear as well ...
the transfer of a message from message injection to addressee reception, without human intervention. Through the use of
Automatic message exchange (AME): In an adaptive high-frequency (HF) radio network, an automated process allowing the transfer of a
Note: Automatic redial is often associated with the telephone instrument, but may be provided by a PBX, or by the central office.
calling unit. Often one must subscribe to a caller ID for use of this function on a landline. References Calling features Telecommunications
automatic sounding is the testing of selected channels for quality by providing a very brief identifying transmission that may be used by other stations to evaluate connectivity, and availability, and to identify known working channels for immediate or later use for communications or calling. They are often used to mai...
throughput. In ALE, the sounding information consists of a heavily error-corrected short message identifying the sender. Recipients decode it and use the bit error rate to calculate and store a (channel, node, quality) tuple. As ionospheric conditions and mobile-node locations change, these quality tuples will shift. T...
executed in response to signals from a user end-instrument. In an automatic switching system, the information-transfer transaction is performed without human intervention, except for initiation of the access phase and the disengagement phase by a user. In telephony, it refers to a telephone exchange in which all the op...
a user. In telephony, it refers to a telephone exchange in which all the operations required to set up, supervise, and release connections required for telephone calls are automatically performed in response to signals from a calling device. This distinction
in energy systems. This explains for how a significant portion of emissions come from commercial vehicles. Diesel engines operating within densely populated areas, running within an ineffective range in order to power their auxiliary systems, such as refrigeration, are contributors to a large portion of the emissions f...
outages of the order of days; Class C, a 10-to-60-second quick-start unit to cover short-term outages of the order of hours; and Class D, an uninterruptible non-break unit using stored energy to provide continuous power within specified voltage and frequency tolerances. History Uses/Implementations Many uses and implem...
MTTR). The impact of a one-off/non-repairable element (could be refurbished/remanufactured) on the availability of the system, in which it operates, equals the mean time to failure (MTTF)/(MTTF + the mean time to repair MTTR). It is based on quantities under control of the designer. Availability, achieved (Aa) The prob...
analysis of an engineering design: The impact of a repairable-element (refurbishing/remanufacture isn't repair, but rather replacement) on the availability of the system, in which it operates, equals mean time between failures MTBF/(MTBF+ mean time to repair MTTR). The impact of a one-off/non-repairable element (could ...
business magazine Backbone (gaming platform), a hardware and software platform Backbone (video game), a 2021 indie video game Backbone Entertainment, a video game development company Places Backbone, Virginia, US European backbone, or "Blue Banana", a geographic corridor of urbanisation in Western Europe Backbone State...
(Backbone album), 1998 Backbone (Boney James album), 1993 Backbone (Roam album), 2016 Backbone (Anthony Callea album), 2016 Backbone (Status Quo album), 2019 Songs "At the End of the Day / Backbone", 1993 song by Baby Animals "Backbone", 2005 song by Gojira from the album From Mars to Sirius "Backbone" (Daughtry song),...
of a similar or related device. Telecommunications In telecommunications, a back-to-back connection can be formed by connecting a transmitter directly to a receiver without a transmission line in between. This is used for equipment measurements and testing purposes. The back-to-back connection eliminates the effects of...
the direct connection of the output of one device to the input of a similar or related device. Telecommunications In telecommunications, a back-to-back connection can be formed by connecting a transmitter directly to a receiver without a transmission line in between. This is used for equipment measurements and testing ...
channel, considered a backward channel for some types of analysis, typically has a bandwidth less than one-fourth of the downstream channel. In data transmission, it is a secondary channel in which the direction of transmission is constrained to be opposite to that of the primary, i.e., the forward (user-information) c...
that passes data in a direction opposite to that of its associated forward channel. The backward channel is usually used for transmission of request, supervisory, acknowledgement, or error-control signals. The direction of flow of these signals is opposite to that in which user information is being transferred. The bac...
the difference between the wires, it is not influenced by the induced noise voltage. If a balanced line is used in an unbalanced circuit, with different impedances from each conductor to ground, currents induced in the separate conductors will cause different voltage drops to ground, thus creating a voltage differentia...
signal over a balanced line reduces the influence of noise or interference due to external stray electric fields. Any external signal sources tend to induce only a common mode signal on the line, and the balanced impedances to ground minimizes differential pickup due to stray electric fields. The conductors are sometim...
return loss is one of two things: A measure of the degree of balance between two impedances connected to two conjugate sides of a hybrid set, coil,
of balance between two impedances connected to two conjugate sides of a hybrid set, coil, network, or junction. A measure of the effectiveness with which a balancing
balance, the impedance of a uniform transmission line, (e.g., a twisted metallic pair, coaxial cable, etc.) over a selected range of frequencies. A balancing network is required to ensure isolation between the two ports of the four-wire side of the hybrid. A balancing network can also be a device used between a balance...
A balancing network can also be a device used between a balanced device or line and an unbalanced device or line for the purpose of transforming from balanced to unbalanced or from unbalanced to balanced. Source: from Federal Standard 1037C and from MIL-STD-188 References See also
lossless data compression techniques. For more information read the Increasing speeds section in the Modem article. Bandwidth Compression is a core feature of WAN Optimization appliances
given amount of data in a given bandwidth. Bandwidth compression implies a reduction in normal bandwidth of an information-carrying signal without reducing the information content of the signal. This can be accomplished with lossless data compression techniques. For more information read the Increasing speeds section i...
any single radar. Early radar systems typically operated on a single frequency, and could only change that frequency by changing internal electronics. Against these radars, it was possible to use conventional radio sets to send out signals on the same band, causing the radar display to be filled with noise whenever the...
nearby area as well. "Barrage" refers to systems that send signals in many bands of frequencies compared to the bandwidth of any single radar. This allows the jammer to jam multiple radars at once, and reduces or eliminates the need for adjustments to respond to any single radar. Early radar systems typically operated ...
In telecommunications, baseband is the range of frequencies occupied by a signal that has not been modulated to higher frequencies. Baseband signals typically originate from transducers, converting some other variable into an electrical signal. For example, the output of a microphone is a baseband signal that is an ana...
Examples are serial cables and local area networks (LANs), as opposed to passband channels such as radio frequency channels and passband filtered wires of the analog telephone network. Frequency division multiplexing (FDM) allows an analog telephone wire to carry a baseband telephone call, concurrently as one or severa...
service that can extend telephone service to rural areas by replacing the local loop with radio communications.
frequency (VHF) common carrier and the private radio service frequencies are shared. External links Further details by
An optional unbundled feature, generally associated with the basic serving arrangement (BSA), that an enhanced-service provider (ESP) may require or find useful in configuring an enhanced service. A fundamental (basic)
feature, generally associated with the basic serving arrangement (BSA), that an enhanced-service provider (ESP) may require or find useful in configuring an enhanced service. A fundamental (basic)
(ESP) to and through the operating company's network including an ESP access link, the features and functions associated with that access link at the central office serving the ESP and/or other offices, and the transport (dedicated or switched) within the network that completes the connection from the ESP to the centra...
network. In an open-network-architecture context, the fundamental underlying connection of an enhanced service provider (ESP) to and through the operating company's network including an ESP access link, the features and functions associated with that access link at the central office serving the ESP and/or other office...
for odd indices each of degree at most . A BCH code has minimal Hamming distance at least . Suppose that is a code word with fewer than non-zero terms. Then Recall that are roots of hence of . This implies that satisfy the following equations, for each : In matrix form, we have The determinant of this matrix equals The...
errors. It has 1 data bit and 14 checksum bits. In fact, this code has only two codewords: 000000000000000 and 111111111111111. General BCH codes General BCH codes differ from primitive narrow-sense BCH codes in two respects. First, the requirement that be a primitive element of can be relaxed. By relaxing this require...
beam-shape dependent. Therefore, the 10/90 or 20/80 knife-edge width is a useful metric when the user wishes to be sure that the width encompasses a fixed fraction of total beam power. Most CCD beam profiler's software can compute the knife-edge width numerically. Fusing knife-edge method with imaging The main drawback...
beam does not fill more than a third of the beam profiler's sensor area, then there will be a significant number of pixels at the edges of the sensor that register a small baseline value (the background value). If the baseline value is large or if it is not subtracted out of the image, then the computed D4σ value will ...
the rear focal plane of the lens, i.e. where the focus would lie for a truly collimated beam, and not at the actual focus of the beam, which would occur behind the rear focal plane for a divergent beam. Like all electromagnetic beams, lasers are subject to divergence, which is measured in milliradians (mrad) or degrees...
i.e. where the focus would lie for a truly collimated beam, and not at the actual focus of the beam, which would occur behind the rear focal plane for a divergent beam. Like all electromagnetic beams, lasers are subject to divergence, which is measured in milliradians (mrad) or degrees. For many applications, a lower-d...
was pioneered in the early 1990s by Duran Audio who launched a technology called DDC (Digital Directivity Control). In optical systems, beam steering may be accomplished by changing the refractive index of the medium through which the beam is transmitted or by the use of mirrors, prisms, lenses, or rotating diffraction...
is known as a line array. This technique has been around for many years but since the emergence of modern DSP (Digital Signal Processing) technology there are now many commercially available products on the market. Beam Steering and Directivity Control using DSP was pioneered in the early 1990s by Duran Audio who launc...
Belenus or Bel; a Celtic deity Bel (mythology), a title (meaning "lord" or "master") for various gods in Babylonian religion People Bel (name) Annabel Linquist, known as Bel, American artist, musician, and entrepreneur Places Bél, the Hungarian name for Beliu Commune, Arad County, Romania Bel Mountain, in the Zagros Mo...
Bel Mountain, in the Zagros Mountains of western and southwestern Iran Bel, Iran (disambiguation) Bel, Osh, village in Osh Region, Kyrgyzstan Bel, Syria, village in Aleppo Governorate Temple of Bel in Palmyra, Syria Languages Bel languages, spoken in northern Papua New Guinea ISO 639 code for the Belarusian language Bu...
the result of internal factors such as personality, whereas we tend to assume our own actions arise because of the necessity of external circumstances. There are a wide range of sorts of attribution biases, such as the ultimate attribution error, fundamental attribution error, actor-observer bias, and self-serving bias...
sweetheart deals, kickbacks, funding, donations, campaign contributions, sponsorships, stock options, secret commissions, or promotions. Expectations of when a monetary transaction is appropriate can differ from place to place. Political campaign contributions in the form of cash are considered criminal acts of bribery...
in the bias. In digital signaling, distortion of the signal in which all the significant intervals have uniformly longer or shorter durations than their theoretical durations.
in the bias. In digital signaling, distortion of the signal in which all the significant intervals have uniformly longer or shorter durations than their theoretical durations. Bias distortion
control system between exchanges A and B in which the clock at telephone exchange A controls the data received at
synchronization (or bilateral control) is a synchronization control system between exchanges A and B in which the clock at telephone exchange A controls the data received at exchange B and the clock at exchange
signal is a signal that may assume either of two polarities, neither of which is zero. A bipolar signal may have a two-state non-return-to-zero (NRZ)
or a three-state return-to-zero (RZ) binary coding scheme. A bipolar signal is usually symmetrical with respect to zero amplitude, i.e., the absolute values of the positive and negative signal
that are in the original message. In connection-oriented services, preservation of the number of bits per unit time. Note: Bit-count integrity is not the same as bit integrity, which requires that the delivered
the term bit-count integrity (BCI) has the following meanings: In message communications, the preservation of the exact number of bits that are in the original message. In connection-oriented services, preservation of the number
0 1 0 1 0 0 1, The number of bit errors (the underlined bits) is, in this case, 3. The BER is 3 incorrect bits divided by 9 transferred bits, resulting in a BER of 0.3 or 30%. Packet error ratio The packet error ratio (PER) is the number of incorrectly received data packets divided by the total number of received packe...
that the noise has a bilateral spectral density , is and is . Returning to BER, we have the likelihood of a bit misinterpretation . and where is the threshold of decision, set to 0 when . We can use the average energy of the signal to find the final expression : ±§ Bit error rate test BERT or bit error rate test is a t...
of a 0 bit to 1 or of a 1 bit to 0. It also refers to the changing of a state representing a given bit to the opposite state. Source:
also refers to the changing of a state representing a given bit to the opposite
a number of subsets that have an identical bit representation except for the state of a specified bit. Note: An example of bit
except for the state of a specified bit. Note: An example of bit pairing occurs in the International Alphabet No. 5 and the
sequence, 01111110, for HDLC, SDLC, and ADCCP protocols. Bit-sequence-independence allows only line codes that have the same number of transitions per bit, otherwise, the line code is dependent on the bit sequence
and ADCCP protocols. Bit-sequence-independence allows only line codes that have the same number of transitions per bit, otherwise, the line code is dependent on the bit sequence and, therefore, bit-sequence dependent. Telecommunication
of N consecutive zero bits are sent, clock drift may cause the hardware to apparently detect N-1 zero bits or N+1 zero bits—both kinds of errors are called bit slip. Thus one prevents long strings without change via such devices as run length limited codes. Many communication systems use linear-feedback shift register ...
(or a string of 1s without 0s), it may lose track of the frame between fields, and suffer bit slip. When a pulse of N consecutive zero bits are sent, clock drift may cause the hardware to apparently detect N-1 zero bits or N+1 zero bits—both kinds of errors are called bit slip. Thus one prevents long strings without ch...
fixed time intervals, start and stop signals are not used, and the bit patterns follow each
bits usually occur at fixed time intervals, start and stop signals are not used, and the
does not ensure that the payload is intact (i.e. not corrupted by transmission errors); it is merely a way of attempting to ensure that the transmission starts and ends at the correct places. Error detection and correction techniques are used to check the frame for corruption after its delivery and, if necessary, the f...
stuffing is most easily described as the insertion of a 0 bit after a long run of 1 bits. It was popularized by IBM's SDLC (later renamed HDLC), and is also used in Low- and full-speed USB. After a long sequence of 1 bits there would be no transitions in the transmitted data, and it would be possible for the transmitte...
and one bit is transmitted or received during each clock cycle. Bit-synchronous operation is sometimes erroneously referred to as
one bit is transmitted or received during each clock cycle. Bit-synchronous operation is sometimes erroneously referred to as digital synchronization. References Line
Blind transmissions may occur or be necessary when security constraints, such as radio silence, are imposed, when technical difficulties with a sender's receiver or receiver's transmitter occur, or when lack of time precludes the delay caused by waiting for receipts. Examples In aviation it is common to "transmit in th...
obtaining a receipt, or acknowledgment of reception, from the intended receiving station. Blind transmissions may occur or be necessary when security constraints, such as radio silence, are imposed, when technical difficulties with a sender's receiver or receiver's transmitter occur, or when lack
(programming), a group of declarations and statements treated as a unit Block (telecommunications), a unit of data transmission Block artifact, a type of distortion in a compressed image Block-level element, in the HTML markup language Blocks (C language extension), an extension to the C programming language designed t...
a type of distortion in a compressed image Block-level element, in the HTML markup language Blocks (C language extension), an extension to the C programming language designed to support parallel programming Unicode block, a named range of codepoints in Unicode Block Elements, a Unicode block of block-shaped characters ...
error detection. In longitudinal redundancy checking and cyclic redundancy checking, block check characters are computed for, and added to, each message block
are computed for, and added to, each message block transmitted. This block check character is compared with
of experimental units in groups (blocks) which are similar to one another Atmospheric blocking, a phenomenon in meteorology of large scale stationary pressure cells Blocking, in the western blot technique, a process to prevent unwanted binding of antibodies to a membrane Other technologies Blocking (construction), shor...
phenomenon in meteorology of large scale stationary pressure cells Blocking, in the western blot technique, a process to prevent unwanted binding of antibodies to a membrane Other technologies Blocking (construction), short boards used as reinforcement or to provide attachment points in wood-framed and other forms of c...
series Star Trek: The Next Generation The Bonding (album), a 2013 album by Austrian symphonic metal band Edenbridge Other uses Bonding (dental), a dental procedure in which a dentist applies a resin material to the tooth See also Human bonding Female bonding Male bonding Channel bonding (or modem bonding), an arrangeme...
the television series Kim Possible "The Bonding", a 1989 episode of the television series Star Trek: The Next Generation The Bonding (album), a 2013 album by Austrian symphonic metal band Edenbridge Other uses Bonding (dental), a dental procedure in which a dentist applies a resin material to the tooth See also Human b...
is frequently referred to as a sprig as well, especially when it has been plucked. Other words for twig include branchlet, spray, and surcle, as well as the technical terms surculus and ramulus. Branches found under larger branches can be called underbranches. Some branches from specific trees have their own names, suc...
as osiers and withes or withies, which come from willows. Often trees have certain words which, in English, are naturally collocated, such as holly and mistletoe, which usually employ the phrase "sprig of" (as in, a "sprig of mistletoe"). Similarly, the branch of a cherry tree is generally referred to as a "cherry bran...
reflected light is near, or usually well beyond the Brewster angle) is strongly s-polarized. Polarized sunglasses use a sheet of polarizing material to block horizontally-polarized light and thus reduce glare in such situations. These are most effective with smooth surfaces where specular reflection (thus from light wh...
rays are mutually perpendicular. For magnetic materials, Brewster's angle can exist for only one of the incident wave polarizations, as determined by the relative strengths of the dielectric permittivity and magnetic permeability. This has implications for the existence of generalized Brewster angles for dielectric met...
loss is the loss, at a given frequency, that results when an impedance is connected across a transmission line. It is expressed as the ratio, in decibels, of the signal power delivered to
loss is not applicable to the high-impedance input conditions. The term is also used in telephone practice and synonymous with the insertion loss that result from bridging an impedance across a circuit. References Source: from Federal Standard 1037C and from MIL-STD-188
be used only for non-quantitative references to physiological sensations and perceptions of light. With regard to stars, brightness is quantified as apparent magnitude and absolute magnitude. Brightness is an antonym of dimness or dullness. New meaning The United States Federal Trade Commission (FTC) has assigned an un...
Old English beorht with the same meaning via metathesis giving Middle English briht. The word is from a Common Germanic , ultimately from a PIE root with a closely related meaning, * "white, bright". "Brightness" was formerly used as a synonym for the photometric term luminance and (incorrectly) for the radiometric ter...
electronics or telecommunications Buffer stop, a device that keeps rail vehicles on tracks Buffer wheel, a device used to smooth a workpiece's surface Digital buffer, an electronic circuit used to isolate the input from the output Floor buffer, an appliance used to polish hard floors Optical buffer, a device that store...
map feature Buffer (optical fiber), a GG component of a fiber optic cable Buffer (rail transport), a device that cushions impacts between vehicles Buffer amplifier, an isolating circuit used in electronics or telecommunications Buffer stop, a device that keeps rail vehicles on tracks Buffer wheel, a device used to smoo...
from an incoming packet header to establish and maintain the appropriate switch connection for the duration of the packet, following which the connection is automatically released. In concept, burst switching is similar to connectionless mode transmission, but differs
released. In concept, burst switching is similar to connectionless mode transmission, but differs in that burst switching implies an intent to establish the switch connection in near real time so that only minimum buffering is required at the node switch. A variant of burst switching used in optical networks is optical...
Kingdom and South African TV programmes to transmit large amounts of primarily textual information. They would display multiple pages of text in rapid succession, usually at the end of the programme; viewers would videotape it and then read it later by playing it back using the pause button after
back using the pause button after each page. Data bursts can occur naturally, such as when the download of data from the internet briefly experiences higher speeds. It can also occur in a computer network where data transmission is interrupted at intervals. Burst transmission enables communications between data termina...
a connection, indicating the requested connection cannot be completed. Busy Signal (born 1982), or Reanno Gordon, a dancehall singer from Jamaica "Busy Signal", a song by Prefuse 73 from the 2003 album
A busy signal is information communicated to a user or apparatus attempting a connection, indicating the requested connection cannot be completed. Busy Signal (born
Bleach bypass, an optical effect Bypass switch Bypass (telecommunications) Bypass valve A blowoff valve on a compressor A manual gas addition valve on a rebreather Other uses The Bypass, a 2003 short silent Bollywood film Railroad bypass, a new railroad line
and technology Medicine Bypass surgery, a class of surgeries including for example: Heart bypass Gastric bypass Cardiopulmonary bypass Other Bypass capacitor, used to bypass a power supply or other high
of reception to a terminal point from which the signals are distributed to the public. Source: from Federal Standard 1037C
service station (CARS) is a fixed or mobile station used for the transmission of television and related audio signals, signals of standard and FM broadcast stations, signals of instructional television fixed stations, and cablecasting
mechanism used by an application program to request service from the operating system or another application program Nature Animal communication, a song or noise made by an animal such as: Bird call, part of a bird song Mating call, animal communication to attract a sexual partner Game call, a device that is used to an...
the game of contract bridge, a bid, pass, double, or redouble in the bidding stage Music and dance Call (band), from Lahore, Pakistan Call, a command in square dancing, delivered by a caller "Call / I4U", a 2011 single by Japanese music group AAA "Call", a 2002 song by Ashanti from her album Ashanti "Call" (Stray Kids ...