text
stringlengths
2.13k
184k
source
stringlengths
31
108
In physics, the Tsallis entropy is a generalization of the standard Boltzmann–Gibbs entropy. It is proportional to the expectation of the q-logarithm of a distribution. ## History The concept was introduced in 1988 by Constantino Tsallis as a basis for generalizing the standard statistical mechanics and is identical i...
https://en.wikipedia.org/wiki/Tsallis_entropy
The internal energy of a thermodynamic system is the energy of the system as a state function, measured as the quantity of energy necessary to bring the system from its standard internal state to its present internal state of interest, accounting for the gains and losses of energy due to changes in its internal state, ...
https://en.wikipedia.org/wiki/Internal_energy
In topology and related areas of mathematics, a Stone space, also known as a profinite space or profinite set, is a compact Hausdorff totally disconnected space. Stone spaces are named after Marshall Harvey Stone who introduced and studied them in the 1930s in the course of his investigation of Boolean algebras, which ...
https://en.wikipedia.org/wiki/Stone_space
The median filter is a non-linear digital filtering technique, often used to remove noise from an image, signal, and video. Such noise reduction is a typical pre-processing step to improve the results of later processing (for example, edge detection on an image). Median filtering is very widely used in digital image pr...
https://en.wikipedia.org/wiki/Median_filter
In mathematics, a polynomial sequence, i.e., a sequence of polynomials indexed by non-negative integers $$ \left\{0, 1, 2, 3, \ldots \right\} $$ in which the index of each polynomial equals its degree, is said to be of binomial type if it satisfies the sequence of identities $$ p_n(x+y)=\sum_{k=0}^n{n \choose k}\, p_...
https://en.wikipedia.org/wiki/Binomial_type
In computational complexity theory, a decision problem is ### P-complete (complete for the complexity class P) if it is in P and every problem in P can be reduced to it by an appropriate reduction. The notion of P-complete decision problems is useful in the analysis of: - which problems are difficult to parallelize ...
https://en.wikipedia.org/wiki/P-complete
The game of chicken, also known as the hawk-dove game or snowdrift game, is a model of conflict for two players in game theory. The principle of the game is that while the ideal outcome is for one player to yield (to avoid the worst outcome if neither yields), individuals try to avoid it out of pride, not wanting to lo...
https://en.wikipedia.org/wiki/Chicken_%28game%29
The Gaussian integral, also known as the Euler–Poisson integral, is the integral of the Gaussian function $$ f(x) = e^{-x^2} $$ over the entire real line. Named after the German mathematician Carl Friedrich Gauss, the integral is $$ \int_{-\infty}^\infty e^{-x^2}\,dx = \sqrt{\pi}. $$ Abraham de Moivre originally disc...
https://en.wikipedia.org/wiki/Gaussian_integral
A sorting algorithm falls into the adaptive sort family if it takes advantage of existing order in its input. It benefits from the presortedness in the input sequence – or a limited amount of disorder for various definitions of measures of disorder – and sorts faster. Adaptive sorting is usually performed by modifyin...
https://en.wikipedia.org/wiki/Adaptive_sort
In the geometry of triangles, the incircle and nine-point circle of a triangle are internally tangent to each other at the Feuerbach point of the triangle. The Feuerbach point is a triangle center, meaning that its definition does not depend on the placement and scale of the triangle. It is listed as X(11) in Clark Kim...
https://en.wikipedia.org/wiki/Feuerbach_point
Metaphone is a phonetic algorithm, published by Lawrence Philips in 1990, for indexing words by their English pronunciation. It fundamentally improves on the Soundex algorithm by using information about variations and inconsistencies in English spelling and pronunciation to produce a more accurate encoding, which does ...
https://en.wikipedia.org/wiki/Metaphone
In mathematics, Kuiper's theorem (after Nicolaas Kuiper) is a result on the topology of operators on an infinite-dimensional, complex Hilbert space H. It states that the space GL(H) of invertible bounded endomorphisms of H is such that all maps from any finite complex Y to GL(H) are homotopic to a constant, for the nor...
https://en.wikipedia.org/wiki/Kuiper%27s_theorem
Rossby-gravity waves are equatorially trapped waves (much like Kelvin waves), meaning that they rapidly decay as their distance increases away from the equator (so long as the Brunt–Vaisala frequency does not remain constant). These waves have the same trapping scale as Kelvin waves, more commonly known as the equator...
https://en.wikipedia.org/wiki/Rossby-gravity_waves
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously verif...
https://en.wikipedia.org/wiki/HMAC
The gradient theorem, also known as the fundamental theorem of calculus for line integrals, says that a line integral through a gradient field can be evaluated by evaluating the original scalar field at the endpoints of the curve. The theorem is a generalization of the second fundamental theorem of calculus to any curv...
https://en.wikipedia.org/wiki/Gradient_theorem
### Data engineer ing refers to the building of systems to enable the collection and usage of data. This data is usually used to enable subsequent analysis and data science, which often involves machine learning. Making the data usable usually involves substantial compute and storage, as well as data processing. ## His...
https://en.wikipedia.org/wiki/Data_engineering
In algebra, a field k is perfect if any one of the following equivalent conditions holds: - Every irreducible polynomial over k has no multiple roots in any field extension F/k. - Every irreducible polynomial over k has non-zero formal derivative. - Every irreducible polynomial over k is separable. - Every finite exten...
https://en.wikipedia.org/wiki/Perfect_field
The compression ratio is the ratio between the maximum and minimum volume during the compression stage of the power cycle in a piston or Wankel engine. A fundamental specification for such engines, it can be measured in two different ways. The simpler way is the static compression ratio: in a reciprocating engine, thi...
https://en.wikipedia.org/wiki/Compression_ratio
In computer science, a skip list (or skiplist) is a probabilistic data structure that allows $$ O(\log n) $$ average complexity for search as well as $$ O(\log n) $$ average complexity for insertion within an ordered sequence of $$ n $$ elements. Thus it can get the best features of a sorted array (for searching)...
https://en.wikipedia.org/wiki/Skip_list
In geometry and linear algebra, a Cartesian tensor uses an orthonormal basis to represent a tensor in a Euclidean space in the form of components. Converting a tensor's components from one such basis to another is done through an orthogonal transformation. The most familiar coordinate systems are the two-dimensional an...
https://en.wikipedia.org/wiki/Cartesian_tensor
An EPROM (rarely EROM), or erasable programmable read-only memory, is a type of programmable read-only memory (PROM) chip that retains its data when its power supply is switched off. Computer memory that can retrieve stored data after a power supply has been turned off and back on is called non-volatile. It is an arra...
https://en.wikipedia.org/wiki/EPROM
In combinatorics, a greedoid is a type of set system. It arises from the notion of the matroid, which was originally introduced by Whitney in 1935 to study planar graphs and was later used by Edmonds to characterize a class of optimization problems that can be solved by greedy algorithms. Around 1980, Korte and Lovász ...
https://en.wikipedia.org/wiki/Greedoid
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2. SHA-3 is a subset of the broader cryptographic primitive...
https://en.wikipedia.org/wiki/SHA-3
Rounding or rounding off is the process of adjusting a number to an approximate, more convenient value, often with a shorter or simpler representation. For example, replacing $ with $, the fraction 312/937 with 1/3, or the expression √2 with . Rounding is often done to obtain a value that is easier to report and commun...
https://en.wikipedia.org/wiki/Rounding
In computer science, quickselect is a selection algorithm to find the kth smallest element in an unordered list, also known as the kth order statistic. Like the related quicksort sorting algorithm, it was developed by Tony Hoare, and thus is also known as Hoare's selection algorithm. Like quicksort, it is efficient in ...
https://en.wikipedia.org/wiki/Quickselect
In computing, external memory algorithms or out-of-core algorithms are algorithms that are designed to process data that are too large to fit into a computer's main memory at once. Such algorithms must be optimized to efficiently fetch and access data stored in slow bulk memory (auxiliary memory) such as hard drives or...
https://en.wikipedia.org/wiki/External_memory_algorithm
In group theory, the correspondence theorem (also the lattice theorem, and variously and ambiguously the third and fourth isomorphism theorem) states that if $$ N $$ is a normal subgroup of a group $$ G $$ , then there exists a bijection from the set of all subgroups $$ A $$ of $$ G $$ containing $$ N $$ , onto...
https://en.wikipedia.org/wiki/Correspondence_theorem
Tired light is a class of hypothetical redshift mechanisms that was proposed as an alternative explanation for the redshift-distance relationship. These models have been proposed as alternatives to the models that involve the expansion of the universe. The concept was first proposed in 1929 by Fritz Zwicky, who suggest...
https://en.wikipedia.org/wiki/Tired_light
In mathematics, a tuple is a finite sequence or ordered list of numbers or, more generally, mathematical objects, which are called the elements of the tuple. An -tuple is a tuple of elements, where is a non-negative integer. There is only one 0-tuple, called the empty tuple. A 1-tuple and a 2-tuple are commonly calle...
https://en.wikipedia.org/wiki/Tuple
Visual Basic (VB), originally called Visual Basic .NET (VB.NET), is a multi-paradigm, object-oriented programming language developed by Microsoft and implemented on .NET, Mono, and the .NET Framework. Microsoft launched VB.NET in 2002 as the successor to its original Visual Basic language, the last version of which was...
https://en.wikipedia.org/wiki/Visual_Basic_%28.NET%29
In mathematics, a volume form or top-dimensional form is a differential form of degree equal to the differentiable manifold dimension. Thus on a manifold $$ M $$ of dimension $$ n $$ , a volume form is an $$ n $$ -form. It is an element of the space of sections of the line bundle $$ \textstyle{\bigwedge}^n(T^*M) ...
https://en.wikipedia.org/wiki/Volume_form
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys in...
https://en.wikipedia.org/wiki/Key_derivation_function
The gift-exchange game, also commonly known as the gift exchange dilemma, is a common economic game introduced by George Akerlof and Janet Yellen to model reciprocacy in labor relations. The gift-exchange game simulates a labor-management relationship execution problem in the principal-agent problem in labor economics....
https://en.wikipedia.org/wiki/Gift-exchange_game
Space is a three-dimensional continuum containing positions and directions. In classical physics, physical space is often conceived in three linear dimensions. Modern physicists usually consider it, with time, to be part of a boundless four-dimensional continuum known as spacetime. The concept of space is considered to...
https://en.wikipedia.org/wiki/Space
In game theory, the stag hunt, sometimes referred to as the assurance game, trust dilemma or common interest game, describes a conflict between safety and social cooperation. The stag hunt problem originated with philosopher Jean-Jacques Rousseau in his Discourse on Inequality. In the most common account of this dilem...
https://en.wikipedia.org/wiki/Stag_hunt
Zobrist hashing (also referred to as Zobrist keys or Zobrist signatures ) is a hash function construction used in computer programs that play abstract board games, such as chess and Go, to implement transposition tables, a special kind of hash table that is indexed by a board position and used to avoid analyzing the sa...
https://en.wikipedia.org/wiki/Zobrist_hashing
Adaptive coding refers to variants of entropy encoding methods of lossless data compression. They are particularly suited to streaming data, as they adapt to localized changes in the characteristics of the data, and don't require a first pass over the data to calculate a probability model. The cost paid for these advan...
https://en.wikipedia.org/wiki/Adaptive_coding
In mathematics, a pair of pants is a surface which is homeomorphic to the three-holed sphere. The name comes from considering one of the removed disks as the waist and the two others as the cuffs of a pair of pants. Pairs of pants are used as building blocks for compact surfaces in various theories. Two important appli...
https://en.wikipedia.org/wiki/Pair_of_pants_%28mathematics%29
In the mathematical field of topology, a hyperconnected space or irreducible space is a topological space X that cannot be written as the union of two proper closed subsets (whether disjoint or non-disjoint). The name irreducible space is preferred in algebraic geometry. For a topological space X the following conditio...
https://en.wikipedia.org/wiki/Hyperconnected_space
A graphical user interface, or GUI, is a form of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation. In many applications, GUIs are used instead of text-based UIs, which are based on typed command labels or text navigation. GUIs ...
https://en.wikipedia.org/wiki/Graphical_user_interface
The analyst's traveling salesman problem is an analog of the traveling salesman problem in combinatorial optimization. In its simplest and original form, it asks which plane sets are subsets of rectifiable curves of finite length. Whereas the original traveling salesman problem asks for the shortest way to visit every ...
https://en.wikipedia.org/wiki/Analyst%27s_traveling_salesman_theorem
In computer science, an array is a data structure consisting of a collection of elements (values or variables), of same memory size, each identified by at least one array index or key, a collection of which may be a tuple, known as an index tuple. An array is stored such that the position (memory address) of each eleme...
https://en.wikipedia.org/wiki/Array_%28data_structure%29
Wick's theorem is a method of reducing high-order derivatives to a combinatorics problem. It is named after Italian physicist Gian Carlo Wick. It is used extensively in quantum field theory to reduce arbitrary products of creation and annihilation operators to sums of products of pairs of these operators. This allows ...
https://en.wikipedia.org/wiki/Wick%27s_theorem
Ishikawa diagrams (also called fishbone diagrams, herringbone diagrams, cause-and-effect diagrams) are causal diagrams created by Kaoru Ishikawa that show the potential causes of a specific event. Common uses of the Ishikawa diagram are product design and quality defect prevention to identify potential factors causing ...
https://en.wikipedia.org/wiki/Ishikawa_diagram
Friction is the force resisting the relative motion of solid surfaces, fluid layers, and material elements sliding against each other. ## Types of friction include dry, fluid, lubricated, skin, and internal -- an incomplete list. The study of the processes involved is called tribology, and has a history of more than ...
https://en.wikipedia.org/wiki/Friction
Absolute zero is the lowest possible temperature, a state at which a system's internal energy, and in ideal cases entropy, reach their minimum values. The absolute zero is defined as 0 K on the Kelvin scale, equivalent to −273.15 °C on the Celsius scale, and −459.67 °F on the Fahrenheit scale. The Kelvin and Rankine te...
https://en.wikipedia.org/wiki/Absolute_zero
In distributed computing, the bully algorithm is a method for dynamically electing a coordinator or leader from a group of distributed computer processes. The process with the highest process ID number from amongst the non-failed processes is selected as the coordinator. ## Assumptions The algorithm assumes that: - the...
https://en.wikipedia.org/wiki/Bully_algorithm
Temperature is a physical quantity that quantitatively expresses the attribute of hotness or coldness. Temperature is measured with a thermometer. It reflects the average kinetic energy of the vibrating and colliding atoms making up a substance. Thermometers are calibrated in various temperature scales that historicall...
https://en.wikipedia.org/wiki/Temperature
In science, work is the energy transferred to or from an object via the application of force along a displacement. In its simplest form, for a constant force aligned with the direction of motion, the work equals the product of the force strength and the distance traveled. A force is said to do positive work if it has a...
https://en.wikipedia.org/wiki/Work_%28physics%29
In mathematics, the error function (also called the Gauss error function), often denoted by , is a function $$ \mathrm{erf}: \mathbb{C} \to \mathbb{C} $$ defined as: $$ \operatorname{erf} z = \frac{2}{\sqrt\pi}\int_0^z e^{-t^2}\,\mathrm dt. $$ The integral here is a complex contour integral which is path-independent ...
https://en.wikipedia.org/wiki/Error_function
In topology, the cartesian product of topological spaces can be given several different topologies. One of the more natural choices is the box topology, where a base is given by the Cartesian products of open sets in the component spaces. Another possibility is the product topology, where a base is also given by the Ca...
https://en.wikipedia.org/wiki/Box_topology
Transform coding is a type of data compression for "natural" data like audio signals or photographic images. The transformation is typically lossless (perfectly reversible) on its own but is used to enable better (more targeted) quantization, which then results in a lower quality copy of the original input (lossy compr...
https://en.wikipedia.org/wiki/Transform_coding
Paxos is a family of protocols for solving consensus in a network of unreliable or fallible processors. Consensus is the process of agreeing on one result among a group of participants. This problem becomes difficult when the participants or their communications may experience failures. Consensus protocols are the bas...
https://en.wikipedia.org/wiki/Paxos_%28computer_science%29
An optical waveguide is a physical structure that guides electromagnetic waves in the optical spectrum. Common types of optical waveguides include optical fiber waveguides, transparent dielectric waveguides made of plastic and glass, liquid light guides, and liquid waveguides. Optical waveguides are used as components ...
https://en.wikipedia.org/wiki/Waveguide_%28optics%29
ASCII ( ), an acronym for American Standard Code for Information Interchange, is a character encoding standard for representing a particular set of 95 (English language focused) printable and 33 control characters a total of 128 code points. The set of available punctuation had significant impact on the syntax of comp...
https://en.wikipedia.org/wiki/ASCII
Approximate membership query filters (hereafter, AMQ filters) comprise a group of space-efficient probabilistic data structures that support approximate membership queries. An approximate membership query answers whether an element is in a set or not with a false positive rate of $$ \epsilon $$ . ### Bloom filter s ar...
https://en.wikipedia.org/wiki/Approximate_membership_query_filter
Civil engineering is a professional engineering discipline that deals with the design, construction, and maintenance of the physical and naturally built environment, including public works such as roads, bridges, canals, dams, airports, sewage systems, pipelines, structural components of buildings, and railways. Civil ...
https://en.wikipedia.org/wiki/Civil_engineering
A flowchart is a type of diagram that represents a workflow or process. A flowchart can also be defined as a diagrammatic representation of an algorithm, a step-by-step approach to solving a task. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. This diagramm...
https://en.wikipedia.org/wiki/Flowchart
In physics, chemistry, and other related fields like biology, a phase transition (or phase change) is the physical process of transition between one state of a medium and another. Commonly the term is used to refer to changes among the basic states of matter: solid, liquid, and gas, and in rare cases, plasma. A phase o...
https://en.wikipedia.org/wiki/Phase_transition
Multidimensional scaling (MDS) is a means of visualizing the level of similarity of individual cases of a data set. MDS is used to translate distances between each pair of $$ n $$ objects in a set into a configuration of $$ n $$ points mapped into an abstract Cartesian space. More technically, MDS refers to a set ...
https://en.wikipedia.org/wiki/Multidimensional_scaling
Single-photon emission computed tomography (SPECT, or less commonly, SPET) is a nuclear medicine tomographic imaging technique using gamma rays. It is very similar to conventional nuclear medicine planar imaging using a gamma camera (that is, scintigraphy), but is able to provide true 3D information. This information i...
https://en.wikipedia.org/wiki/Single-photon_emission_computed_tomography
In mathematics, the Gaussian binomial coefficients (also called Gaussian coefficients, Gaussian polynomials, or q-binomial coefficients) are q-analogs of the binomial coefficients. The Gaussian binomial coefficient, written as $$ \binom nk_q $$ or $$ \begin{bmatrix}n\\ k\end{bmatrix}_q $$ , is a polynomial in q with...
https://en.wikipedia.org/wiki/Gaussian_binomial_coefficient
In mathematics, the John ellipsoid or Löwner–John ellipsoid associated to a convex body in -dimensional Euclidean space can refer to the -dimensional ellipsoid of maximal volume contained within or the ellipsoid of minimal volume that contains . Often, the minimal volume ellipsoid is called the Löwner ellipsoid, an...
https://en.wikipedia.org/wiki/John_ellipsoid
In engineering and materials science, a stress–strain curve for a material gives the relationship between stress and strain. It is obtained by gradually applying load to a test coupon and measuring the deformation, from which the stress and strain can be determined (see tensile testing). These curves reveal many of the...
https://en.wikipedia.org/wiki/Stress%E2%80%93strain_curve
Forward compatibility or upward compatibility is a design characteristic that allows a system to accept input intended for a later version of itself. The concept can be applied to entire systems, electrical interfaces, telecommunication signals, data communication protocols, file formats, and programming languages. A s...
https://en.wikipedia.org/wiki/Forward_compatibility
In computing, a Bloom filter is a space-efficient probabilistic data structure, conceived by Burton Howard Bloom in 1970, that is used to test whether an element is a member of a set. False positive matches are possible, but false negatives are not – in other words, a query returns either "possibly in set" or "definite...
https://en.wikipedia.org/wiki/Bloom_filter
In physics, Hooke's law is an empirical law which states that the force () needed to extend or compress a spring by some distance () scales linearly with respect to that distance—that is, where is a constant factor characteristic of the spring (i.e., its stiffness), and is small compared to the total possible deform...
https://en.wikipedia.org/wiki/Hooke%27s_law
A mathematical object is an abstract concept arising in mathematics. Typically, a mathematical object can be a value that can be assigned to a symbol, and therefore can be involved in formulas. Commonly encountered mathematical objects include numbers, expressions, shapes, functions, and sets. Mathematical objects can ...
https://en.wikipedia.org/wiki/Mathematical_object
An electoral or voting system is a set of rules used to determine the results of an election. Electoral systems are used in politics to elect governments, while non-political elections may take place in business, nonprofit organizations and informal organisations. These rules govern all aspects of the voting process: w...
https://en.wikipedia.org/wiki/Electoral_system
An atmospheric wave is a periodic disturbance in the fields of atmospheric variables (like surface pressure or geopotential height, temperature, or wind velocity) which may either propagate (traveling wave) or be stationary (standing wave). Atmospheric waves range in spatial and temporal scale from large-scale planetar...
https://en.wikipedia.org/wiki/Atmospheric_wave
In mathematics, orthogonality is the generalization of the geometric notion of perpendicularity to linear algebra of bilinear forms. Two elements and of a vector space with bilinear form $$ B $$ are orthogonal when $$ B(\mathbf{u},\mathbf{v})= 0 $$ . Depending on the bilinear form, the vector space may contain nu...
https://en.wikipedia.org/wiki/Orthogonality_%28mathematics%29
A tag cloud (also known as a word cloud or weighted list in visual design) is a visual representation of text data which is often used to depict keyword metadata on websites, or to visualize free form text. Tags are usually single words, and the importance of each tag is shown with font size or color. When used as webs...
https://en.wikipedia.org/wiki/Tag_cloud
In computing, memoization or memoisation is an optimization technique used primarily to speed up computer programs by storing the results of expensive function calls to pure functions and returning the cached result when the same inputs occur again. Memoization has also been used in other contexts (and for purposes ot...
https://en.wikipedia.org/wiki/Memoization
In meteorology, lee waves are atmospheric stationary waves. The most common form is mountain waves, which are atmospheric internal gravity waves. These were discovered in 1933 by two German glider pilots, Hans Deutschmann and Wolf Hirth, above the Giant Mountains. They are periodic changes of atmospheric pressure, tem...
https://en.wikipedia.org/wiki/Lee_wave
Nanotechnology is the manipulation of matter with at least one dimension sized from 1 to 100 nanometers (nm). At this scale, commonly known as the nanoscale, surface area and quantum mechanical effects become important in describing properties of matter. This definition of nanotechnology includes all types of research ...
https://en.wikipedia.org/wiki/Nanotechnology
The eight queens puzzle is the problem of placing eight chess queens on an 8×8 chessboard so that no two queens threaten each other; thus, a solution requires that no two queens share the same row, column, or diagonal. There are 92 solutions. The problem was first posed in the mid-19th century. In the modern era, it...
https://en.wikipedia.org/wiki/Eight_queens_puzzle
The ### ESPRESSO logic minimizer is a computer program using heuristic and specific algorithms for efficiently reducing the complexity of digital logic gate circuits. ESPRESSO-I was originally developed at IBM by Robert K. Brayton et al. in 1982. and improved as ESPRESSO-II in 1984. Richard L. Rudell later published ...
https://en.wikipedia.org/wiki/Espresso_heuristic_logic_minimizer
A Fermi gas is an idealized model, an ensemble of many non-interacting fermions. Fermions are particles that obey Fermi–Dirac statistics, like electrons, protons, and neutrons, and, in general, particles with half-integer spin. These statistics determine the energy distribution of fermions in a Fermi gas in thermal equ...
https://en.wikipedia.org/wiki/Fermi_gas
In mathematics, the Iwasawa decomposition (aka KAN from its expression) of a semisimple Lie group generalises the way a square real matrix can be written as a product of an orthogonal matrix and an upper triangular matrix (QR decomposition, a consequence of Gram–Schmidt orthogonalization). It is named after Kenkichi Iw...
https://en.wikipedia.org/wiki/Iwasawa_decomposition
In statistics, the matrix variate beta distribution is a generalization of the beta distribution. If $$ U $$ is a $$ p\times p $$ positive definite matrix with a matrix variate beta distribution, and $$ a,b>(p-1)/2 $$ are real parameters, we write $$ U\sim B_p\left(a,b\right) $$ (sometimes $$ B_p^I\left(a,b\...
https://en.wikipedia.org/wiki/Matrix_variate_beta_distribution
Soundex is a phonetic algorithm for indexing names by sound, as pronounced in English. The goal is for homophones to be encoded to the same representation so that they can be matched despite minor differences in spelling. The algorithm mainly encodes consonants; a vowel will not be encoded unless it is the first letter...
https://en.wikipedia.org/wiki/Soundex
Omega (, ; uppercase Ω, lowercase ω; Ancient Greek ὦ, later ὦ μέγα, Modern Greek ωμέγα) is the twenty-fourth and last letter in the Greek alphabet. In the Greek numeric system/isopsephy (gematria), it has a value of 800. The word literally means "great O" (o mega, mega meaning "great"), as opposed to omicron, which mea...
https://en.wikipedia.org/wiki/Omega
In computer science, local search is a heuristic method for solving computationally hard optimization problems. Local search can be used on problems that can be formulated as finding a solution that maximizes a criterion among a number of candidate solutions. Local search algorithms move from solution to solution in th...
https://en.wikipedia.org/wiki/Local_search_%28optimization%29
Diffraction is the deviation of waves from straight-line propagation without any change in their energy due to an obstacle or through an aperture. The diffracting object or aperture effectively becomes a secondary source of the propagating wave. Diffraction is the same physical effect as interference, but interference ...
https://en.wikipedia.org/wiki/Diffraction
Density-based spatial clustering of applications with noise (DBSCAN) is a data clustering algorithm proposed by Martin Ester, Hans-Peter Kriegel, Jörg Sander, and Xiaowei Xu in 1996. It is a density-based clustering non-parametric algorithm: given a set of points in some space, it groups together points that are closel...
https://en.wikipedia.org/wiki/DBSCAN
A molecular assembler, as defined by K. Eric Drexler, is a "proposed device able to guide chemical reactions by positioning reactive molecules with atomic precision". A molecular assembler is a molecular machine. Some biological molecules such as ribosomes fit this definition as biological machines. This is because t...
https://en.wikipedia.org/wiki/Molecular_assembler
In mathematics, a quadratic form over a field F is said to be isotropic if there is a non-zero vector on which the form evaluates to zero. Otherwise it is a definite quadratic form. More explicitly, if q is a quadratic form on a vector space V over F, then a non-zero vector v in V is said to be isotropic if . A quadrat...
https://en.wikipedia.org/wiki/Isotropic_quadratic_form
Qt ( pronounced "cute") is a cross-platform application development framework for creating graphical user interfaces as well as cross-platform applications that run on various software and hardware platforms such as Linux, Windows, macOS, Android or embedded systems with little or no change in the underlying codebase w...
https://en.wikipedia.org/wiki/Qt_%28software%29
In computer science, a shadow heap is a mergeable heap data structure which supports efficient heap merging in the amortized sense. More specifically, shadow heaps make use of the shadow merge algorithm to achieve insertion in O(f(n)) amortized time and deletion in O((log n log log n)/f(n)) amortized time, for any choi...
https://en.wikipedia.org/wiki/Shadow_heap
The Cauchy distribution, named after Augustin-Louis Cauchy, is a continuous probability distribution. It is also known, especially among physicists, as the Lorentz distribution (after Hendrik Lorentz), Cauchy–Lorentz distribution, Lorentz(ian) function, or Breit–Wigner distribution. The Cauchy distribution $$ f(x; x...
https://en.wikipedia.org/wiki/Cauchy_distribution
Biology is the scientific study of life and living organisms. It is a broad natural science that encompasses a wide range of fields and unifying principles that explain the structure, function, growth, origin, evolution, and distribution of life. Central to biology are five fundamental themes: the cell as the basic uni...
https://en.wikipedia.org/wiki/Biology
A mosaic plot, Marimekko chart, Mekko chart, or sometimes percent stacked bar plot, is a graphical visualization of data from two or more qualitative variables. It is the multidimensional extension of spineplots, which graphically display the same information for only one variable. It gives an overview of the data and ...
https://en.wikipedia.org/wiki/Mosaic_plot
Pearson plc is a multinational corporation, headquartered in the UK, focused on educational publishing and services. Originating in 1844 and named S. Pearson and Son by Samuel Pearson in 1856, what began as a small local civil engineering business in Yorkshire grew between 1880 and 1927 into a massive diversified inter...
https://en.wikipedia.org/wiki/Pearson_plc
wildmat is a pattern matching library developed by Rich Salz. Based on the wildcard syntax already used in the Bourne shell, wildmat provides a uniform mechanism for matching patterns across applications with simpler syntax than that typically offered by regular expressions. Patterns are implicitly anchored at the be...
https://en.wikipedia.org/wiki/Wildmat
In mathematics, Hensel's lemma, also known as Hensel's lifting lemma, named after Kurt Hensel, is a result in modular arithmetic, stating that if a univariate polynomial has a simple root modulo a prime number , then this root can be lifted to a unique root modulo any higher power of . More generally, if a polynomial f...
https://en.wikipedia.org/wiki/Hensel%27s_lemma
In mathematics, Helly's selection theorem (also called the Helly selection principle) states that a uniformly bounded sequence of monotone real functions admits a convergent subsequence. In other words, it is a sequential compactness theorem for the space of uniformly bounded monotone functions. It is named for the Aus...
https://en.wikipedia.org/wiki/Helly%27s_selection_theorem
In mathematics, to solve an equation is to find its solutions, which are the values (numbers, functions, sets, etc.) that fulfill the condition stated by the equation, consisting generally of two expressions related by an equals sign. When seeking a solution, one or more variables are designated as unknowns. A solution...
https://en.wikipedia.org/wiki/Equation_solving
A constant-velocity joint (also called a CV joint and homokinetic joint) is a mechanical coupling which allows the shafts to rotate freely (without an appreciable increase in friction or backlash) and compensates for the angle between the two shafts, within a certain range, to maintain the same velocity. A common use o...
https://en.wikipedia.org/wiki/Constant-velocity_joint
In mathematics, Steinhaus–Moser notation is a notation for expressing certain large numbers. It is an extension (devised by Leo Moser) of Hugo Steinhaus's polygon notation. ## Definitions a number in a triangle means . a number in a square is equivalent to "the number inside triangles, which are all nested." a n...
https://en.wikipedia.org/wiki/Steinhaus%E2%80%93Moser_notation
Speech coding is an application of data compression to digital audio signals containing speech. Speech coding uses speech-specific parameter estimation using audio signal processing techniques to model the speech signal, combined with generic data compression algorithms to represent the resulting modeled parameters in ...
https://en.wikipedia.org/wiki/Speech_coding