Kolmogorov complexityIn algorithmic information theory (a subfield of computer science and mathematics), the Kolmogorov complexity of an object, such as a piece of text, is the length of a shortest computer program (in a predetermined programming language) that produces the object as output. It is a measure of the computational resources needed to specify the object, and is also known as algorithmic complexity, Solomonoff–Kolmogorov–Chaitin complexity, program-size complexity, descriptive complexity, or algorithmic entropy.
Space complexityThe space complexity of an algorithm or a computer program is the amount of memory space required to solve an instance of the computational problem as a function of characteristics of the input. It is the memory required by an algorithm until it executes completely. This includes the memory space used by its inputs, called input space, and any other (auxiliary) memory it uses during execution, which is called auxiliary space. Similar to time complexity, space complexity is often expressed asymptotically in big O notation, such as etc.
Modular connectorA modular connector is a type of electrical connector for cords and cables of electronic devices and appliances, such as in computer networking, telecommunication equipment, and audio headsets. Modular connectors were originally developed for use on specific Bell System telephone sets in the 1960s, and similar types found use for simple interconnection of customer-provided telephone subscriber premises equipment to the telephone network.
Batesian mimicryBatesian mimicry is a form of mimicry where a harmless species has evolved to imitate the warning signals of a harmful species directed at a predator of them both. It is named after the English naturalist Henry Walter Bates, after his work on butterflies in the rainforests of Brazil. Batesian mimicry is the most commonly known and widely studied of mimicry complexes, such that the word mimicry is often treated as synonymous with Batesian mimicry. There are many other forms however, some very similar in principle, others far separated.
Social networkA social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for analyzing the structure of whole social entities as well as a variety of theories explaining the patterns observed in these structures. The study of these structures uses social network analysis to identify local and global patterns, locate influential entities, and examine network dynamics.
Müllerian mimicryMüllerian mimicry is a natural phenomenon in which two or more well-defended species, often foul-tasting and sharing common predators, have come to mimic each other's honest warning signals, to their mutual benefit. The benefit to Müllerian mimics is that predators only need one unpleasant encounter with one member of a set of Müllerian mimics, and thereafter avoid all similar coloration, whether or not it belongs to the same species as the initial encounter.
Chaos theoryChaos theory is an interdisciplinary area of scientific study and branch of mathematics focused on underlying patterns and deterministic laws of dynamical systems that are highly sensitive to initial conditions, and were once thought to have completely random states of disorder and irregularities. Chaos theory states that within the apparent randomness of chaotic complex systems, there are underlying patterns, interconnection, constant feedback loops, repetition, self-similarity, fractals, and self-organization.
Telecommunications networkA telecommunications network is a group of nodes interconnected by telecommunications links that are used to exchange messages between the nodes. The links may use a variety of technologies based on the methodologies of circuit switching, message switching, or packet switching, to pass messages and signals. Multiple nodes may cooperate to pass the message from an originating node to the destination node, via multiple network hops. For this routing function, each node in the network is assigned a network address for identification and locating it on the network.
Behavior modificationBehavior modification is an early approach that used respondent and operant conditioning to change behavior. Based on methodological behaviorism, overt behavior was modified with consequences, including positive and negative reinforcement contingencies to increase desirable behavior, or administering positive and negative punishment and/or extinction to reduce problematic behavior. It also used Flooding desensitization to combat phobias.
MimicryIn evolutionary biology, mimicry is an evolved resemblance between an organism and another object, often an organism of another species. Mimicry may evolve between different species, or between individuals of the same species. Often, mimicry functions to protect a species from predators, making it an anti-predator adaptation. Mimicry evolves if a receiver (such as a predator) perceives the similarity between a mimic (the organism that has a resemblance) and a model (the organism it resembles) and as a result changes its behaviour in a way that provides a selective advantage to the mimic.