Kerckhoffs's principle Updated +Created
Basically the opposite of security through obscurity, though slightly more focused on cryptography.
Polytechnic Institute of Paris Updated +Created
Embryonics by species Updated +Created
Income distribution Updated +Created
Logic synthesis Updated +Created
The output of this step is another Verilog file, but one that exclusively uses interlinked cell library components.
Utility Updated +Created
Volt Updated +Created
Work (human activity) Updated +Created
Rydberg formula Updated +Created
Dragon Boat Festival Updated +Created
Electric current Updated +Created
In the context of Maxwell's equations, it is vector field that is one of the inputs of the equation.
Section "Maxwell's equations with pointlike particles" asks if the theory would work for pointlike particles in order to predict the evolution of this field as part of the equations themselves rather than as an external element.
List of computational problems Updated +Created
Monster Raving Loony Party Updated +Created
Video 1.
Monster Raving Loony Party Conference by Britclip
. Source.
Analog quantum computer Updated +Created
Video 1.
TensorFlow quantum by Masoud Mohseni (2020)
Source. At the timestamp, Masoud gives a thought experiment example of the perhaps simplest to understand analog quantum computer: chained double-slit experiments with carefully calculated distances between slits. Calulating the final propability distribution of that grows exponentially.
Analytical chemistry Updated +Created
Analytic continuation Updated +Created
visualizing the Riemann hypothesis and analytic continuation by 3Blue1Brown (2016) is a good quick visual non-mathematical introduction is to it.
The key question is: how can this continuation be unique since we are defining the function outside of its original domain?
The answer is: due to the identity theorem.
Chinese male ideal Updated +Created
Public Domain Day Updated +Created

There are unlisted articles, also show them or only show them.