sentence1 stringlengths 1 133k | sentence2 stringlengths 1 131k |
|---|---|
group velocity, i.e., the propagation time. Over a long length of fiber, the cumulative effect is to create jitter, i.e. mode partition noise. The variation of group velocity creates | source and intramodal distortion in the fiber. Mode hopping causes random wavelength changes which in turn affect the group velocity, i.e., the propagation time. Over a long length of fiber, the cumulative effect is |
is the difference in the time delays amongst the fiber's propagating modes caused by imperfections or nonideality of the fiber refractive index profile. The primary purpose of a mode scrambler is to create a uniform, overfilled launch condition that can be easily reproduced on multiple measurement systems, so that meas... | launch or RML), such as occurs with directly coupled laser diodes. There are two common types of mode scramblers: the "Step-Graded-Step" (S-G-S) and the "step index with bends". The S-G-S mode scrambler is actually an assembly, a fusion-spliced concatenation of a step-index profile, a graded-index profile and another s... |
is the profile parameter, and V is the normalized frequency, which must be greater than 5 for this approximation to be valid. See also Equilibrium mode distribution Mode scrambler Mandrel wrapping References Fiber | bound modes that an optical fiber is capable of supporting. The mode volume M is approximately given by and , respectively for step-index and power-law index profile fibers, where g |
for removing other longstanding restrictions on what businesses AT&T could control. The decree replaced the entirety of the previous final judgment of January 24, 1956 in the case United States of America v. Western Electric Company, Incorporated, and American Telephone and Telegraph Company, also known as United State... | States of America v. Western Electric Company, Incorporated, and American Telephone and Telegraph Company, also known as United States v. Western Electric Co. which had been transferred to the United States District Court for the District of Columbia and is referred to in the MFJ as the Western Electric case, and conso... |
user data the marks attributable to the bipolar violations. T-carrier was originally developed for voice applications. When voice signals are digitized for transmission via T-carrier, the data stream always includes ample 1 bits to maintain synchronization. (To help this, the μ-law algorithm for digitizing voice signal... | line code, to create a sufficient number of transitions to maintain synchronization; this is a form of run length limited coding. The receive terminal equipment recognizes the bipolar violations and removes from the user data the marks attributable to the bipolar violations. T-carrier was originally developed for voice... |
fact that the perceived acoustic intensity level or loudness is logarithmic by compressing the signal using a logarithmic-response operational amplifier (Weber-Fechner law). In telecommunications circuits, most of the noise is injected on the lines, thus after the compressor, the intended signal is perceived as signifi... | μ-law algorithm to convert data once it is in the digital domain. Software/DSP Use the continuous version of the μ-law algorithm to calculate the companded values. Usage justification μ-law encoding is used because speech has a wide dynamic range. In analog signal transmission, in the presence of relatively constant ba... |
available to each autonomous system, GLOP is not adequate for large-scale broadcasters. Unicast-prefix-based The range is assigned by as a range of global IPv4 multicast address space provided to each organization that has or larger globally routed unicast address space allocated; one multicast address is reserved per ... | two octets of this block are formed from assigned ASNs, giving any operator assigned an ASN 256 globally unique multicast group addresses. The method is not applicable to the newer 32-bit ASNs. , superseding , envisioned the use of the range for many-to-many multicast applications. Unfortunately, with only 256 multicas... |
particularly bothersome since they move and behave like the normal targets (which they echo), and so the receiver has difficulty in isolating the correct target echo. These problems can be minimized by incorporating a ground map of the radar's surroundings and eliminating all echoes which appear to originate below the ... | as phase which is called multipath fading. Examples In facsimile and (analog) television transmission, multipath causes jitter and ghosting, seen as a faded duplicate image to the right of the main image. Ghosts occur when transmissions bounce off a mountain or other large object, while also arriving at the antenna by ... |
switching centers. Multiple homing may use a single directory number. In telephone systems, the connection of a terminal facility to more than one switching center by separate access lines. Separate directory numbers are applicable to each switching center accessed. In military, such as Missiles and loitering munitions... | systems, the connection of a terminal facility to more than one switching center by separate access lines. Separate directory numbers are applicable to each switching center accessed. In military, such as Missiles and loitering munitions, it is ability of |
turn, 5 groups are multiplexed into a super group having a baseband of 312 kHz to 552 kHz. This baseband, however, does not represent a group-level baseband. Ten super groups are in turn multiplexed into one master group, the output of which is a baseband that may be used to modulate a microwave-frequency carrier. Mult... | group multiplexer consists of a band of frequencies from 60 kHz to 108 kHz. This is the group-level baseband that results from combining 12 voice-frequency input channels, having a bandwidth of 4 kHz each, including guard bands. In turn, 5 |
its early research phase, with small-scale laboratory demonstrations of bandwidths of up to 2.5 Tbit/s over a single light path. This is a controversial subject in the academic community, with many claiming it is not a new method of multiplexing, but rather a special case of space-division multiplexing. Code-division m... | aim is to share a scarce resource. For example, in telecommunications, several telephone calls may be carried using one wire. Multiplexing originated in telegraphy in the 1870s, and is now widely applied in communications. In telephony, George Owen Squier is credited with the development of telephone carrier multiplexi... |
are placed on paper tape and transmitted via a teletypewriter (TTY), and on reception, are converted back to a printed page on another teletypewriter or teleprinter Messages printed on a sheet of | Examples of narrative traffic include: Messages that are placed on paper tape and transmitted via a teletypewriter (TTY), and on reception, are converted |
High frequency (HF) modems are limited to operation over a voice channel with a nominal 3 kHz bandwidth. References | a narrowband modem is a modem whose modulated output signal has an essential frequency spectrum that is limited to that which can be wholly |
13286. A revised Executive Order 12472 reflects the changes of E.O. 13286. On November 15, 2005, the NCS became part of the department's Directorate for Preparedness after nearly two years under the Information Analysis and Infrastructure Protection Directorate. In March 2007 the NCS became an entity of the National Pr... | Executive Order 12472, provided advice and recommendations to the NCS and the National Security Council through the President's Critical Infrastructure Protection Board on NS/EP telecommunications and its ties to other critical infrastructures. The NCS also participated in joint industry-Government planning through its... |
disks, video and audio tape, cable, wire, satellites, optical fiber transmission lines, microwave nets, switches, televisions, monitors, and printers) used to transmit, store, process, and display voice, data, and images; it was also to encompass a wide range of interactive functions, user-tailored services, and multim... | optical fiber transmission lines, microwave nets, switches, televisions, monitors, and printers) used to transmit, store, process, and display voice, data, and images; it was also to encompass a wide range of interactive functions, user-tailored services, and multimedia databases that were interconnected in a technolog... |
is not part of the International System of Units (SI), but is accepted for use alongside the SI. Definition Like the decibel, the neper is a unit in a logarithmic scale. While the bel uses the decadic (base-10) logarithm to compute ratios, the neper uses the natural logarithm, based on Euler's number (). The value of a... | have a fixed ratio to each other: and The (voltage) level ratio is Like the decibel, the neper is a dimensionless unit. The International Telecommunication Union (ITU) recognizes both units. Only the neper is coherent with the SI. Applications The neper is a natural linear unit of relative difference, meaning in nepers... |
and measuring the power delivered at the output port. The net gain in dB is calculated by taking 10 times the common logarithm of the ratio of the output power to the input power. The net gain expressed in dB may be positive or negative. If the net gain expressed in | at an appropriate power level at the input port of a circuit and measuring the power delivered at the output port. The net gain in dB is calculated by taking 10 times the common logarithm of the ratio of the output power to the input power. The net gain expressed in dB may be positive or negative. If the net gain |
in accordance with a prearranged schedule of intercommunication. Nets operating continuously are prepared to handle traffic at any time; they maintain operators on duty at all stations in the net at all times. When practicable, messages relating to schedules will be transmitted by a means of signal communication other ... | manager is the person who supervises the creation and operation of a net over multiple sessions. This person will specify the format, date, time, participants, and the net control script. The net manager will also choose the Net Control Station for each net, and may occasionally take on that function, especially in sma... |
into smaller manageable parts. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests services from the layer below. Distributed computing In dis... | telephone network (PSTN) has been termed the Intelligent Network. There are a number of specific classifications but all lie on a continuum between the dumb network (e.g. the Internet) and the intelligent network (e.g. the PSTN). A popular example of such usage of the term in distributed applications, as well as perman... |
of computer networks The field concerned with Telecommunications Engineering; developing telecommunications network topologies The field concerned with Broadcasting; | the design and management of computer networks The field concerned with Telecommunications Engineering; developing |
computer network Network interface device, a device that serves as the demarcation point between a telephone carrier's local loop and the customer's wiring Virtual network interface, | interface may refer to: Network interface controller, a computer hardware component that connects a computer to a computer network Network interface device, a device |
Network uses the term network termination device or NTD. A smartjack is a type of NID with capabilities beyond simple electrical connection, such as diagnostics. An optical network terminal (ONT) is a type of NID used with fiber-to-the-premises applications. Wiring termination The simplest NIDs are essentially just a s... | company usually has the ability to remotely activate loopback, without even needing personnel at the customer site. When looped back, the customer equipment is disconnected from the line. Additional smartjack diagnostic capabilities include alarm indication signal, which reports trouble at one end of the line to the fa... |
SNMP, command-line interface (CLI), custom XML, CMIP, Windows Management Instrumentation (WMI), Transaction Language 1 (TL1), CORBA, NETCONF, and the Java Management Extensions (JMX). Schemas include the Structure of Management Information (SMI), WBEM, the Common Information Model (CIM Schema), and MTOSI amongst others... | management. Network management allows IT professionals to monitor network components within large network area. Access methods include the SNMP, command-line interface (CLI), custom XML, CMIP, Windows Management Instrumentation (WMI), Transaction Language 1 (TL1), CORBA, NETCONF, and the Java Management Extensions (JMX... |
on a variety of computers of all sizes. A peer-to-peer network sets all connected computers equal; they all share the same abilities to use resources available on the network. The most popular peer-to-peer networks as of 2020 are Ethernet, Wi-Fi and the Internet protocol suite. Software that allowed users to interact w... | include MacOS (using AppleTalk and LocalTalk), and the Berkeley Software Distribution. Today, distributed computing and groupware applications have become the norm. Computer operating systems include a networking stack as a matter of course. During the 1980s the need to integrate dissimilar computers with network capab... |
interfaces A network interface controller (NIC) is computer hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information. For example, the NIC may have a connector for accepting a cable, or an aerial for wireless transmission and recep... | most address network concerns beyond the physical network topology and may be represented as single nodes on a particular physical network topology. Network interfaces A network interface controller (NIC) is computer hardware that provides a computer with the ability to access the transmission media, and has the abilit... |
which (a) current flows during marking intervals and no current flows during spacing intervals for the transmission of | system, single-current transmission system, single-Morse system) is a telegraph system in which (a) current flows during marking intervals and no current flows during spacing intervals |
terms of dBA. 0 dBA is the softest level that a person can hear. Normal speaking voices are around 65 dBA. A rock concert can be about 120 dBA. Recording and reproduction In audio, recording, and broadcast systems, audio noise refers to the residual low-level sound (four major types: hiss, rumble, crackle, and hum) tha... | noise signal that gives rise to acoustic noise heard as a hiss. This signal noise is commonly measured using A-weighting or ITU-R 468 weighting. In experimental sciences, noise can refer to any random fluctuations of data that hinders perception of a signal. Measurement Sound is measured based on the amplitude and freq... |
responsivity (expressed in units of or , respectively). The fundamental equation is . A smaller NEP corresponds to a more sensitive detector. For example, a detector with an NEP of can detect a signal power of one picowatt with a signal-to-noise ratio (SNR) of one after one half second of averaging. The SNR improves as... | to half a second of integration time. The units of NEP are watts per square root hertz. The NEP is equal to the noise spectral density (expressed in units of or ) divided by the responsivity (expressed in units of or , respectively). The fundamental equation is . A smaller NEP corresponds to a more sensitive detector. ... |
is , giving a noise factor Noise factor of cascaded devices If several devices are cascaded, the total noise factor can be found with Friis' formula: where is the noise factor for the -th device, and is the power gain (linear, not in dB) of the -th device. The first amplifier in a chain usually has the most significant... | figure will result in more than a 2 dB improvement in the output signal to noise ratio. For this reason, the related figure of effective noise temperature is therefore often used instead of the noise figure for characterizing satellite-communication receivers and low-noise amplifiers. In heterodyne systems, output nois... |
level of noise. Specifically, it may | is the level of noise. Specifically, it may |
in an electrical device or system. In the acceptance testing of radio transmitters, the mean power supplied to the antenna transmission line by a radio transmitter | power generated by a random electromagnetic process. Interfering and unwanted power in an electrical device or system. In the acceptance testing of radio transmitters, the mean power supplied to the antenna transmission line |
rather than the noise figure defined according to room temperature, is more appropriate. Noise temperature of cascaded devices The noise temperature of an amplifier is commonly measured using the Y-factor method. If there are multiple amplifiers in cascade, the noise temperature of the cascade can be calculated using t... | is not the noise level at the speaker of a radio, for instance, since that depends on the setting of the receiver's gain. Rather we ask how much noise the receiver added to the original noise level before its gain was applied. That additional noise level is . If a signal is present, then the decrease in signal to noise... |
moments of programme material. The purpose of weighting here is to emphasise the parts of the audible spectrum that our ears perceive most readily, and attenuate the parts that contribute less to our perception of loudness, in order to get a measured figure that correlates well with subjective effect. The ITU-R 468 noi... | this term is best avoided because, although strictly a general term, the word Psophometric is sometimes assumed to refer to a particular weighting used in telecommunications. A major use of noise weighting is in the measurement of residual noise in audio equipment, usually present as hiss or hum in quiet moments of pro... |
other encodings, and second, the presence of a DC signal component requires that the transmission line be DC-coupled. Bipolar non-return-to-zero level "One" is represented by one physical level (usually a positive voltage), while "zero" is represented by another level (usually a negative voltage). In clock language, in... | zeros are represented by some other significant condition, usually a negative voltage, with no other neutral or rest condition. For a given data signaling rate, i.e., bit rate, the NRZ code requires only half the baseband bandwidth required by the Manchester code (the passband bandwidth is the same). The pulses in NRZ ... |
frequency can refer to: Normalized frequency (digital | to: Normalized frequency (digital signal |
international) that causes or could cause injury or harm to the population, damage to or loss of property, or degrade or threaten the national security or emergency preparedness posture of the United States. NS/EP telecommunications are managed and controlled by the National Communications System | Telecommunications services that are used to maintain a state of readiness or to respond to and manage any event or crisis (local, national, or international) that causes or could cause injury or harm to the |
functions. The n refers to any one of the 7 layers of the OSI-RM. In an existing layered open system, the n may refer to any given layer in the system. Layers are conventionally numbered from the lowest, i.e., the physical layer, to the highest, so that the -th layer is above the n-th layer and the | The n refers to any one of the 7 layers of the OSI-RM. In an existing layered open system, the n may refer to any given layer in the system. Layers are conventionally numbered from the lowest, i.e., the physical layer, to the highest, so that the -th layer is above the n-th layer and the -th |
to the -number by way of the magnification (tending to zero for a distant object): Laser physics In laser physics, numerical aperture is defined slightly differently. Laser beams spread out as they propagate, but slowly. Far away from the narrowest part of the beam, the spread is roughly linear with distance—the laser ... | law to find that is constant across an interface. In air, the angular aperture of the lens is approximately twice this value (within the paraxial approximation). The NA is generally measured with respect to a particular object or image point and will vary as that point is moved. In microscopy, NA generally refers to ob... |
unlimited number of other continuous functions that fit the same set of samples. But only one of them is bandlimited to cycles/second (hertz), which means that its Fourier transform, is for all The mathematical algorithms that are typically used to recreate a continuous function from samples create arbitrarily good app... | samples per second or hertz, Hz) equal to twice the highest frequency (bandwidth) of a given function or signal. With an equal or higher sampling rate, the resulting discrete-time sequence is said to be free of the distortion known as aliasing. Conversely, for a given sample rate, the corresponding Nyquist frequency in... |
elements, instrument packages, or sensors, and to provide ready access to instrument packages or sensors at the focus. The engineering tradeoff of an off-axis optical system is an increase in image aberrations. There are various theoretical models for aberration in off-axis optical systems. This involves various techni... | in image aberrations. There are various theoretical models for aberration in off-axis optical systems. This involves various techniques including different types of equations for ray-tracing, and a goal can be optimizing the design. An example of an off-axis optical system is a three mirror design as optics for a hyper... |
or off the hookswitch. Placing the circuit into the off-hook state is also called seizing the line. Off-hook originally referred to the condition that prevailed when telephones had a separate earpiece (receiver), which hung from its switchhook until the user initiated a telephone call by removing it. When off hook the ... | hookswitch. Placing the circuit into the off-hook state is also called seizing the line. Off-hook originally referred to the condition that prevailed when telephones had a separate earpiece (receiver), which hung from its switchhook until the user initiated a telephone call by removing it. When off hook the weight of t... |
For communities that lack adequate Internet connectivity—such as developing countries, rural areas, and prisons—offline information stores such as WiderNet's eGranary Digital Library (a collection of approximately thirty million educational resources from more than two thousand web sites and hundreds of CD-ROMs) provid... | connect to mail servers (to check for new mail at regular intervals, for example), and when offline it will not attempt to make any such connection. The online or offline state of the MUA does not necessarily reflect the connection status between the computer on which it is running and the internet.i.e, the computer it... |
demand for a connection. Note 2: At the originating end, the one-way trunk is known as an "outgoing trunk" ; at | origin of the demand for a connection. Note 2: At the originating end, the one-way trunk is known as an "outgoing trunk" ; at the other end, it is |
buildings. Premises wiring may consist of horizontal wiring, vertical wiring, and backbone cabling. It may extend from the point-of-entry to user work areas. Any type of telecommunications or data wiring is considered premises wiring, including telephone, computer/data, intercom, closed-circuit television. Premises net... | and may be installed within or between buildings. Premises wiring may consist of horizontal wiring, vertical wiring, and backbone cabling. It may extend from the point-of-entry to user work areas. Any type of telecommunications or data wiring is considered premises wiring, including telephone, computer/data, intercom, ... |
Computer Inquiry III, Open network architecture (ONA) is the overall design of a communication carrier's basic network facilities and services to permit | (ONA) is the overall design of a communication carrier's basic network facilities and services to permit all users of the basic network to interconnect to specific basic network functions and interfaces on an unbundled, equal-access basis. The |
necessary to accomplish a goal or fulfill a set of requirements. In open systems architecture the design includes intentional provisions to make it possible to expand or modify the system at a later stage after initial operation. There is no one specific universal OSA, but it is essential the specific OSA applicable to... | telecommunication, open systems architecture (OSA) is a standard that describes the layered hierarchical structure, configuration, or model of a communications or distributed data processing system. It enables system description, design, development, installation, operation, improvement, and maintenance to be performed... |
arguments or operands that the function takes Binary operation, calculation that combines two elements of the set to produce another element of the set Graph operations, produce new graphs from initial ones Modulo operation, operation finds the remainder after division of one number by another Operations research, in B... | British television film The Operation (1990), a crime, drama, TV movie starring Joe Penny, Lisa Hartman, and Jason Beghe The Operation (1992–1998), a reality television series from TLC The Operation M.D., formerly The Operation, a Canadian garage rock band Business Business operations, the harvesting of value from asse... |
they absorb all light energy equally. They should not reflect the light or scatter the light in an air gap, since that could cause unwanted back reflection in the fiber system. Another type of attenuator utilizes a length of high-loss optical fiber, that operates upon its input optical signal power level in such a way ... | optical attenuators may be either manually or electrically controlled. A manual device is useful for one-time set up of a system, and is a near-equivalent to a fixed attenuator, and may be referred to as an "adjustable attenuator". In contrast, an electrically controlled attenuator can provide adaptive power optimizati... |
sight. The optical axis is an imaginary line that defines the path along which light propagates through the system, up to first approximation. For a system composed of simple lenses and mirrors, the axis passes through the center of curvature of each surface, and | which there is some degree of rotational symmetry in an optical system such as a camera lens, microscope or telescopic sight. The optical axis is an imaginary line that defines the path along which light propagates through the system, up to first approximation. For a system composed of simple lenses and mirrors, the ax... |
substrates. Beta testing of the disk drives, originally labeled the Laser Storage Drive 2000 (LSD-2000), was only moderately successful. Many of the disks were shipped to RCA Laboratories (now David Sarnoff Research Center) to be used in the Library of Congress archiving efforts. The STC disks utilized a sealed cartrid... | optical discs exhibit a characteristic iridescence as a result of the diffraction grating formed by its grooves. This side of the disc contains the actual data and is typically coated with a transparent material, usually lacquer. The reverse side of an optical disc usually has a printed label, sometimes made of paper b... |
called an analyzer (polarized at 45°). Light traveling in the forward direction becomes polarized vertically by the input polarizer. The Faraday rotator will rotate the polarization by 45°. The analyzer then enables the light to be transmitted through the isolator. Light traveling in the backward direction becomes pola... | the length of the rotator. This is shown in Figure 2. Specifically for an optical isolator, the values are chosen to give a rotation of 45°. It has been shown that a crucial requirement for any kind of optical isolator (not only the Faraday isolator) is some kind of non-reciprocal optics Polarization dependent isolator... |
equal to the optical path length of C. Thus, if a wave is traveling through several different media, then the optical path length of each medium can be added to find the total optical path length. The optical path difference between the paths taken by two identical waves can then be used to find the phase change. Final... | often called the optical path difference (OPD). OPL and OPD are important because they determine the phase of the light and governs interference and diffraction of light as it propagates. Formulation In a medium of constant refractive index, n, the OPL for a path of geometrical length s is just If the refractive index ... |
(launched into a given fiber by a given source) among various loss-producing mechanisms such as launch coupling loss, fiber attenuation, splice losses, and connector losses, in order to ensure that adequate signal strength (optical power) is available at the receiver. In optical power budget attenuation is specified in... | their equipment—or specify only that their equipment will operate over a given distance, without mentioning the fiber characteristics. The user must first ascertain, from the manufacturer or by testing, the transmission losses for the type of fiber to be used, and the required signal strength for a given level of perfo... |
expressed in decibels (dB). At least several dB of optical power margin should be included in the optical power budget. The amount of optical power launched into a given fiber by a given transmitter depends on the nature of its | measured using a calibrated light source and an optical power meter. The optical power margin is usually expressed in decibels (dB). At least several dB of optical power margin should be included in the optical power budget. The amount of optical power launched into a given |
reason, some later commentators, including Isaac Asimov, have suggested that indigo should not be regarded as a color in its own right but merely as a shade of blue or violet. Evidence indicates that what Newton meant by "indigo" and "blue" does not correspond to the modern meanings of those color words. Comparing Newt... | not a spectrum but rather reddish-yellow and blue-cyan edges with white between them. The spectrum appears only when these edges are close enough to overlap. In the early 19th century, the concept of the visible spectrum became more definite, as light outside the visible range was discovered and characterized by Willia... |
by communication providers. Hand-held, inexpensive OTDRs are intended to be easy-to-use, light-weight, sophisticated OTDRs that collect field data and perform rudimentary data analysis. They may be less feature rich than full-feature OTDRs. Often they can be used in conjunction with PC-based software to perform data co... | analysis. Hand-held OTDRs are commonly used to measure fiber links and locate fiber breaks, points of high loss, high reflectance, end-to-end loss, and Optical Return Loss (ORL). Fiber break locators are intended to be low-cost instruments specifically designed to determine the location of a catastrophic fiber event, e... |
to 100%, significant environmental stresses within the enclosure or facility can be produced. Telcordia GR-3108, Generic Requirements for Network Equipment in the Outside Plant (OSP), contains the most recent industry data regarding each Class described above. It also discusses what is currently happening in ATIS and U... | or more twisted pairs. Secondary feeder lines run to a streetside cabinet containing a distribution frame called a Serving Area Interface (SAI). The SAI is connected to the main distribution frame, located at a Telephone exchange or other switching facility, by one or more primary feeder lines which contain hundreds of... |
Alternatively, ovality of the core or cladding may be specified by a tolerance field consisting of two concentric circles, within which the cross section boundaries must lie. In measurements, ovality is the amount of out-of-roundness of a hole or cylindrical part in the typical form of an oval. In chemistry In computat... | cylindrical part in the typical form of an oval. In chemistry In computational chemistry, especially in QSAR studies, ovality refers to, a measure of how the shape of a molecule approaches a sphere (at one extreme) or a cigar shape (at the other). Ovality is described by a ratio of volume to area: where: O = Ovality A ... |
communications testing, overfill in both numerical aperture and mean diameter (core diameter or spot size) is usually required. In polygonal mirror | is the condition that prevails when the numerical aperture or the beam diameter of an optical source, such as a laser, light-emitting diode, or optical fiber, exceeds that of the driven element, e.g. an optical fiber core. In optical communications testing, overfill |
occurs when more information is being transmitted than the hardware can handle Overspill, a proof technique in non-standard analysis, is less commonly called overflow Stack overflow in which a computer program makes too many subroutine calls and its call stack runs out of space Other Overflow (magazine), a free quarter... | can store or represent Buffer overflow, a situation whereby the incoming data size exceeds that which can be accommodated by a buffer. Heap overflow, a type of buffer overflow that occurs in the heap data area Overflow (software), a NASA-developed computational fluid dynamics program using overset (Chimera) grids |
originated by the user is not considered to be system overhead information. Overhead information generated within the communications system and not delivered to the user is system overhead information. Thus, the user throughput is reduced by both overheads | information transferred across the functional interface between a user and a telecommunications system, or between functional units within a telecommunications system, for the purpose of directing or controlling the transfer of user information or the detection and correction of errors. Overhead information originated ... |
recovered modulating signal. This means that the envelope of the output waveform is distorted. Although overmodulation is sometimes considered permissible, it should not occur in practice; a distorted waveform envelope will result in a distorted output signal of the | Although overmodulation is sometimes considered permissible, it should not occur in practice; a distorted waveform envelope will result in a distorted output signal of the receiving medium. References See also Clipping |
programming languages. Price override, in retail Override, a character on the anime television series Transformers: Cybertron Override (film), a 1994 science fiction short film OverRide (video game) Overrider, a Marvel Comics mutant Overriders, an insurance term Overriding (mathematics) Overriding | function where an automated system is placed under manual control Method overriding, a subclassing feature in Object Oriented programming languages. Price override, in retail Override, a character on the anime television series Transformers: Cybertron Override (film), a 1994 science fiction short film |
The Ecological Basis of Revolutionary Change, 1980 book by William R. Catton, Jr. Overshoot (signal), when a signal exceeds its steady state value Overshoot (microwave communication), unintended reception of microwave signals Overshoot (migration), when | further than intended Overshoot (typography) the degree to which a letter dips below the baseline, or exceeds the cap height Overshoot (combat aviation), a key concept in basic fighter maneuvers (BFM) Overshoot (epidemiology), when the proportion of a population infected exceeds the herd immunity threshold In economics... |
in composing choral music with overtone singing is to discover what the singers can be expected to do successfully without extensive practice. The second step is to find a musical context in which those techniques could be effective, not mere special effects. It was initially hypothesized that beginners would be able t... | in composing choral music with overtone singing is to discover what the singers can be expected to do successfully without extensive practice. The second step is to find a musical context in which those techniques could be effective, not mere special effects. It was initially hypothesized that beginners would be able t... |
network that contains data switches and equipment for controlling, formatting, transmitting, routing, and receiving data packets. Note: In the Defense Data Network (DDN), a packet-switching node is usually configured to support up to thirty-two X.25 | and receiving data packets. Note: In the Defense Data Network (DDN), a packet-switching node is usually configured to support up to thirty-two |
disparity (the average weight of the codeword is positive). In a paired disparity code, every codeword that averages to a negative level (negative disparity) is paired with some other codeword that averages to a positive level (positive disparity). In a system that uses a paired disparity code, the transmitter must kee... | positive disparity (the average weight of the codeword is positive). In a paired disparity code, every codeword that averages to a negative level (negative disparity) is paired with some other codeword that averages to a positive level (positive disparity). In a system that uses a paired disparity code, the transmitter... |
and Centrex services trunk-to-station tie lines at the trunk end only switched service network station lines, i.e., common control switching arrangements The direct connection of all PBX and similar systems to private line services for tie trunk type interfaces, off-premises station lines, and (3) automatic identified ... | PBX and Centrex services trunk-to-station tie lines at the trunk end only switched service network station lines, i.e., common control switching arrangements The direct connection of all PBX and similar systems to private line services for tie trunk type interfaces, off-premises station lines, and (3) automatic identif... |
"Party Line" (Andrea True Connection song), 1976 "Party Line" (Wanessa song), 2010 Party Line, a 1982 album by the Powder Blues Band "The Party Line", a 2015 song by Belle and Sebastian from Girls in Peacetime Want to Dance Other uses The Party Line (books), a series of books by Carrie Austen The Party Line (radio), a ... | band "Party Line" (the Kinks song), 1966 "Party Line" (Andrea True Connection song), 1976 "Party Line" (Wanessa song), 2010 Party Line, a 1982 album by the Powder Blues Band "The Party Line", a 2015 song by Belle and Sebastian from Girls in Peacetime Want to Dance Other uses The Party Line (books), a series of books by... |
example, a radio receiver contains a bandpass filter to select the frequency of the desired radio signal out of all the radio waves picked up by its antenna. The passband of a receiver is the range of frequencies it can receive when it is tuned into the desired frequency (channel). A bandpass-filtered signal (that is, ... | receive when it is tuned into the desired frequency (channel). A bandpass-filtered signal (that is, a signal with energy only in a passband), is known as a bandpass signal, in contrast to a baseband signal. Filters In telecommunications, optics, and acoustics, a passband (a band-pass filtered signal) is the portion of ... |
into a system, is the number of guesses per unit of time, and is the number of unique algorithm-generated passwords (the 'password space'). The degree of password security is determined by the probability that a password can be guessed in its lifetime. | parameter the value of which affects password strength against brute force attack and so is a contributor to computer security. One use of the password length parameters is in the expression , where is the probability that a |
to the rapid changes in radio signal amplitude in a short period of time or distance of travel. Loss exponent In the study of wireless communications, path loss can be represented by the path loss exponent, whose value is normally in the range of 2 to 4 (where 2 is for propagation in free space, 4 is for relatively los... | simpler cases, such as the above-mentioned free space propagation or the flat-earth model. For practical cases the path loss is calculated using a variety of approximations. Statistical methods (also called stochastic or empirical) are based on measured and averaged losses along typical classes of radio links. Among th... |
the radio signal. Profiles are drawn either with an effective Earth radius simulated by a parabolic arc--in which case the ray paths are drawn as straight lines--or with a "flat Earth"-- in which case the ray paths are drawn as parabolic | other features that may obstruct the radio signal. Profiles are drawn either with an effective Earth radius simulated by a parabolic arc--in which case the ray paths are drawn as |
path, an analysis that (a) includes the overall evaluation of the component quality measures, the individual link quality | quality analysis: In a communications path, an analysis that (a) includes the overall evaluation of the component quality measures, the individual link |
experiments, or other equipment. Extra fuel, when optionally carried, is also considered part of the payload. In a commercial context (i.e., an airline or air freight carrier), payload may refer only to revenue-generating cargo or paying passengers. A payload of ordnance carried by a combat aircraft is sometimes altern... | net power of the engines and the lift/drag ratio of the wings. The diagonal line after the range-at-maximum-payload point shows how reducing the payload allows increasing the fuel (and range) when taking off with the maximum take-off weight. The second kink in the curve represents the point at which the maximum fuel ca... |
PBER is determined by the extent of error correction, such as by using the fraction of non-unanimous votes in the 2-of-3 majority decoder. Engineering ratios Error detection and correction | bit error ratio derived by a majority decoder that processes redundant transmissions. Note: In adaptive HF radio automatic link establishment, PBER is determined |
Uprising of 1806, which led to the region's becoming part of the Napoleonic Duchy of Warsaw (forming the Poznań Department and parts of the Kalisz and Bydgoszcz Departments). However, following the Congress of Vienna in 1815, Greater Poland was again partitioned, with the western part (including Poznań) going to Prussi... | part of Kalisz Voivodeship. However more far-reaching changes would come with the Partitions of Poland. In the first partition (1772), northern parts of Greater Poland along the Noteć (German Netze) were taken over by Prussia, becoming the Netze District. In the second partition (1793) the whole of Greater Poland was a... |
on Iggy and the Stooges' album Raw Power "Penetration", a song on Pedro the Lion's album Control "Penetration", a song by The Pyramids Body of Lies (film), a film formerly known as Penetration Other uses Penetration (warfare), the breaching of, and moving past, a defensive military line Market penetration or brand pene... | an opening in a wall or floor assembly required to have a fire-resistance rating, for the purpose of accommodating the passage of a mechanical, electrical, or structural penetrant Penetration (weapons), the ability to pierce the target's armor or other protection Penetration depth of light or any electromagnetic radiat... |
Performance management principles are used most often in the workplace and can be applied wherever people interact with their environments to produce desired effects—schools, churches, community meetings, sports teams, health settings, governmental agencies, social events, and even political settings. The way performan... | not get rewarded to be disgruntled with the process. Additionally, without proper implementation in the planning of the performance management system, employees may view the process as something they must have compliance with. This will result in a less proactive and more inaccurate representation of the performance of... |
In telecommunication, performance measurement period is the period during which performance parameters are measured. A performance measurement period | performance measurement period is the period during which performance parameters are measured. A performance measurement period is determined by required confidence limits and may vary |
A periscope antenna facilitates increased terrain clearance without long transmission lines, while permitting the active equipment to be located at or | and a flat or off-axis parabolic reflector, mounted above the transmitting antenna, is used to direct the beam in a horizontal path toward the receiving antenna. A periscope antenna |
terminal associated with the user for the purposes of addressing, routing, and charging the user for calls. "Access" is intended to convey the concepts of both originating and terminating services. Management of the service profile by the user is not part of personal mobility. The personal mobility | accord with the user's service profile. Personal mobility involves the network's capability to locate the terminal associated with the user for the purposes of addressing, routing, and charging the user for |
same time acting as one conductor of another circuit. Phantom group A phantom group is composed of three circuits that are derived from two single-channel circuits to form a phantom circuit. Here the phantom circuit is a third circuit derived from two suitably arranged pairs of wires, called side circuits, with each pa... | pairs (go and return signals) making up the star-quad cable. Unloaded phantom Unloaded phantom is a phantom configuration of loaded lines (a circuit fitted with loading coils). The idea here is not to create additional circuits. Rather, the purpose is to cancel or greatly reduce the effect of the loading coils fitted t... |
the planet Mercury (2011–2015). This was the first deep-space mission to use a phased-array antenna for communications. The radiating elements are circularly-polarized, slotted waveguides. The antenna, which uses the X band, used 26 radiative elements and can gracefully degrade. Weather research usage The National Seve... | the Thales Herakles phased array multi-function radar used in service with France and Singapore has a track capacity of 200 targets and is able to achieve automatic target detection, confirmation and track initiation in a single scan, while simultaneously providing mid-course guidance updates to the MBDA Aster missiles... |
to frequency, or (b) the zero-frequency intercept of the phase-frequency characteristic is not 0 or an integral multiple of 2π radians. Audibility of phase distortion Grossly changed phase relationships, without changing amplitudes, can be audible but the degree of audibility of the type of phase shifts expected from t... | not 0 or an integral multiple of 2π radians. Audibility of phase distortion Grossly changed phase relationships, without changing amplitudes, can be audible but the degree of audibility of the type of phase shifts expected from typical sound systems remains debated. See also Audio system measurements Phase noise Refere... |
phase shift, but simply a swap of plus and minus. For example, in a push–pull power amplifier using vacuum tubes, the signal is most often split by a phase splitter (aka phase inverter) stage which produces two signals, one in phase, and the other out of phase, that is, phase inverted. These two complementary signals t... | one in phase, and the other out of phase, that is, phase inverted. These two complementary signals then drive the two halves of the first push–pull stage, which may be either the output stage or the driver stage. The other common arrangements for driving a push-pull stage are by using an isolation transformer to produc... |
is "province" or "voivodeship". The latter is a loanword-calque hybrid formed on the Polish "województwo". Some writers argue against rendering "województwo" in English as "province" on historic grounds. Before the Third and last Partition of the Polish–Lithuanian Commonwealth, which occurred in 1795, each of the main ... | headed by the marszałek drafts the budget and development strategies, implements the resolutions of the sejmik, manages the voivodeship's property, and deals with many aspects of regional policy, including management of European Union funding. The marshal's offices are collectively known as the urząd marszałkowski. Lis... |
Cod and related species are plagued by parasites. For example, the cod worm, Lernaeocera branchialis, starts life as a copepod-like larva, a small free-swimming crustacean. The first host used by the larva is a flatfish or lumpsucker, which it captures with grasping hooks at the front of its body. It penetrates the fis... | in 1758. (However, G. morhua callarias, a low-salinity, nonmigratory race restricted to parts of the Baltic, was originally described as Gadus callarias by Linnaeus.) Cod is popular as a food with a mild flavour and a dense, flaky, white flesh. Cod livers are processed to make cod liver oil, an important source of vita... |
16% of the light is still present, and only 1% of the original light is left at 100 metres. No light penetrates beyond 1000 metres. In addition to overall attenuation, the oceans absorb the different wavelengths of light at different rates. The wavelengths at the extreme ends of the visible spectrum are attenuated fast... | of it. Being the first link in the food chain, what happens to phytoplankton creates a rippling effect for other species. Besides phytoplankton, many other animals also live in this zone and utilize these nutrients. The majority of ocean life occurs in the photic zone, the smallest ocean zone by water volume. The photi... |
the Warsaw metropolitan area, Radom (212,230) in the south, Płock (119,709) in the west, Siedlce (77,990) in the east, and Ostrołęka (52,071) in the north. The capital of the voivodeship is the national capital, Warsaw. The province was created on January 1, 1999, out of the former Warsaw, Płock, Ciechanów, Ostrołęka, ... | nine Landscape Parks. These are listed below. Kampinos National Park (a UNESCO-designated biosphere reserve) Bolimów Landscape Park (partly in Łódź Voivodeship) Brudzeń Landscape Park Bug Landscape Park Chojnów Landscape Park Górzno-Lidzbark Landscape Park (partly in Kuyavian-Pomeranian and Warmian-Masurian Voivodeship... |
to Bath to see his sister and parents. He is humble, sweet, and fun-loving like his sister but he is not a very good judge of character, and he is both naïve and innocent when it comes to matters of the heart. Henry Tilney: A quirky 26-year-old well-read clergyman, brother of Eleanor and Frederick Tilney, and a member ... | custom so common with novel-writers, of degrading by their contemptuous censure the very performances, to the number of which they are themselves adding—joining with their greatest enemies in bestowing the harshest epithets on such works, and scarcely ever permitting them to be read by their own heroine, who, if she ac... |
Democrat Wera Hobhouse who beat Conservative Ben Howlett at the 2017 general election and retained her seat at the 2019 general election. Howlett had replaced the retiring Liberal Democrat Don Foster at the 2015 general election. Foster's election was a notable result of the 1992 general election, as Chris Patten, the ... | Chairman of the Conservative Party, in re-electing the government of John Major, but failed to defend his marginal seat. Electoral wards The fifteen electoral wards of Bath are: Bathwick, Combe Down, Kingsmead, Lambridge, Lansdown, Moorlands, Newbridge, Odd Down, Oldfield Park, Southdown, Twerton, Walcot, Westmoreland,... |
walls show Michelangelo as the father of the Baroque". While continuity may be the case in Italy, it was not necessarily the case elsewhere. The adoption of the Renaissance style of architecture was slower in some areas than in others, as may be seen in England, for example. Indeed, as Pope Julius II was having the Old... | by Filippo Brunelleschi (1377–1446). High Renaissance () During the High Renaissance, concepts derived from classical antiquity were developed and used with greater confidence. The most representative architect is Donato Bramante (1444–1514), who expanded the applicability of classical architecture to contemporary buil... |
of Tadeusz Łomnicki as Salieri), then at the Théâtre Marigny in Paris with François Périer as Salieri. The play was again directed by Polanski, in Milan, in 1999. In 1982, Richard Wherrett directed a Sydney Theatre Company production at the Theatre Royal, Sydney. It starred John Gaden as Salieri, Drew Forsythe as Mozar... | is a play by Peter Shaffer which gives a fictional account of the lives of composers Wolfgang Amadeus Mozart and Antonio Salieri, first performed in 1979. It was inspired by Alexander Pushkin's short 1830 play Mozart and Salieri, which Nikolai Rimsky-Korsakov used in 1897 as the libretto for an opera of the same name. ... |
kore (female). Contrapposto has been used since the dawn of classical western sculpture. According to the canon of the Classical Greek sculptor Polykleitos in the 4th century BC, it is one of the most important characteristics of his figurative works and those of his successors, Lysippos, Skopas, etc. The Polykletian s... | carries the weight of the body is known as the engaged leg, the relaxed leg is known as the free leg. Usually, the engaged leg is straight, or very slightly bent, and the free leg is slightly bent. Contrapposto is less emphasized than the more sinuous S-curve, and creates the illusion of past and future movement. A 201... |
the college campus scenes were filmed in Los Angeles at the University of Southern California. The lighthouse that Forrest runs across to reach the Atlantic Ocean the first time is the Marshall Point Lighthouse in Port Clyde, Maine. Additional scenes were filmed in Arizona, Utah's Monument Valley, and Montana's Glacier... | be represented through the use of archival footage like John Lennon or President John F. Kennedy. Sam Anderson as Principal Hancock: Forrest's elementary school principal. Geoffrey Blake as Wesley: A member of the SDS group and Jenny's abusive boyfriend. Siobhan Fallon Hogan as Dorothy Harris: The school bus driver who... |
on Teller's concept were discouraging, many scientists believed it could not lead to a successful weapon, while others had moral and economic grounds for not proceeding. Consequently, several senior people of the Manhattan Project opposed development, including Bethe and Oppenheimer. To clarify the situation, Ulam and ... | salary, and the Ulams returned to Los Alamos. Monte Carlo method Late in the war, under the sponsorship of von Neumann, Frankel and Metropolis began to carry out calculations on the first general-purpose electronic computer, the ENIAC at the Aberdeen Proving Ground in Maryland. Shortly after returning to Los Alamos, Ul... |
of Austrian Service Abroad. Dalos lived in Vienna from 1987 to 1995. Since 1995, he has lived in Berlin as a freelance publisher and editor. Awards 2010 Leipzig Book Award for European Understanding Work 1985 (1983) is a sequel to George Orwell's Nineteen Eighty-Four. This novel begins with the death of Big Brother and... | regime of Hungary. In 1988/89 he was co-editor of the East German underground opposition paper Ostkreuz. From 1995 to 1999, Dalos was head of the Institute for Hungarian Culture in Berlin. Since 2009 he is member of the International Council of Austrian Service Abroad. Dalos lived in Vienna from 1987 to 1995. Since 199... |
decision. The majority opinion, written by Justice Ginsburg, relied heavily on the Copyright Acts of 1790, 1831, 1909, and 1976 as precedent for retroactive extensions. One of the arguments supporting the act was the life expectancy has significantly increased among the human population since the 18th century, and ther... | Row Publishers, Inc., v. Nation Enterprises, an earlier Supreme Court decision. On the third count, she rejected the notion that public trust doctrine was applicable to copyright law. Court of Appeals The plaintiffs appealed the decision of the district court to the United States Court of Appeals for the District of Co... |
Him Yet", a 1981 film documentary on Beiderbecke's life directed and produced by Brigitte Berman, featured interviews with Hoagy Carmichael, Bill Challis and others, who knew and worked with Bix. Beiderbecke's music was featured in three British comedy drama television series, all written by Alan Plater: The Beiderbeck... | "Way Down Yonder in New Orleans". Beiderbecke earned co-writing credit with Trumbauer on "For No Reason at All in C", recorded under the name Tram, Bix and Eddie (in their Three Piece Band). Beiderbecke switched between cornet and piano on that number, and then in September played only piano for his recording of "In A ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.