Quantum efficiencyThe term quantum efficiency (QE) may apply to incident photon to converted electron (IPCE) ratio of a photosensitive device, or it may refer to the TMR effect of a Magnetic Tunnel Junction. This article deals with the term as a measurement of a device's electrical sensitivity to light. In a charge-coupled device (CCD) or other photodetector, it is the ratio between the number of charge carriers collected at either terminal and the number of photons hitting the device's photoreactive surface.
Universal asynchronous receiver-transmitterA universal asynchronous receiver-transmitter (UART ˈjuːɑrt) is a computer hardware device for asynchronous serial communication in which the data format and transmission speeds are configurable. It sends data bits one by one, from the least significant to the most significant, framed by start and stop bits so that precise timing is handled by the communication channel. The electric signaling levels are handled by a driver circuit external to the UART. Common signal levels are RS-232, RS-485, and raw TTL for short debugging links.
Register-transfer levelIn digital circuit design, register-transfer level (RTL) is a design abstraction which models a synchronous digital circuit in terms of the flow of digital signals (data) between hardware registers, and the logical operations performed on those signals. Register-transfer-level abstraction is used in hardware description languages (HDLs) like Verilog and VHDL to create high-level representations of a circuit, from which lower-level representations and ultimately actual wiring can be derived.
Sensor nodeA sensor node (also known as a mote in North America), consists of an individual node from a sensor network that is capable of performing a desired action such as gathering, processing or communicating information with other connected nodes in a network. Although wireless sensor networks have existed for decades and used for diverse applications such as earthquake measurements or warfare, the modern development of small sensor nodes dates back to the 1998 Smartdust project and the NASA.
Smart cameraA smart camera (sensor) or intelligent camera (sensor) or (smart) vision sensor or intelligent vision sensor or smart optical sensor or intelligent optical sensor or smart visual sensor or intelligent visual sensor is a machine vision system which, in addition to image capture circuitry, is capable of extracting application-specific information from the captured images, along with generating event descriptions or making decisions that are used in an intelligent and automated system.
Smart cardA smart card (SC), chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip. Many smart cards include a pattern of metal contacts to electrically connect to the internal chip. Others are contactless, and some are both. Smart cards can provide personal identification, authentication, data storage, and application processing.
Memory barrierIn computing, a memory barrier, also known as a membar, memory fence or fence instruction, is a type of barrier instruction that causes a central processing unit (CPU) or compiler to enforce an ordering constraint on memory operations issued before and after the barrier instruction. This typically means that operations issued prior to the barrier are guaranteed to be performed before operations issued after the barrier. Memory barriers are necessary because most modern CPUs employ performance optimizations that can result in out-of-order execution.
Length measurementLength measurement, distance measurement, or range measurement (ranging) refers to the many ways in which length, distance, or range can be measured. The most commonly used approaches are the rulers, followed by transit-time methods and the interferometer methods based upon the speed of light. For objects such as crystals and diffraction gratings, diffraction is used with X-rays and electron beams. Measurement techniques for three-dimensional structures very small in every dimension use specialized instruments such as ion microscopy coupled with intensive computer modeling.
ScrubberScrubber systems (e.g. chemical scrubbers, gas scrubbers) are a diverse group of air pollution control devices that can be used to remove some particulates and/or gases from industrial exhaust streams. An early application of a carbon dioxide scrubber was in the submarine the Ictíneo I, in 1859; a role for which they continue to be used today. Traditionally, the term "scrubber" has referred to pollution control devices that use liquid to wash unwanted pollutants from a gas stream.
Disk encryptionDisk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used to prevent unauthorized access to data storage. The expression full disk encryption (FDE) (or whole disk encryption) signifies that everything on the disk is encrypted, but the master boot record (MBR), or similar area of a bootable disk, with code that starts the operating system loading sequence, is not encrypted.