Noise-equivalent power (NEP) is a key parameter used to describe the sensitivity of a detector or sensor, often in the context of optical and infrared detectors. It quantifies the minimum power of an incoming signal that can be reliably detected above the noise level of the system. Specifically, NEP is defined as the incident power of a signal that produces a signal-to-noise ratio (SNR) of one when integrated over a given bandwidth.
The Metabolic Equivalent of Task (MET) is a unit that estimates the amount of energy expended during physical activities. One MET is defined as the energy cost of sitting quietly, which is approximately 1 kcal/kg/hour (or 3.5 mL of oxygen per kg of body weight per minute) for an average adult.
Noise-equivalent temperature (NET) is a measure used in the field of radiometry and spectroscopy to quantify the sensitivity of a detector or an instrument that measures electromagnetic radiation, particularly in the infrared and microwave regions. It describes the amount of thermal noise generated by the detector that would correspond to a given signal level. In essence, the NET indicates the temperature of a black body that would produce the same amount of thermal noise as the actual electronic noise present in the detector.
Passenger Car Equivalent (PCE) is a concept used in transportation engineering and traffic studies to quantify the impact of different types of vehicles on road traffic. It allows for the comparison of various vehicle types, such as buses, trucks, and motorcycles, in terms of their effect on road congestion and traffic flow, relative to a standard passenger car. The PCE provides a way to express the number of passenger cars that would produce an equivalent level of traffic impact as a given vehicle type.
A check digit is a form of redundancy check used for error detection on identification numbers, such as product codes, account numbers, and various types of identification numbers. It is a single digit added to the end of a number (or sometimes inserted at a specific position) that is calculated based on the other digits in that number. The purpose of the check digit is to help verify that the number has been entered or transmitted correctly.
In the context of data networks, "acknowledgment" (often abbreviated as "ACK") refers to a signal or message sent from a receiver to a sender to confirm the successful receipt of data. Acknowledgments play a crucial role in various network communication protocols, particularly in ensuring data integrity and reliability.
Convolutional codes are a type of error-correcting code used in digital communication systems to improve the reliability of data transmission over noisy channels. They work by encoding data streams into longer bit sequences based on the current input bits and the previous bits. This is done using a sliding window of the previous bits (the "memory" of the encoder), which allows the code to take into account multiple input bits when generating the output.
Crew Resource Management (CRM) is a set of training, techniques, and strategies used primarily in aviation and other high-risk industries to improve safety, communication, teamwork, and decision-making among crew members. The primary goal of CRM is to enhance the performance of teams operating in complex and dynamic environments, particularly in aviation, where effective communication and collaboration are critical for handling potential emergencies and ensuring safe operations.
The term "hash calendar" is not widely recognized or established in common terminology. However, it could relate to a few different concepts depending on the context: 1. **Blockchain and Cryptocurrencies**: In the context of blockchain technology, a "hash calendar" might refer to a way of organizing or managing blockchain events, transactions, or blocks based on hashes (which are unique identifiers generated by hash functions) and timestamps.
A drop-out compensator is a tool or mechanism used primarily in electronic systems, communications, and signal processing to mitigate the effects of signal dropouts or interruptions. Signal dropouts can occur due to various reasons, such as noise, interference, or signal degradation, particularly in wireless communication systems or data transmission. ### Functions and Applications: 1. **Restoration of Signal Integrity**: Drop-out compensators help in reconstructing or restoring the lost information when a signal dropout occurs.
Error Correction Mode (ECM) is a feature often used in fax machines and various forms of digital communication to enhance the reliability of data transmission, particularly over noisy or unstable communication channels. Here's how it works: 1. **Data Integrity**: ECM helps ensure that the data being transmitted is accurate and free from errors. It allows the receiving device to check the integrity of the received data against what was sent.
ISFET stands for Ion-Sensitive Field-Effect Transistor. It is a type of field-effect transistor that is used primarily for sensing ion concentrations in fluids, making it particularly useful in applications such as pH measurement, ion concentration detection, and biochemical sensing.
The Forward-Backward Algorithm is a fundamental technique used in the field of Hidden Markov Models (HMMs) for performing inference, particularly for computing the probabilities of sequences of observations given a model. This algorithm is particularly useful in various applications such as speech recognition, natural language processing, bioinformatics, and more. ### Key Concepts 1. **Hidden Markov Model (HMM)**: An HMM is characterized by: - A set of hidden states.
Locally decodable codes (LDCs) are a type of error-correcting code that allows for the recovery of specific bits of information from a coded message with a small number of queries to the encoded data. They are designed to efficiently decode parts of the original message even if the encoded message is partially corrupted, and without needing to access the entire codeword.
Message authentication is a process used to verify the integrity and authenticity of a message. It ensures that a message has not been altered in transit and confirms the identity of the sender. This is crucial in various communication systems to prevent unauthorized access, tampering, and impersonation. Key concepts in message authentication include: 1. **Integrity**: Ensuring the message has not been modified during transmission. If any part of the message is altered, the integrity check will fail.
Zemor's decoding algorithm is a decoding method primarily used for certain types of error-correcting codes known as low-density parity-check (LDPC) codes, as well as for specific algebraic and combinatorial codes. Named after J. Zemor, the algorithm is designed to efficiently recover the original information from a received codeword that may contain errors due to noise in communication channels.
Coroglen is a small rural locality located in the Waikato region of New Zealand, specifically in the Thames-Coromandel District. It is situated near the Coromandel Peninsula and is known for its scenic landscapes, which include forests and farmland. This area serves as a gateway to various outdoor activities, such as hiking, fishing, and exploring nearby beaches. Coroglen is also notable for its community aspects, including local businesses and events that reflect the rural lifestyle.
Rank error-correcting codes are a class of codes used in error detection and correction, particularly for structured data such as matrices or tensors. These codes are designed to correct errors that can occur during the transmission or storage of data, ensuring that the original information can be retrieved even in the presence of errors. ### Key Concepts: 1. **Rank**: In the context of matrices, the rank of a matrix is the dimension of the vector space generated by its rows or columns.
Here is a vendor showcasing their device. They claim in that video that a single photon is produced and detected:
Can be achieved in two ways it seems:
Animation of Hong-Ou-Mandel Effect on a silicon like structure by Quantum Light University of Sheffield (2014): www.youtube.com/watch?v=ld2r2IMt4vg No maths, but gives the result clear: the photons are always on the same side.
Video 1.
Quantum Computing with Light by Quantum Light University of Sheffield (2015)
Source. Animation of in-silicon single photon device with brief description of emitting and receiving elements. Mentions:
Video 2. Source. More theoretical approach.
Video 3.
Building a Quantum Computer Out of Light by whentheappledrops (2014)
Source. Yada yada yada, then at youtu.be/ofg335d3BJ8?t=341 shows optical table and it starts being worth it. Jacques Carolan from the University of Bristol goes through their setup which injects 5 photons into a 21-way experiment.

Pinned article: Introduction to the OurBigBook Project

Welcome to the OurBigBook Project! Our goal is to create the perfect publishing platform for STEM subjects, and get university-level students to write the best free STEM tutorials ever.
Everyone is welcome to create an account and play with the site: ourbigbook.com/go/register. We belive that students themselves can write amazing tutorials, but teachers are welcome too. You can write about anything you want, it doesn't have to be STEM or even educational. Silly test content is very welcome and you won't be penalized in any way. Just keep it legal!
We have two killer features:
  1. topics: topics group articles by different users with the same title, e.g. here is the topic for the "Fundamental Theorem of Calculus" ourbigbook.com/go/topic/fundamental-theorem-of-calculus
    Articles of different users are sorted by upvote within each article page. This feature is a bit like:
    • a Wikipedia where each user can have their own version of each article
    • a Q&A website like Stack Overflow, where multiple people can give their views on a given topic, and the best ones are sorted by upvote. Except you don't need to wait for someone to ask first, and any topic goes, no matter how narrow or broad
    This feature makes it possible for readers to find better explanations of any topic created by other writers. And it allows writers to create an explanation in a place that readers might actually find it.
    Figure 1.
    Screenshot of the "Derivative" topic page
    . View it live at: ourbigbook.com/go/topic/derivative
  2. local editing: you can store all your personal knowledge base content locally in a plaintext markup format that can be edited locally and published either:
    This way you can be sure that even if OurBigBook.com were to go down one day (which we have no plans to do as it is quite cheap to host!), your content will still be perfectly readable as a static site.
    Figure 2.
    You can publish local OurBigBook lightweight markup files to either https://OurBigBook.com or as a static website
    .
    Figure 3.
    Visual Studio Code extension installation
    .
    Figure 4.
    Visual Studio Code extension tree navigation
    .
    Figure 5.
    Web editor
    . You can also edit articles on the Web editor without installing anything locally.
    Video 3.
    Edit locally and publish demo
    . Source. This shows editing OurBigBook Markup and publishing it using the Visual Studio Code extension.
    Video 4.
    OurBigBook Visual Studio Code extension editing and navigation demo
    . Source.
  3. https://raw.githubusercontent.com/ourbigbook/ourbigbook-media/master/feature/x/hilbert-space-arrow.png
  4. Infinitely deep tables of contents:
    Figure 6.
    Dynamic article tree with infinitely deep table of contents
    .
    Descendant pages can also show up as toplevel e.g.: ourbigbook.com/cirosantilli/chordate-subclade
All our software is open source and hosted at: github.com/ourbigbook/ourbigbook
Further documentation can be found at: docs.ourbigbook.com
Feel free to reach our to us for any help or suggestions: docs.ourbigbook.com/#contact