The timeline of electrical and electronic engineering encompasses numerous advancements and milestones that have contributed to the field as we know it today. Here’s a brief overview of key events and developments: ### 19th Century - **1800**: Italian scientist Alessandro Volta invented the voltaic pile, the first chemical battery that could provide a steady source of electricity. - **1820**: Hans Christian Ørsted discovered that electric currents create magnetic fields, forming the basis of electromagnetism.
Disk encryption is a security process that involves encoding the data on a storage device, such as a hard drive, solid-state drive, or removable media, to protect it from unauthorized access. When a disk is encrypted, the data stored on it is transformed into a format that is unreadable without the appropriate decryption key or password.
Security engineering is a field of engineering that focuses on ensuring the security of systems, networks, and data. It encompasses a broad range of practices, processes, and technologies designed to protect assets from threats, vulnerabilities, and attacks. The goal of security engineering is to design and build systems that are resilient to tampering, intrusion, and other security threats. Key aspects of security engineering include: 1. **Risk Assessment:** Identifying potential threats and vulnerabilities in a system and evaluating the risks associated with them.
An AF-heap, or "Amortized Fibonacci heap," is a data structure that is an enhancement and a variant of the Fibonacci heap. The AF-heap supports priority queue operations with better amortized time complexity for specific operations. It is particularly useful in applications such as graph algorithms, where efficient priority queue operations are crucial.
A Critical Security Parameter (CSP) is a term used in the field of cryptography and information security to refer to a sensitive piece of information that must be kept secret to maintain the security of a cryptographic system. CSPs are vital for ensuring the integrity, confidentiality, and authenticity of data and communication within various security protocols. CSPs can include: 1. **Cryptographic Keys:** This is perhaps the most common type of CSP.
The term "founders of statistics" typically refers to key figures who made significant contributions to the development of the field of statistics. Here are a few of the most notable individuals often recognized as foundational figures in statistics: 1. **John Graunt (1620–1674)**: Often considered one of the first statisticians, Graunt is known for his work on vital statistics and the analysis of mortality records, which laid the groundwork for demographic statistics.
HTTP Strict Transport Security (HSTS) is a web security policy mechanism that helps protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. HSTS enables a web server to declare that web browsers should only interact with it using secure HTTPS connections, rather than using unencrypted HTTP. Here's how HSTS works and its key features: 1. **Enforcement of HTTPS**: When a site implements HSTS, it informs browsers to enforce secure connections via HTTPS.
In cryptography, padding is a technique used to ensure that plaintext data conforms to the required length for encryption algorithms, especially block ciphers. Block ciphers operate on fixed-size blocks of data (for instance, 128 bits or 256 bits), and if the plaintext does not fill up a complete block, padding is added to complete it.
"Signatures with efficient protocols" generally refers to cryptographic digital signatures that can be generated, verified, and possibly managed using methods that optimize performance and resource consumption. Digital signatures are essential in various applications, such as ensuring data integrity, authentication, and non-repudiation in digital communications. ### Key Concepts: 1. **Digital Signatures**: These are mathematical schemes for verifying the authenticity and integrity of digital messages or documents.
In the context of cryptography, "snake oil" refers to software, algorithms, or security solutions that are marketed as effective or secure but are actually ineffective, flawed, or even dangerous. The term is derived from the historical marketing of dubious health products, particularly those that were sold with exaggerated claims of their efficacy, akin to the idea of "snake oil" in medicine.
The American Institute of Physics (AIP) is a nonprofit organization that aims to promote and advance the knowledge and application of physics in various fields. Founded in 1931, AIP serves the physics community by publishing research journals, organizing conferences, providing educational resources, and advocating for the interests of physicists and the discipline of physics as a whole. AIP also plays a role in facilitating communication and collaboration among different physics organizations, institutions, and individuals.
Gerhard Schmidt is a notable figure in the field of crystallography, which is the study of crystals and their atomic structure. He is known for his contributions to the understanding of crystal structures and related phenomena. Schmidt has authored and co-authored numerous scientific papers and worked on various aspects of crystallography, particularly in the context of materials science and chemistry.
In graph theory, the term "incidence" refers to the relationship between the edges and the vertices of a graph. Specifically, it describes how edges connect to vertices. In a graph: - A **vertex** is a point or a node. - An **edge** is a line connecting two vertices. There are a few important concepts associated with incidence in graphs: 1. **Incidence Relation**: An edge is said to be incident to the vertices it connects.
"Alan Turing: The Enigma" is a biography of the British mathematician and logician Alan Turing, written by Andrew Hodges and first published in 1983. The book presents a detailed account of Turing's life, focusing on his contributions to computer science, mathematics, and artificial intelligence, as well as his crucial role in breaking the German Enigma code during World War II.
"Once Upon a Time... The Discoverers" (original French title: "Il était une fois... les Découvreurs") is an animated educational series that is part of the "Once Upon a Time..." franchise, created by Albert Barillé. This particular series, which aired in 1994, focuses on the history of exploration and the lives of famous explorers throughout various periods.
Modular decomposition is a concept primarily used in graph theory and computer science, particularly in the study of algorithms and structures related to graphs. It involves breaking down a graph into its simpler, modular components or modules based on the relationships between its vertices. ### Key Concepts: 1. **Module**: In a graph, a module (or a strongly connected component) is a subset of vertices such that every vertex in this subset is equally connected to all the other vertices in the subset.
Pinned article: Introduction to the OurBigBook Project
Welcome to the OurBigBook Project! Our goal is to create the perfect publishing platform for STEM subjects, and get university-level students to write the best free STEM tutorials ever.
Everyone is welcome to create an account and play with the site: ourbigbook.com/go/register. We belive that students themselves can write amazing tutorials, but teachers are welcome too. You can write about anything you want, it doesn't have to be STEM or even educational. Silly test content is very welcome and you won't be penalized in any way. Just keep it legal!
Intro to OurBigBook
. Source. We have two killer features:
- topics: topics group articles by different users with the same title, e.g. here is the topic for the "Fundamental Theorem of Calculus" ourbigbook.com/go/topic/fundamental-theorem-of-calculusArticles of different users are sorted by upvote within each article page. This feature is a bit like:
- a Wikipedia where each user can have their own version of each article
- a Q&A website like Stack Overflow, where multiple people can give their views on a given topic, and the best ones are sorted by upvote. Except you don't need to wait for someone to ask first, and any topic goes, no matter how narrow or broad
This feature makes it possible for readers to find better explanations of any topic created by other writers. And it allows writers to create an explanation in a place that readers might actually find it.Figure 1. Screenshot of the "Derivative" topic page. View it live at: ourbigbook.com/go/topic/derivativeVideo 2. OurBigBook Web topics demo. Source. - local editing: you can store all your personal knowledge base content locally in a plaintext markup format that can be edited locally and published either:This way you can be sure that even if OurBigBook.com were to go down one day (which we have no plans to do as it is quite cheap to host!), your content will still be perfectly readable as a static site.
- to OurBigBook.com to get awesome multi-user features like topics and likes
- as HTML files to a static website, which you can host yourself for free on many external providers like GitHub Pages, and remain in full control
Figure 3. Visual Studio Code extension installation.Figure 4. Visual Studio Code extension tree navigation.Figure 5. Web editor. You can also edit articles on the Web editor without installing anything locally.Video 3. Edit locally and publish demo. Source. This shows editing OurBigBook Markup and publishing it using the Visual Studio Code extension.Video 4. OurBigBook Visual Studio Code extension editing and navigation demo. Source. - Infinitely deep tables of contents:
All our software is open source and hosted at: github.com/ourbigbook/ourbigbook
Further documentation can be found at: docs.ourbigbook.com
Feel free to reach our to us for any help or suggestions: docs.ourbigbook.com/#contact





