No New word/phrase Example of use Related Vocabulary Morphology

piloturuguayanAI and Robotics

Oct 15, 2013 (3 years and 9 months ago)

66 views


Group 2, Task 1
:

Specialist vocabulary building exercise

No

New
word/phrase

Example of use

Related
Vocabulary

Morphology

1

Acyclic

In mathematics and computer
science, a directed acyclic
graph is a directed graph with
no directed cycles.

Botany


2

Multiplicity

Among the great

multiplicity

of
details that complete
battlefield 2, there is one
minor feature that is both
obscure and wonderful.

Magnitude,
numerousness

Multiple,

3

Induction

An example of induction is a
ceremony welcoming new
members of
the military.

generalization

Induce, inductive

4

Rectilinear

Rectilinear motion does not
require special calculation

Linear, one
-
dimension


5

Spreadsheet

A spreadsheet is a computer
application with tools that
increase the user's
productivity in
capturing,
analyzing, and sharing tabular
data sets
.

Computer
program


6

Epidemiology

Nevertheless, we were unable
to identify any studies
examining the epidemiology,
characteristics or
management of dysphagia in
a typical primary care
population.

Prevale
nce

e
pidemiological
,

e
pidemiologist

7

Combinatorial

But beside consistency
checks, there are other, often
overlooked, sources of
complexity that are purely
combinatorial
.

Math

Combinatory

8

Gradient

Preconditioned conjugate
gradients are shown to be
extremely effective for all
symmetric problems.

concentration
gradient

Gradient

9

Anneal

Annealing of the films in
precisely controlled
atmospheres showed that the
ferromagnetism in our films is
not linked to the carrier
concentration density
.

harden,
indurate

annealer

10

Convergence

Convergence of computing
and home entertainment is
where
M
icrosoft believes it
can establish a new market
share.

encounter,
meeting

convergent

11

Optimization

Equation display is
an
automatically optimization

for
the reso
lution of the user's
screen.

improvement

optimize, optimal

12

Bug

Errors in computer programs
are called bugs.

Error

buggy

13

Assemble

Assembled

point police
snatched the pedal powered
sound

system from the crowd
and prevented the
autonomous bloc from
assembling in the square.

b
ring together,
join

assembly

14

Arithmetic


Integer arithmetic within the
decoders does not work, due
to the algorithms used.

math

Arithmetically,
arithmetician

15

Optical

This all optical computing, or ‘
light

controlling light ‘

has
remained a dream of
technologists for some time.

visual

Optically
, optic

16

Interrupt

Interrupt routine performs a
graphics operation it may
adversely affect graphics
output from the rest of the
program.

break

interruptible,
interruptive

17

Cryptography

Kerberos is a ne
twork security
protocol from MIT

that uses
private key cryptography to
provide strong security
between nodes.

e
ncryption

cryptographer,
cryptographic

18

Pragma

In C/C++ programming
languages,
pragma is
a
directive communicating
additional implementation
-
specific information.

computer
programming
language

pragmatic

19

Natural
language
processing

Natural language processing
gives machines the ability to
read and understand the
languages that humans speak

process


20

Cognitive
simulation

Cognitive simulation in
computer is primarily based
on linguistic development in


young children.

21

Paradigm

Analysis and design the
object
-
oriented paradigm is a
new and different way of
thinking about programming.

pattern,
example,
sample

paradigmatic

22

Evolutionary

Evolutionary computation
uses a form of optimization
search
.

Bio
-
informatics

evolution

23

Circumscription

The T
axon

circumscription
that these publications provide
is therefore usually limited to a
geographic area.

restriction,
confinement

circumscriptive

24

Machine
learning

Machine learning is the science
of getting computers to act
without being explicitly
programmed

Computer,
algorithm


25

Hierarchical

In a few clicks create
hierarchical a menu with
special effects, menu style, ...
and a ton of powerful
parameters.

rank

hierarchically

26

computing
platform

A computing platform includes
a hardware
architecture and a
software framework (including
application frameworks),
where the combination allows
software, particularly
application software, to run
.

Computer,
operating
system


27

Transcend

Transcend duality than
paintings or photographs upon
a fla
t surface can go beyond
two dimensions.

excel, surpass,
stand out

transcendingly

28

Compatible

However
USB

2.0 devices are
backward compatible with
USB

1.1 interfaces.

harmonious,
matched

Compatibility
,
compatibly

29

Memory
allocation

The dynamic memory
allocation algorithm actually
used can impact performance
significantly and a study
conducted in 1994 by Digital
Equipment Corporation
illustrates the overheads
involved for a variety of
allocators.

Computer,
memory
management


30

Intermediary

Intermediary is therefore that
all departments should involve
interpreter,
translator

intermediary

private and voluntary sector
intermediaries for e
-
government services as part
of their overall e
-
government
strategy.

31

Android

It was the J
apanese who
rea
lly liked robots; so they
would breed the electronic
wizards most likely to
construct the first genuine
androids.

robot,
automaton,
golem

android

32

Multi
-
tasking

The running of two or more
programs in one computer at
the same time

is called
Multitasking.

Computer,
operating
system

multitask

33

primitive


Postscript is a T
uring
-
complete reverse polish
programming language wi
th
drawing primitives based on
B
ezier curves.

formula,
expression

Primitiveness
,

primitively

34

batch
processing

Batch processing is

execution
of a series of programs
("jobs") on a computer without
manual intervention.

Computer,
program


35

Virtual memory

In computing, virtual memory
is a memory management
technique developed for
multitasking kernels.

Computer,
memory
management


36

Interface

Despite advances in human
-
computer interface design, we
are accustomed to a quality of
communication that no
computer can yet convey.

C
omputer
science,
computing


37

Exponential

We review briefly the solution
of linear equations by using
the
matrix exponential and the
J
ordan canonical form of a
matrix.

function,
mapping,
mathematical
function, single
-
valued function,
map

exponentially

38

Asymmetric

Asymmetric digital subscriber
line (ADSL), for example,
supports more bandwidth
downstream than

upstream.

Etymology

Asymmetric
ally

39

Anonymous

In computer science, an
anonymous pipe is a simplex
FIFO communication channel

anonymity,
anonymousness

that may be used for one
-
way
inter
-
process communication
(IPC).

40

Clipboard

To change the clipboard

options when the clipboard
task pane is displayed an icon
appears in the system tray on
the taskbar.

Computer
science,
Computer
memory


41

mainstream

Before virtual memory could
be implemented in
mainstream operating
systems, many problems had
to be addr
essed.

thought,

exportable,
exportability

42

Mail merge

Mail merge is a software
function describing the
production of multiple (and
potentially large numbers of)
documents from a single
template form and a
structured data source.



43

Polymorphi
sm

In
computer science,
polymorphism is a
programming language
feature that allows values of
different data types to be
handled using a uniform
interface.

biological
science, bio
-
informatics,
multiform

polymorphic
,
polymorphous

44

Remote

Remote control means yo
u
actually take control of the
remote control means you
actually take control of the
remote pc through your local
keyboard.

Far, distant

Remotely,
remoteness

45

Troubleshooting

In computer science, the term
troubleshoot is usually used
when the problem is

suspected to be hardware
-
related.


Troubleshoot
,
troubleshooter

46

Workstation

The Alcatel T
sm
-
2532, with its
single
-
user workstation,
provides a simplified,
graphically oriented
presentation of the network
status.

Digital
computer


47

Query

Queries can

be issued from
th
e command
-
line, or from
Questioning,
search engine

Query (n, v)

within E
-
M
acs, serving as an
augmented tags facility.

48

Netiquette

(
NET
work etI
QUETTE
) Proper
manners when conferencing
between two or more users on
an online service or
the
Internet
.

Electronic
communication


49

Peripheral

U
niversal serial bus (
USB

) is
the most popular way of
connecting peripherals to your
computer.

Computer
hardware

peripherally

50

Justification

That is not a sufficient
justification for withholding
information under the code.

explanation,
account

justify