Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Sample size determinationSample size determination is the act of choosing the number of observations or replicates to include in a statistical sample. The sample size is an important feature of any empirical study in which the goal is to make inferences about a population from a sample. In practice, the sample size used in a study is usually determined based on the cost, time, or convenience of collecting the data, and the need for it to offer sufficient statistical power.
Oil shaleOil shale is an organic-rich fine-grained sedimentary rock containing kerogen (a solid mixture of organic chemical compounds) from which liquid hydrocarbons can be produced. In addition to kerogen, general composition of oil shales constitutes inorganic substance and bitumens. Based on their deposition environment, oil shales are classified as marine, lacustrine and terrestrial oil shales. Oil shales differ from oil-bearing shales, shale deposits that contain petroleum (tight oil) that is sometimes produced from drilled wells.
Supercritical fluidA supercritical fluid (SCF) is any substance at a temperature and pressure above its critical point, where distinct liquid and gas phases do not exist, but below the pressure required to compress it into a solid. It can effuse through porous solids like a gas, overcoming the mass transfer limitations that slow liquid transport through such materials. SCF are much superior to gases in their ability to dissolve materials like liquids or solids.
X-ray astronomyX-ray astronomy is an observational branch of astronomy which deals with the study of X-ray observation and detection from astronomical objects. X-radiation is absorbed by the Earth's atmosphere, so instruments to detect X-rays must be taken to high altitude by balloons, sounding rockets, and satellites. X-ray astronomy uses a type of space telescope that can see x-ray radiation which standard optical telescopes, such as the Mauna Kea Observatories, cannot.
Energy storageEnergy storage is the capture of energy produced at one time for use at a later time to reduce imbalances between energy demand and energy production. A device that stores energy is generally called an accumulator or battery. Energy comes in multiple forms including radiation, chemical, gravitational potential, electrical potential, electricity, elevated temperature, latent heat and kinetic. Energy storage involves converting energy from forms that are difficult to store to more conveniently or economically storable forms.
Shale oilShale oil is an unconventional oil produced from oil shale rock fragments by pyrolysis, hydrogenation, or thermal dissolution. These processes convert the organic matter within the rock (kerogen) into synthetic oil and gas. The resulting oil can be used immediately as a fuel or upgraded to meet refinery feedstock specifications by adding hydrogen and removing impurities such as sulfur and nitrogen. The refined products can be used for the same purposes as those derived from crude oil.
Hydrogen productionHydrogen production is the family of industrial methods for generating hydrogen gas. As of 2020, the majority of hydrogen (~95%) is produced from fossil fuels by steam reforming of natural gas and other light hydrocarbons, partial oxidation of heavier hydrocarbons, and coal gasification. Other methods of hydrogen production include biomass gasification, methane pyrolysis, and electrolysis of water. Methane pyrolysis and water electrolysis can use any source of electricity including solar power.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Intramuscular injectionIntramuscular injection, often abbreviated IM, is the injection of a substance into a muscle. In medicine, it is one of several methods for parenteral administration of medications. Intramuscular injection may be preferred because muscles have larger and more numerous blood vessels than subcutaneous tissue, leading to faster absorption than subcutaneous or intradermal injections. Medication administered via intramuscular injection is not subject to the first-pass metabolism effect which affects oral medications.