text stringlengths 60 353k | source stringclasses 2 values |
|---|---|
**Comparison of color models in computer graphics**
Comparison of color models in computer graphics:
This article provides introductory information about the RGB, HSV, and HSL color models from a computer graphics (Web page, image) perspective. An introduction to colors is also provided to support the main discussion.
Basics of color:
Primary colors and hue First, "color" refers to the human brain's subjective interpretation of combinations of a narrow band of wavelengths of light. For this reason, the definition of "color" is not based on a strict set of physical phenomena. Therefore, even basic concepts like "primary colors" are not clearly defined. For example, traditional "Painter's Colors" use red, blue, and yellow as the primary colors, "Printer's Colors" use cyan, yellow, and magenta, and "Light Colors" use red, green, and blue. "Light colors", more formally known as additive colors, are formed by combining red, green, and blue light. This article refers to additive colors and refers to red, green, and blue as the primary colors.
Basics of color:
Hue is a term describing a pure color, that is, a color not modified by tinting or shading (see below). In additive colors, hues are formed by combining two primary colors. When two primary colors are combined in equal intensities, the result is a "secondary color".
Basics of color:
Color wheel A color wheel is a tool that provides a visual representation of the relationships between all possible hues. The primary colors are arranged around a circle at equal (120 degree) intervals. (Warning: Color wheels frequently depict "Painter's Colors" primary colors, which leads to a different set of hues than additive colors.) The illustration shows a simple color wheel based on the additive colors. Note that the position (top, right) of the starting color, typically red, is arbitrary, as is the order of green and blue (clockwise, counter-clockwise). The illustration also shows the secondary colors, yellow, cyan, and magenta, located halfway between (60 degrees) the primary colors.
Complementary color:
The complement of a hue is the hue that is opposite it (180 degrees) on the color wheel. Using additive colors, mixing a hue and its complement in equal amounts produces white.
Complementary color:
Tints and shades The following discussion uses an illustration involving three projectors pointing to the same spot on a screen. Each projector is capable of generating one hue. The "intensities" of each projector are "matched" and can be equally adjusted from zero to full. (Note: "Intensity" is used here in the same sense as the RGB color model. The subject of matching, or "gamma correction", is beyond the level of this article.) A shade is produced by "dimming" a hue. Painters refer to this as "adding black". In our illustration, one projector is set to full intensity, a second is set to some intensity between zero and full, and third is set to zero. "Dimming" is accomplished by decreasing each projector's intensity setting to the same fraction of its start setting.
Complementary color:
In the shade example, with any fully shaded hue, that all three projectors are set to zero intensity, resulting in black.
Complementary color:
A tint is produced by "lightening" a hue. Painters refer to this as "adding white". In our illustration, one projector is set to full intensity, a second is set to some intensity between zero and full, and third is set to zero. "Lightening" is accomplished by increasing each projector's intensity setting by the same fraction from its start setting to full.
Complementary color:
In the tinting example, note that the third projector is now contributing. When the hue is fully lightened, all three projectors are each at full intensity, and the result is white.
Complementary color:
Note an attribute of the total intensity in the additive model. If full intensity for one projector is 1, then a primary color has a combined intensity of 1. A secondary color has a total intensity of 2. White has a total intensity of 3. Tinting, or "adding white", increases the total intensity of the hue. While this is simply a fact, the HSL model will take this fact into account in its design.
Complementary color:
Tones Tone is a general term, typically used by painters, to refer to the effects of reducing the "colorfulness" of a hue.; painters refer to it as "adding gray". Note that gray is not a color or even a single concept but refers to all the range of values between black and white where all three primary colors are equally represented. The general term is provided as more specific terms have conflicting definitions in different color models. Thus, shading takes a hue toward black, tinting takes a hue towards white, and tones cover the range between.
Choosing a color model:
No one color model is necessarily "better" than another. Typically, the choice of a color model is dictated by external factors, such as a graphics tool or the need to specify colors according to the CSS2 or CSS3 standard. The following discussion only describes how the models function, centered on the concepts of hue, shade, tint, and tone.
Choosing a color model:
RGB The RGB model's approach to colors is important because: It directly reflects the physical properties of "Truecolor" displays As of 2011, most graphic cards define pixel values in terms of the colors red, green, and blue. The typical range of intensity values for each color, 0–255, is based on taking a binary number with 32 bits and breaking it up into four bytes of 8 bits each. 8 bits can hold a value from 0 to 255. The fourth byte is used to specify the "alpha", or the opacity, of the color. Opacity comes into play when layers with different colors are stacked. If the color in the top layer is less than fully opaque (alpha < 255), the color from underlying layers "shows through".In the RGB model, hues are represented by specifying one color as full intensity (255), a second color with a variable intensity, and the third color with no intensity (0).
Choosing a color model:
The following provides some examples using red as the full-intensity and green as the partial-intensity colors; blue is always zero: Shades are created by multiplying the intensity of each primary color by 1 minus the shade factor, in the range 0 to 1. A shade factor of 0 does nothing to the hue, a shade factor of 1 produces black: new intensity = current intensity * (1 – shade factor)The following provides examples using orange: Tints are created by modifying each primary color as follows: the intensity is increased so that the difference between the intensity and full intensity (255) is decreased by the tint factor, in the range 0 to 1. A tint factor of 0 does nothing, a tint factor of 1 produces white: new intensity = current intensity + (255 – current intensity) * tint factorThe following provides examples using orange: Tones are created by applying both a shade and a tint. The order in which the two operations are performed does not matter, with the following restriction: when a tint operation is performed on a shade, the intensity of the dominant color becomes the "full intensity"; that is, the intensity value of the dominant color must be used in place of 255.
Choosing a color model:
The following provides examples using orange: HSV The HSV, or HSB, model describes colors in terms of hue, saturation, and value (brightness). Note that the range of values for each attribute is arbitrarily defined by various tools or standards. Be sure to determine the value ranges before attempting to interpret a value.
Choosing a color model:
Hue corresponds directly to the concept of hue in the Color Basics section. The advantages of using hue are The angular relationship between tones around the color circle is easily identified Shades, tints, and tones can be generated easily without affecting the hueSaturation corresponds directly to the concept of tint in the Color Basics section, except that full saturation produces no tint, while zero saturation produces white, a shade of gray, or black.
Choosing a color model:
Value corresponds directly to the concept of intensity in the Color Basics section.
Choosing a color model:
Pure colors are produced by specifying a hue with full saturation and value Shades are produced by specifying a hue with full saturation and less than full value Tints are produced by specifying a hue with less than full saturation and full value Tones are produced by specifying a hue and both less than full saturation and value White is produced by specifying zero saturation and full value, regardless of hue Black is produced by specifying zero value, regardless of hue or saturation Shades of gray are produced by specifying zero saturation and between zero and full valueThe advantage of HSV is that each of its attributes corresponds directly to the basic color concepts, which makes it conceptually simple. The perceived disadvantage of HSV is that the saturation attribute corresponds to tinting, so desaturated colors have increasing total intensity. For this reason, the CSS3 standard plans to support RGB and HSL but not HSV.
Choosing a color model:
HSL The HSL model describes colors in terms of hue, saturation, and lightness (also called luminance). (Note: the definition of saturation in HSL is substantially different from HSV, and lightness is not intensity.) The model has two prominent properties: The transition from black to a hue to white is symmetric and is controlled solely by increasing lightness Decreasing saturation transitions to a shade of gray dependent on the lightness, thus keeping the overall intensity relatively constantThe properties mentioned above have led to the wide use of HSL, in particular, in the CSS3 color model.As in HSV, hue corresponds directly to the concept of hue in the Color Basics section. The advantages of using hue are The angular relationship between tones around the color circle is easily identified Shades, tints, and tones can be generated easily without affecting the hueLightness combines the concepts of shading and tinting from the Color Basics section. Assuming full saturation, lightness is neutral at the midpoint value, for example 50%, and the hue displays unaltered. As lightness decreases below the midpoint, it has the effect of shading. Zero lightness produces black. As the value increases above 50%, it has the effect of tinting, and full lightness produces white.
Choosing a color model:
At zero saturation, lightness controls the resulting shade of gray. A value of zero still produces black, and full lightness still produces white. The midpoint value results in the "middle" shade of gray, with an RGB value of (128,128,128).
Saturation, or the lack of it, produces tones of the reference hue that converge on the zero-saturation shade of gray, which is determined by the lightness. The following examples uses the hues red, orange, and yellow at midpoint lightness with decreasing saturation. The resulting RGB value and the total intensity is shown.
Note that the physical nature of additive color prevents the scheme from working exactly except for hues halfway between the primary and secondary colors. However, the total intensity of the tones resulting from decreasing saturation are much closer than tinting alone, as in HSV. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Censoring (statistics)**
Censoring (statistics):
In statistics, censoring is a condition in which the value of a measurement or observation is only partially known.
Censoring (statistics):
For example, suppose a study is conducted to measure the impact of a drug on mortality rate. In such a study, it may be known that an individual's age at death is at least 75 years (but may be more). Such a situation could occur if the individual withdrew from the study at age 75, or if the individual is currently alive at the age of 75.
Censoring (statistics):
Censoring also occurs when a value occurs outside the range of a measuring instrument. For example, a bathroom scale might only measure up to 140 kg. If a 160-kg individual is weighed using the scale, the observer would only know that the individual's weight is at least 140 kg.
The problem of censored data, in which the observed value of some variable is partially known, is related to the problem of missing data, where the observed value of some variable is unknown.
Censoring (statistics):
Censoring should not be confused with the related idea truncation. With censoring, observations result either in knowing the exact value that applies, or in knowing that the value lies within an interval. With truncation, observations never result in values outside a given range: values in the population outside the range are never seen or never recorded if they are seen. Note that in statistics, truncation is not the same as rounding.
Types:
Left censoring – a data point is below a certain value but it is unknown by how much.
Interval censoring – a data point is somewhere on an interval between two values.
Right censoring – a data point is above a certain value but it is unknown by how much.
Type I censoring occurs if an experiment has a set number of subjects or items and stops the experiment at a predetermined time, at which point any subjects remaining are right-censored.
Type II censoring occurs if an experiment has a set number of subjects or items and stops the experiment when a predetermined number are observed to have failed; the remaining subjects are then right-censored.
Types:
Random (or non-informative) censoring is when each subject has a censoring time that is statistically independent of their failure time. The observed value is the minimum of the censoring and failure times; subjects whose failure time is greater than their censoring time are right-censored.Interval censoring can occur when observing a value requires follow-ups or inspections. Left and right censoring are special cases of interval censoring, with the beginning of the interval at zero or the end at infinity, respectively.
Types:
Estimation methods for using left-censored data vary, and not all methods of estimation may be applicable to, or the most reliable, for all data sets.A common misconception with time interval data is to class as left censored intervals where the start time is unknown. In these cases we have a lower bound on the time interval, thus the data is right censored (despite the fact that the missing start point is to the left of the known interval when viewed as a timeline!).
Analysis:
Special techniques may be used to handle censored data. Tests with specific failure times are coded as actual failures; censored data are coded for the type of censoring and the known interval or limit. Special software programs (often reliability oriented) can conduct a maximum likelihood estimation for summary statistics, confidence intervals, etc.
Analysis:
Epidemiology One of the earliest attempts to analyse a statistical problem involving censored data was Daniel Bernoulli's 1766 analysis of smallpox morbidity and mortality data to demonstrate the efficacy of vaccination. An early paper to use the Kaplan–Meier estimator for estimating censored costs was Quesenberry et al. (1989), however this approach was found to be invalid by Lin et al. unless all patients accumulated costs with a common deterministic rate function over time, they proposed an alternative estimation technique known as the Lin estimator.
Analysis:
Operating life testing Reliability testing often consists of conducting a test on an item (under specified conditions) to determine the time it takes for a failure to occur. Sometimes a failure is planned and expected but does not occur: operator error, equipment malfunction, test anomaly, etc. The test result was not the desired time-to-failure but can be (and should be) used as a time-to-termination. The use of censored data is unintentional but necessary.
Analysis:
Sometimes engineers plan a test program so that, after a certain time limit or number of failures, all other tests will be terminated. These suspended times are treated as right-censored data. The use of censored data is intentional.An analysis of the data from replicate tests includes both the times-to-failure for the items that failed and the time-of-test-termination for those that did not fail.
Analysis:
Censored regression An earlier model for censored regression, the tobit model, was proposed by James Tobin in 1958.
Analysis:
Likelihood The likelihood is the probability or probability density of what was observed, viewed as a function of parameters in an assumed model. To incorporate censored data points in the likelihood the censored data points are represented by the probability of the censored data points as a function of the model parameters given a model, i.e. a function of CDF(s) instead of the density or probability mass. The most general censoring case is interval censoring: Pr(a<x⩽b)=F(b)−F(a) , where F(x) is the CDF of the probability distribution, and the two special cases are: left censoring: Pr(−∞<x⩽b)=F(b)−F(−∞)=F(b)−0=F(b)=Pr(x⩽b) right censoring: Pr(a<x⩽∞)=F(∞)−F(a)=1−F(a)=1−Pr(x⩽a)=Pr(x>a) For continuous probability distributions: Pr(a<x⩽b)=Pr(a<x<b) Example Suppose we are interested in survival times, T1,T2,...,Tn , but we don't observe Ti for all i . Instead, we observe (Ui,δi) , with Ui=Ti and δi=1 if Ti is actually observed, and (Ui,δi) , with Ui<Ti and δi=0 if all we know is that Ti is longer than Ui .When Ti>Ui,Ui is called the censoring time.If the censoring times are all known constants, then the likelihood is L=∏i,δi=1f(ui)∏i,δi=0S(ui) where f(ui) = the probability density function evaluated at ui and S(ui) = the probability that Ti is greater than ui , called the survival function.
Analysis:
This can be simplified by defining the hazard function, the instantaneous force of mortality, as λ(u)=f(u)/S(u) so f(u)=λ(u)S(u) .Then L=∏iλ(ui)δiS(ui) .For the exponential distribution, this becomes even simpler, because the hazard rate, λ , is constant, and exp (−λu) . Then: exp (−λ∑ui) ,where k=∑δi From this we easily compute λ^ , the maximum likelihood estimate (MLE) of λ , as follows: log log (λ)−λ∑ui .Then dl/dλ=k/λ−∑ui .We set this to 0 and solve for λ to get: λ^=k/∑ui .Equivalently, the mean time to failure is: 1/λ^=∑ui/k .This differs from the standard MLE for the exponential distribution in that the any censored observations are considered only in the numerator. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Gong bass drum**
Gong bass drum:
A gong bass drum (or simply gong drum) is a musical instrument in the percussion family. It is a type of drum that uses a single large drumhead in order to create a loud, resonant sound when struck. The head can be tuned as loose as possible to avoid any sense of pitch in the sound, or tensioned more tightly to produce timpani-like tones.
Gong drum in recordings:
Gong bass drums were first produced by Tama in the late 1970s, and have since been used by artists such as Peter Criss of KISS, Billy Cobham, Neil Peart of Rush, Stewart Copeland of The Police, Tim Alexander of Primus, Mike Portnoy of Dream Theater, Simon Phillips of Toto, David Silveria of KoRn, Aaron Gillespie of Underøath, Dominic Howard of Muse, Zac Farro of Paramore, Budgie of Siouxsie and the Banshees. Pearl's similar suspended bass drums have been used by Chris Slade formerly of AC/DC, Todd Sucherman of Styx, and Joey Jordison of Slipknot. Spaun and Drum Workshop also offer their own versions of gong bass drums.
Gong drum in recordings:
Gong bass drums are usually relatively large, and are most frequently found in 20" and custom ordered 22" diameters. Orchestral versions can be 28" standard, but there are special larger ones (see below). They are often mounted on legs (much like that of a floor tom), 'rollaway' stands or ordinary tom stands/arms (though usually a pair are used for stability). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**CTEP**
CTEP:
CTEP (Ro4956371) is a research drug developed by Hoffmann-La Roche that acts as a selective allosteric antagonist of the metabotropic glutamate receptor subtype mGluR5, binding with nanomolar affinity and over 1000 times selectivity over all other receptor targets tested. In animal studies it was found to have a high oral bioavailability and a long duration of action, lasting 18 hours after a single dose, giving it considerably improved properties over older mGluR5 antagonists such as MPEP and fenobam. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Byre-dwelling**
Byre-dwelling:
A byre-dwelling ("byre"+ "dwelling") is a farmhouse in which the living quarters are combined with the livestock and/or grain barn under the same roof. In the latter case, the building is also called a housebarn in American English.
This kind of construction is found in archaeological sites in northwestern Europe from the Bronze Age. It was also used in more modern times by Mennonites in Flanders and the Netherlands.
Distribution:
Austria The Bregenzerwälderhaus from the Bregenz Forest in Vorarlberg is an example for a byre-dwelling. The stable and the usually two-storey house are under one roof.
Germany The generic German term is Wohnstallhaus from Wohnung ("dwelling"), Stall ("byre", "sty)" and Haus ("house").
Distribution:
From the Iron Age onwards the longhouse, developed from the byre-dwellings of the Bronze Age with its domestic area and adjacent cattle bays, was found across the North German Plain. As a result of the keeping of ever larger herds of cattle, these buildings became longer. Examples of such Iron Age longhouses were first excavated in large numbers on the warft of Feddersen Wierde near the German North Sea coastal town of Cuxhaven. Since then, this type of house has been found from Holland to South Jutland (for its construction see the post in ground article).
Distribution:
The variation of the hall house known as the Low Saxon house (Niedersachsenhaus) was developed from the longhouse. This type of dwelling is distributed across the North German Plain from the Netherlands to the Bay of Gdansk (Danzig) and bounded in the south by the Central Uplands.
Distribution:
To the south of this region is found the Middle German house (Ernhaus) which also occurs as a byre-dwelling and was found in many sub-variants from the Rhine to the far side of the River Vistula. Early on this type was developed into variants that separated the various functions. For example, the functions of cattle shed and barn were later transferred to separate buildings or had never been part of the domestic building at all.
Distribution:
Two-storey byre-dwellings with stone walled ground floors occurred in the northeast of Baden-Württemberg in the 15th century. They were described as Pastor Mayer houses (Pfarrer-Mayer-Häuser).The Black Forest house is probably a more recent development of a byre-dwelling, whereby the functions (especially on hillsides) were also divided over two floors. Likewise the Haubarg in North Frisia is a recent development of the Early Modern Period from the East Frisian Gulfhaus.
Distribution:
Switzerland The Engadine house which emerged in the 15th/16th centuries, especially in the Engadine, is a typical byre-dwelling. It is a solid, stone building, usually with a wooden core, which comprises domestic and working areas, one behind the other, under a single, broad saddle roof. The domestic and working areas cover three storeys, with a gate on the lower and ground floors. On the lower floor is the byre (Stallhof or Cuort) with access to the cattle bays and cellars. At the front of the ground floor storey is the vestibule (Sulèr, pietan) leading to the living quarters: the parlour (Stube), kitchen (Küche), larder (Vorratskammer) and, at the back, the barn (Scheune) for the hay. A haycart (Heukarren, tragliun) could only be taken through the upper gate or the vestibule into the barn. On the upper storey (Palatschin) are the bedrooms. The sitting room has the only stove, which heated the living quarters from the kitchen outwards. While the division of the rooms and the position of the windows and oriels (with their view of the well) were based mainly on practical considerations, the facades of Engadine houses were often richly decorated with murals and sgraffiti.
Distribution:
For centuries, Engadine houses dominated the scene in the Engadine villages of Ardez, Guarda, Zuoz, La Punt etc., where they were grouped around a common well as a village quarter that formed a Romanesque cooperative farming organisation.
Distribution:
British Isles In England too, there was a very similar type of dwelling, of which remains survive in the southwest, for example in the longhouse variants of Dartmoor, in Cornwall or in Wales. In Ireland there are similar byre-dwellings, albeit the fireplace here appears to have been placed against a gable wall. In northwestern England this type of dwelling is also described in the Cumbrian countryside.
Distribution:
Arabia Compared are the Yemeni towerhouses, in which the ground floor was reserved for animals, with dwellings on higher floors. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Xenon oxydifluoride**
Xenon oxydifluoride:
Xenon oxydifluoride is an inorganic compound with the molecular formula XeOF2. The first definitive isolation of the compound was published on 3 March 2007, producing it by the previously-examined route of partial hydrolysis of xenon tetrafluoride.
Xenon oxydifluoride:
XeF4 + H2O → XeOF2 + 2 HFThe compound has a T-shaped geometry and does not form polymers, though it does form an adduct with acetonitrile and with hydrogen fluoride.Although stable at low temperatures, it rapidly decomposes upon warming, either by losing the oxygen atom or by disproportionating into xenon difluoride and xenon dioxydifluoride: 2 XeOF2 → 2 XeF2 + O2 2 XeOF2 → XeF2 + XeO2F2 | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Totems (video game)**
Totems (video game):
Totems (officially TOTEMS) is a cancelled video game for the Xbox 360 and PC developed by 10Tacle Studios Belgium.
Gameplay, story and universe:
Totems is a 3D platformer for the Xbox 360 and PC. The player controls the main character Gia, a parkour expert. Gia inherits various powers from four different animal totem spirits. Totems uses a Semantic Environment Sensing System (SESS), meaning all of these actions can be performed with one button and Gia will react automatically according to the place she is in the world. Each spirit will be mapped to a face button on the 360 controller enabling players to pull off parkour moves and attacks very quickly. The game contains a non-linear world placed on a fictional island and a highly interactive environment. The enemies Gia encounters are able to perform similar acrobatic abilities and their AI enables them to follow Gia wherever she goes. The developers were creating a whole new shaman mythology for Totems.
10tacle Studios Belgium:
10tacle Studios Belgium, located in Charleroi, Belgium, specialised in the development of video games. Its CEO, Yves Grolet, and design director, Stephane Bura, ere the company's creative leaders. Grolet and other core team members became known through their widely acclaimed PC game Outcast released in 1999 by Infogrames. On August 5, 2008, 10tacle Studios Belgium ceased all operations and, as a company, has closed down.
NeoReality engine:
NeoReality is an integrated video game production platform developed by 10tacle Studios Belgium. It contains several innovative tools and engines including 3D graphics rendering, physics, AI, game-specific scripting language, etc. Semantic Environment Sensing System was a technology which allows the player and all NPC characters to use the world as an open-ended playground, using each architectural feature as an opportunity for movement. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Tetrakis cuboctahedron**
Tetrakis cuboctahedron:
In geometry, the tetrakis cuboctahedron is a convex polyhedron with 32 triangular faces, 48 edges, and 18 vertices. It is a dual of the truncated rhombic dodecahedron.
Tetrakis cuboctahedron:
Its name comes from a topological construction from the cuboctahedron with the kis operator applied to the square faces. In this construction, all the vertices are assumed to be the same distance from the center, while in general octahedral symmetry can be maintain even with the 6 order-4 vertices at a different distance from the center as the other 12.
Related polyhedra:
It can also be topologically constructed from the octahedron, dividing each triangular face into 4 triangles by adding mid-edge vertices (an ortho operation). From this construction, all 32 triangles will be equilateral.
This polyhedron can be confused with a slightly smaller Catalan solid, the tetrakis hexahedron, which has only 24 triangles, 32 edges, and 14 vertices. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Molecular wire**
Molecular wire:
Molecular wires (or sometimes called molecular nanowires) are molecular chains that conduct electric current. They are the proposed building blocks for molecular electronic devices. Their typical diameters are less than three nanometers, while their lengths may be macroscopic, extending to centimeters or more.
Examples:
Most types of molecular wires are derived from organic molecules. One naturally occurring molecular wire is DNA. Prominent inorganic examples include polymeric materials such as Li2Mo6Se6 and Mo6S9−xIx, [Pd4(CO)4(OAc)4Pd(acac)2], and single-molecule extended metal atom chains (EMACs) which comprise strings of transition metal atoms directly bonded to each other. Molecular wires containing paramagnetic inorganic moieties can exhibit Kondo peaks.
Conduction of electrons:
Molecular wires conduct electricity. They typically have non-linear current-voltage characteristics, and do not behave as simple ohmic conductors. The conductance follows typical power law behavior as a function of temperature or electric field, whichever is the greater, arising from their strong one-dimensional character. Numerous theoretical ideas have been used in an attempt to understand the conductivity of one-dimensional systems, where strong interactions between electrons lead to departures from normal metallic (Fermi liquid) behavior. Important concepts are those introduced by Tomonaga, Luttinger and Wigner. Effects caused by classical Coulomb repulsion (called Coulomb blockade), interactions with vibrational degrees of freedom (called phonons) and Quantum Decoherence have also been found to be important in determining the properties of molecular wires.
Synthesis:
Methods have been developed for the synthesis of diverse types of molecular wires (e.g. organic molecular wires and inorganic molecular wires). The basic principle is to assemble repeating modules. Organic molecular wires are usually synthesized via transition metal-mediated cross-coupling reactions.
Synthesis:
Organic molecular wires Organic molecular wires usually consist aromatic rings connected by ethylene group or acetylene groups. Transition metal-mediated cross-coupling reactions are used to connect simple building blocks together in a convergent fashion to build organic molecular wires. For example, a simple oligo (phenylene ethylnylene) type molecular wire (B) was synthesized starting from readily available 1-bromo-4-iodobenzene (A). The final product was obtained through several steps of Sonogashira coupling reactions.
Synthesis:
Other organic molecular wires include carbon nanotubes and DNA. Carbon nanotubes can be synthesized via various nano-technological approaches. DNA can be prepared by either step-wise DNA synthesis on solid-phase or by DNA-polymerase-catalyzed replication inside cells.
It was recently shown that pyridine and pyridine-derived polymers can form electronically conductive polyazaacetylene chains under simple ultraviolet irradiation, and that the common observation of "browning" of aged pyridine samples is due in part to the formation of molecular wires. The gels exhibited a transition between ionic conductivity and electronic conductivity on irradiation.
Inorganic molecular wires One class of inorganic molecular wires consist of subunits related to Chevrel clusters. The synthesis of Mo6S9−xIx was performed in sealed and vacuumed quartz ampoule at 1343 K. In Mo6S9−xIx, the repeat units are Mo6S9−xIx clusters, which are joined together by flexible sulfur or iodine bridges.Chains can also be produced from metallo-organic precursors.
Nanowires in molecular electronics:
To be of use for connecting molecules, MWs need to self-assemble following well-defined routes and form reliable electrical contacts between them. To reproducibly self-assemble a complex circuit based on single molecules. Ideally, they would connect to diverse materials, such as gold metal surfaces (for connections to outside world), biomolecules (for nanosensors, nanoelectrodes, molecular switches) and most importantly, they must allow branching. The connectors should also be available of pre-determined diameter and length. They should also have covalent bonding to ensure reproducible transport and contact properties.
Nanowires in molecular electronics:
DNA-like molecules have specific molecular-scale recognition and can be used in molecular scaffold fabrication. Complex shapes have been demonstrated, but unfortunately metal coated DNA which is electrically conducting is too thick to connect to individual molecules. Thinner coated DNA lacks electronic connectivity and is unsuited for connecting molecular electronics components.
Nanowires in molecular electronics:
Some varieties of carbon nanotubes (CNTs) are conducting, and connectivity at their ends can be achieved by attachment of connecting groups. Unfortunately manufacturing CNTs with pre-determined properties is impossible at present, and the functionalized ends are typically not conducting, limiting their usefulness as molecular connectors. Individual CNTs can be soldered in an electron microscope, but the contact is not covalent and cannot be self-assembled.
Nanowires in molecular electronics:
Possible routes for the construction of larger functional circuits using Mo6S9−xIx MWs have been demonstrated, either via gold nanoparticles as linkers, or by direct connection to thiolated molecules. The two approaches may lead to different possible applications. The use of GNPs offers the possibility of branching and construction of larger circuits.
Nanowires in molecular electronics:
Other research Molecular wires can be incorporated into polymers, enhancing their mechanical and/or conducting properties. The enhancement of these properties relies on uniform dispersion of the wires into the host polymer. MoSI wires have been made in such composites, relying on their superior solubility within the polymer host compared to other nanowires or nanotubes. Bundles of wires can be used to enhance tribological properties of polymers, with applications in actuators and potentiometers. It has been recently proposed that twisted nanowires could work as electromechanical nanodevices (or torsion nanobalances) to measure forces and torques at nanoscale with great precision. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Standard time in manufacturing**
Standard time in manufacturing:
Standard time is the amount of time that should be allowed for an average worker to process one work unit using the standard method and working at a normal pace. The standard time includes some additional time, called the contingency allowance, to provide for the worker's personal needs, fatigue, and unavoidable delays during the shift.
Prerequisite for Valid Time Standards:
The task is performed by an average worker The worker's pace represents standard performance The worker uses the standard method The task is performed on a standard work unit
Calculating the Standard Time:
The standard time (Ts) is calculated from multiplying the observed time (To) by the performance rating (R) and the personal need, fatigue and unavoidable delays (PFD): Ts = To*R*(1+PFD)
Usages for Standard Time:
Estimate the quantity of the production Determine workforce size and equipment requirement Compare alternative methods Evaluate worker's performance Plan and schedule production and estimate co. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Agaropectin**
Agaropectin:
Agaropectin is one of the two main components of agar and mainly consists of D-glucuronic acid and pyruvic acid.
Structure:
Agaropectin is a sulphated galactan mixture which composes agar by 30% composition. It is composed of varying percentages of organosulfates (sulfate esters), D-glucuronic acid and small amounts of pyruvic acid. It is made up of alternating units of D-galactose and L-galactose heavily modified with acidic side-groups which are usually sulfate, glucuronate, and pyruvate. Pyruvic acid is possibly attached in an acetal form to the D-galactose residues of the agarobiose skeleton. The sulfate content of the agar depends on the source of the raw material from which it is derived. Acetylation of agaropectin yields the chloroform-insoluble agaropectin acetate, as opposed to agarose acetate. This process can be used to separate the two polysaccharides via fractionation.
Use:
Agaropectin has no commercial value and is discarded during the commercial processing of agar, and food grade agar is mainly composed of agarose with a molecular weight of about 120 kDa. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Fusion Drive**
Fusion Drive:
Fusion Drive is a type of hybrid drive technology created by Apple Inc. It combines a hard disk drive with a NAND flash storage (solid-state drive of 24 GB or more) and presents it as a single Core Storage managed logical volume with the space of both drives combined.The operating system automatically manages the contents of the drive so the most frequently accessed files are stored on the faster flash storage, while infrequently used items move to or stay on the hard drive. For example, if spreadsheet software is used often, the software will be moved to the flash storage for faster user access. In software, this logical volume speeds up performance of the computer by performing both caching for faster writes and auto tiering for faster reads.
Availability:
The Fusion Drive was announced as part of an Apple event held on October 23, 2012, with the first supporting products being two desktops: the iMac and Mac Mini with OS X Mountain Lion released in late 2012. Fusion Drive remains available in subsequent models of these computers, but was not expanded to other Apple devices: the latest MacBook and Mac Pro models use exclusively flash storage, and while this was an optional upgrade for the mid-2012 non-Retina MacBook Pro discontinued by Apple, it replaced the standard hard disk drive in October 2021 instead of complementing it in the fashion of Fusion Drive. As of November 2021, no Mac offers a fusion drive.
Design:
Apple's Fusion Drive design incorporates proprietary features with limited documentation. It has been reported that the design of Fusion Drive has been influenced by a research project called Hystor. According to the paper, this hybrid storage system unifies a high-speed SSD and a large-capacity hard drive with several design considerations of which one has been used in the Fusion Drive.
Design:
The SSD and the hard drive are logically merged into a single block device managed by the operating system, which is independent of file systems and requires no changes to applications.
A portion of SSD space is used as a write-back buffer to absorb incoming write traffic, which hides perceivable latencies and boosts write performance.
More frequently accessed data is stored on the SSD and the larger, less frequently accessed data stored on the HDD.
Design:
Data movement is based on access patterns: if data has been on the HDD and suddenly becomes frequently accessed, it will usually get moved to the SSD by the program controlling the Fusion Drive. During idle periods, data is adaptively migrated to the most suitable device to provide sustained data processing performance for users.Several experimental studies have been conducted to speculate about the internal mechanism of Fusion Drive. A number of speculations are available but not completely confirmed.
Design:
Fusion Drive is a block-level solution based on Apple's Core Storage, a logical volume manager managing multiple physical devices. The capacity of a Fusion Drive is confirmed to be the sum of two devices. Fusion Drive is file system agnostic and effective for both HFS Plus and ZFS.
Part of the SSD space is used as a write buffer for incoming writes. In the stable state, a minimum 4 GB space is reserved for buffering writes. A small spare area is set aside on the SSD for performance consistency.
Data is promoted to the SSD based on its access frequency. The frequency is detected at the block level and below file system memory cache. Data migration happens in 128 KB chunks during idle or light I/O periods.
Operating system and other critical documents are always cached on the SSD. Applications are likely to be handled similarly. A regular file can reside on both devices. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Superior cerebellar artery**
Superior cerebellar artery:
The superior cerebellar artery (SCA) is an artery of the head. It arises near the end of the basilar artery. It is a branch of the basilar artery. It supplies parts of the cerebellum, the midbrain, and other nearby structures. It is the cause of trigeminal neuralgia in some patients.
Structure:
The superior cerebellar artery arises near the end of the basilar artery. It passes laterally around the brainstem. This is immediately below the oculomotor nerve, which separates it from the posterior cerebral artery. It then winds around the cerebral peduncle, close to the trochlear nerve. It also lies close to the cerebellar tentorium. When it arrives at the upper surface of the cerebellum, it divides into branches which ramify in the pia mater and anastomose with those of the anterior inferior cerebellar arteries and the posterior inferior cerebellar arteries.
Structure:
Several branches are given to the pineal body, the anterior medullary velum, and the tela chorioidea of the third ventricle.
Function:
The superior cerebellar artery supplies deep parts and superior parts of the cerebellum. It supplies parts of the midbrain (tectum, including the cerebral crus). It also supplies superior medullary velum, the superior cerebellar peduncle, the middle cerebellar peduncle, and the interpeduncular region.
Clinical significance:
Trigeminal neuralgia The superior cerebellar artery is frequently the cause of trigeminal neuralgia. It compresses the trigeminal nerve (CN V), causing pain on the patient's face (the distribution of the nerve). This may be treated with vascular microsurgery to decompress the trigeminal nerve. At autopsy, 50% of people without trigeminal neuralgia will also be noted to have vascular compression of the nerve.
Clinical significance:
Stroke An infarction of the superior cerebellar artery can cause a cerebellar stroke. This can cause a headache and ataxia (with problems walking). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Bochner's formula**
Bochner's formula:
In mathematics, Bochner's formula is a statement relating harmonic functions on a Riemannian manifold (M,g) to the Ricci curvature. The formula is named after the American mathematician Salomon Bochner.
Formal statement:
If u:M→R is a smooth function, then Ric (∇u,∇u) ,where ∇u is the gradient of u with respect to g , ∇2u is the Hessian of u with respect to g and Ric is the Ricci curvature tensor. If u is harmonic (i.e., Δu=0 , where Δ=Δg is the Laplacian with respect to the metric g ), Bochner's formula becomes Ric (∇u,∇u) .Bochner used this formula to prove the Bochner vanishing theorem.
Formal statement:
As a corollary, if (M,g) is a Riemannian manifold without boundary and u:M→R is a smooth, compactly supported function, then vol Ric vol .This immediately follows from the first identity, observing that the integral of the left-hand side vanishes (by the divergence theorem) and integrating by parts the first term on the right-hand side. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**(protein-PII) uridylyltransferase**
(protein-PII) uridylyltransferase:
In enzymology, a [protein-PII] uridylyltransferase (EC 2.7.7.59) is an enzyme that catalyzes the chemical reaction UTP + [protein-PII] ⇌ diphosphate + uridylyl-[protein-PII]Thus, the two substrates of this enzyme are UTP and protein-PII, whereas its two products are diphosphate and [[uridylyl-[protein-PII]]].
This enzyme belongs to the family of transferases, specifically those transferring phosphorus-containing nucleotide groups (nucleotidyltransferases). The systematic name of this enzyme class is UTP:[protein-PII] uridylyltransferase. Other names in common use include PII uridylyl-transferase, and uridyl removing enzyme. This enzyme participates in two-component system - general. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Close-mid central unrounded vowel**
Close-mid central unrounded vowel:
The close-mid central unrounded vowel, or high-mid central unrounded vowel, is a type of vowel sound used in some spoken languages. The symbol in the International Phonetic Alphabet that represents this sound is ⟨ɘ⟩. This is a mirrored letter e and should not be confused with the schwa ⟨ə⟩, which is a turned e. It was added to the IPA in 1993; before that, this vowel was transcribed ⟨ë⟩ (Latin small letter e with diaresis, not Cyrillic small letter yo). Certain older sources transcribe this vowel ⟨ɤ̈⟩.
Close-mid central unrounded vowel:
The ⟨ɘ⟩ letter may be used with a lowering diacritic ⟨ɘ̞⟩, to denote the mid central unrounded vowel.
Conversely, ⟨ə⟩, the symbol for the mid central vowel may be used with a raising diacritic ⟨ə̝⟩ to denote the close-mid central unrounded vowel, although that is more accurately written with an additional unrounding diacritic ⟨ə̝͑⟩ to explicitly denote the lack of rounding (the canonical value of IPA ⟨ə⟩ is undefined for rounding).
Features:
Its vowel height is close-mid, also known as high-mid, which means the tongue is positioned halfway between a close vowel (a high vowel) and a mid vowel.
Its vowel backness is central, which means the tongue is positioned halfway between a front vowel and a back vowel.
It is unrounded, which means that the lips are not rounded. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Photolith film**
Photolith film:
A photolith film is a transparent film, made with some sort of transparent plastic (formerly made of acetate). Nowadays, with the use of laser printers and computers, the photolith film can be based on polyester, vegetable paper or laser film paper. It is mainly used in all photolithography processes.
Photolith film:
A color image, or polychromatic, is divided into four basic colors: cyan, the magenta, the yellow and black (the so-called system CMYK (short name from cyan, magenta , yellow and black ), generating four photolith film images, a photo filtered with each of the three basic colors plus a B&W film (addition of the three). For black-and-white images, such as text or simple logos, only one photolith film is needed.
Photolith film:
The photolith film it is sometimes recorded by an optical laser process on an imagesetter machine, coming from a digital file, or by a photographic process in a contact copier, if a physical copy of the original already exist. In the old offset printing plates acquire text or images to be printed after being sensitized from a photolith film.
The photolith films, as well as vegetable and the laser films, are used to store plates, screens or other media sensitive to light as a backup for repeating their processes in the future. They normally store the information of the three or four separated colours on monochrome photolith films. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Sodium decavanadate**
Sodium decavanadate:
Sodium decavanadate describes any member of the family of inorganic compounds with the formula Na6[V10O28](H2O)n. These are sodium salts of the orange-colored decavanadate anion [V10O28]6−. Numerous other decavanadate salts have been isolated and studied since 1956 when it was first characterized.
Preparation:
The preparation of decavanadate is achieved by acidifying an aqueous solution of ortho-vanadate: 10 Na3[VO4] + 24 HOAc → Na6[V10O28] + 12 H2O + 24 NaOAcThe formation of decavanadate is optimized by maintaining a pH range of 4–7. Typical side products include metavanadate, [VO3]−, and hexavanadate, [V6O16]2−, ions.
Structure:
The decavanadate ion consists of 10 fused VO6 octahedra and has D2h symmetry. The structure of Na6[V10O28]·18H2O has been confirmed with X-ray crystallography.
Structure:
The decavanadate anions contains three sets of equivalent V atoms (see fig. 1). These include two central VO6 octahedra (Vc) and four each peripheral tetragonal-pyramidal VO5 groups (Va and Vb). There are seven unique groups of oxygen atoms (labeled A through G). Two of these (A) bridge to six V centers, four (B) bridge three V centers, fourteen of these (C, D and E) span edges between pairs of V centers, and eight (F and G) are peripheral.
Structure:
The oxidation state of vanadium in decavanadate is +5.
Acid-base properties:
Aqueous vanadate (V) compounds undergo various self-condensation reactions. Depending on pH, major vanadate anions in solution include VO2(H2O)42+, VO43−, V2O73−, V3O93−, V4O124−, and V10O286−. The anions often reversibly protonate. Decavanadate forms according to this equilibrium: H3V10O283− ⇌ H2V10O284− + H+ H2V10O284− ⇌ HV10O285− + H+ HV10O285−(aq) ⇌ V10O286− + H+The structure of the various protonation states of the decavanadate ion has been examined by 51V NMR spectroscopy. Each species gives three signals; with slightly varying chemical shifts around −425, −506, and −523 ppm relative to vanadium oxytrichloride; suggesting that rapid proton exchange occurs resulting in equally symmetric species. The three protonations of decavanadate have been shown to occur at the bridging oxygen centers, indicated as B and C in figure 1.Decavanadate is most stable in pH 4–7 region. Solutions of vanadate turn bright orange at pH 6.5, indicating the presence of decavanadate. Other vanadates are colorless. Below pH 2.0, brown V2O5 precipitates as the hydrate.
Acid-base properties:
V10O286− + 6H+ + 12H2 ⇌ 5V2O5
Potential uses:
Decavanadate has been found to inhibit phosphoglycerate mutase, an enzyme which catalyzes step 8 of glycolysis. In addition, decavandate was found to have modest inhibition of Leishmania tarentolae viability, suggesting that decavandate may have a potential use as a topical inhibitor of protozoan parasites.
Related decavanadates:
Many decavanadate salts have been characterized. NH4+, Ca2+, Ba2+, Sr2+, and group I decavanadate salts are prepared by the acid-base reaction between V2O5 and the oxide, hydroxide, carbonate, or hydrogen carbonate of the desired positive ion.
6 NH3 + 5 V2O5 + 3 H2O ⇌ (NH4)6[V10O28]Other decavanadates: (NH4)6[V10O28]·6H2O K6[V10O28]·9H2O K6[V10O28]·10H2O Ca3[V10O28]·16H2O K2Mg2[V10O28]·16H2O K2Zn2[V10O28]·16H2O Cs2Mg2[V10O28]·16H2O Cs4Na2[V10O28]·10H2O K4Na2[V10O28]·16H2O Sr3[V10O28]·22H2O Ba3[V10O28]·19H2O [(C6H5)4P]H3V10O28·4CH3CN Ag6[V10O28]·4H2ONaturally occurring decavanadates include: Ca3V10O28·17 H2O (Pascoite) Ca2Mg(V10O28)·16H2O (Magnesiopascoite) Na4Mg(V10O28)·24H2O (Huemulite) | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**TrueCrypt version history**
TrueCrypt version history:
TrueCrypt is based on Encryption for the Masses (E4M), an open source on-the-fly encryption program first released in 1997. However, E4M was discontinued in 2000 as the author, Paul Le Roux, began working on commercial encryption software. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Newspaper vending machine**
Newspaper vending machine:
A newspaper vending machine or newspaper rack is a vending machine designed to distribute newspapers. Newspaper vending machines are used worldwide, and they are often one of the main distribution methods for newspaper publishers.
According to the Newspaper Association of America, in recent times in the United States, circulation via newspaper vending machines has dropped significantly: in 1996, around 46% of single-sale newspapers were sold in newspaper boxes, and in 2014, only 20% of newspapers were sold in the boxes.
History:
The coin operated newspaper vending machine was invented in 1947 by inventor George Thiemeyer Hemmeter. Hemmeter's company, the Serven Vendor Company, was based in Berkeley, California, and had been making rural mail tubes and honor racks. The new invention could be adjusted to accept coins of different denominations (depending on the cost of the paper sold). The newspaper rack was able to be used with one hand, and took around 30 seconds to dispense a paper. Two models, one with a capacity for 1,250 pages of newsprint, the other 2,500 pages, were brought into production initially. By 1987, over one million machines had been distributed.One of the most popular newsrack manufacturers is Kaspar, a Shiner, Texas-based wire works company famous for their Sho-Racks.
History:
Legal issues In the United States, publishers have said that the distribution of newspapers by means of street racks is "an essential method of conveying information to the public" and that regulations regarding their placement are an infringement of the First Amendment to the United States Constitution.In 1983, the city of Lakewood, Ohio adopted an ordinance that gave the mayor of the city complete control of where newspaper racks could be placed, and which newspapers could be placed in them. On June 17, 1988, this ordinance was overturned by the United States Supreme Court in a 4–3 ruling, citing that the ordinance could potentially be used to penalize newspapers that criticize the local government.
History:
Re-purposing The newspaper vending machines began to lose popularity as many newspapers switched to online distribution, and as newspaper prices rose; as most vending machines are completely mechanical with no moving parts, few of them have paper currency validators which need some kind of electrical power to work, requiring multiple quarters or dollar coins to be inserted. This is especially true for Sunday newspapers (for example, the Sunday New York Times costing $6 nationally and requiring 24 quarters in a vending machine), which see machines go unfilled by some papers due to the bulk of those editions reducing the number of copies that can possibly be sold. By 2009, various artists and inventors had begun working on re-purposing the boxes. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Superior potato**
Superior potato:
Superior is a white-skinned, white-fleshed, mid-season potato variety. It was released by the University of Wisconsin potato breeding program in 1962, and is not under plant variety protection. It is a progeny of a cross between 'B96-56' and 'M59.44' and was first grown in 1951. 'B96-56' was also a parent of Kennebec. Like the potato variety Atlantic, Superior is widely grown for potato chip manufacturing right off the field and marketable yields are fairly high.
Botanical features:
Self-fertile Tubers (potatoes) are oval to round with medium-depth eyes.
Tuber skin is white and may become lightly russeted as it matures.
Flesh is white and has a high specific gravity.
The plants are medium height Reddish purple stems Terminal leaflets are short and ovate Primary leaflets are thick and arched Flowers have white tips Sprouts are dark purple
Agricultural features:
High yields, it is used for potato chips, but grows best in cool climates.
It has moderate resistance to common scab and Verticillium wilt It is generally free from defects such as growth cracks, greening, secondary growth, heat necrosis, hollow heart, and vascular discoloration in tubers, but is susceptible to potato virus Y, potato virus X, and late blight. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Ailles rectangle**
Ailles rectangle:
The Ailles rectangle is a rectangle constructed from four right-angled triangles which is commonly used in geometry classes to find the values of trigonometric functions of 15° and 75°. It is named after Douglas S. Ailles who was a high school teacher at Kipling Collegiate Institute in Toronto.
Construction:
A 30°–60°–90° triangle has sides of length 1, 2, and 3 . When two such triangles are placed in the positions shown in the illustration, the smallest rectangle that can enclose them has width 1+3 and height 3 . Drawing a line connecting the original triangles' top corners creates a 45°–45°–90° triangle between the two, with sides of lengths 2, 2, and (by the Pythagorean theorem) 22 . The remaining space at the top of the rectangle is a right triangle with acute angles of 15° and 75° and sides of 3−1 , 3+1 , and 22
Derived trigonometric formulas:
From the construction of the rectangle, it follows that sin 15 cos 75 ∘=3−122=6−24, sin 75 cos 15 ∘=3+122=6+24, tan 15 cot 75 ∘=3−13+1=(3−1)23−1=2−3, and tan 75 cot 15 ∘=3+13−1=(3+1)23−1=2+3.
Variant:
An alternative construction (also by Ailles) places a 30°–60°–90° triangle in the middle with sidelengths of 2 , 6 , and 22 . Its legs are each the hypotenuse of a 45°–45°–90° triangle, one with legs of length 1 and one with legs of length 3 . The 15°–75°–90° triangle is the same as above. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Polysilicon halide**
Polysilicon halide:
Polysilicon halides are silicon-backbone polymeric solids. At room temperature, the polysilicon fluorides are colorless to yellow solids while the chlorides, bromides, and iodides are, respectively, yellow, amber, and red-orange. Polysilicon dihalides (perhalo-polysilenes) have the general formula (SiX2)n while the polysilicon monohalides (perhalo-polysilynes) have the formula (SiX)n, where X is F, Cl, Br, or I and n is the number of monomer units in the polymer.
Macromolecular structure:
The polysilicon halides can be considered structural derivatives of the polysilicon hydrides, in which the side-group hydrogen atoms are substituted with halogen atoms. In the monomeric silicon dihalide (aka dihalo-silylene and dihalosilene) molecule, which is analogous to carbene molecules, the silicon atom is divalent (forms two bonds). By contrast, in both the polysilicon dihalides and the polysilicon monohalides, as well as the polysilicon hydrides, the silicon atom is tetravalent with a local coordination geometry that is tetrahedral, even though the stoichiometry of the monohalides ([SiX]n = SinXn) might erroneously imply a structural analogy between perhalopolysilynes and [linear] polyacetylenes with the similar formula (C2H2)n. The carbon atoms in the polyacetylene polymer are sp2-hybridized and thus have a local coordination geometry that is trigonal planar. However, this is not observed in the polysilicon halides or hydrides because the Si=Si double bond in disilene compounds are much more reactive than C=C double bonds. Only when the substituent groups on silicon are very large are disilene compounds kinetically non-labile.
Synthesis:
The first indication that the reaction of SiX4 and Si yields a higher halide SinX2n+2 (n > 1) was in 1871 for the comproportionation reaction of SiCl4 vapor and Si at white heat to give Si2Cl6. This was discovered by the French chemists Louis Joseph Troost (1825 - 1911) and Paul Hautefeuille (1836–1902). Since that time, it has been shown that gaseous silicon dihalide molecules (SiX2) are formed as intermediates in the Si/SiX4 reactions. The silicon dihalide gas molecules can be condensed at low temperatures. For example, if the gaseous SiF2 (difluorosilylene) produced from SiF4 (g) and Si (s) at 1100-1400°C is condensed at temperatures below -80°C and subsequently allowed to warm to room temperature, (SiF2)n is obtained. That reaction was first observed by Donald C. Pease, a DuPont scientist in 1958. The polymerization is believed to occur via paramagnetic di-radical oligomeric intermediates like Si2F4 (•SiF2-F2Si•) and Si3F6 (•SiF2-SiF2-F2Si•),The polysilicon dihalides also form from the thermally-induced disproportionation of perhalosilanes (according to: x SinX2n+2 → x SiX4 + (n-1) (SiX2)x where n ≥ 2). For example, SiCl4 and Si forms SinCl2n cyclic oligomers (with n = 12-16) at 900-1200°C. Under conditions of high vacuum and fast pumping, SiCl2 may be isolated by rapidly quenching the reaction products or, under less stringent vacuum conditions, (SiCl2)n polymer is deposited just beyond the hot zone while the perchlorosilanes SinCl2n+2 are trapped farther downstream. The infrared multiphoton dissociation of trichlorosilane (HSiCl3) also yields polysilicon dichloride, (SiCl2)n, along with HCl. SiBr4 and SiI4 react with Si at high temperatures to produce SiBr2 and SiI2, which polymerize on quenching.
Reactivity:
The polysilicon dihalides are generally stable under vacuum up to about 150-200°C, after which they decompose to perhalosilanes, SinX2n+2 (where n = 1 to 14), and to polysilicon monohalides. However, they are sensitive to air and moisture. Polysilicon difluoride is more reactive than the heavier polysilicon dihalides. In stark contrast to its carbon analog, polytetrafluoroethylene, (SiF2)n ignites spontaneously in air, whereas (SiCl2)n inflames in dry air only when heated to 150°C. The halogen atoms in polysilicon dihalides can be substituted with organic groups. For example, (SiCl2)n undergoes substitution by alcohols to give poly(dialkoxysilylene)s. The polysilicon monohalides are all stable to 400°C, but are also water and air sensitive. Polysilicon monofluoride reacts more vigorously than the heavier polysilicon monohalides. For example, (SiF)n decomposes [to SiF4 and Si] above 400°C explosively. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Extensible Embeddable Language**
Extensible Embeddable Language:
The Extensible Embeddable Language (EEL) is a scripting and programming language in development by David Olofson. EEL is intended for scripting in realtime systems with cycle rates in the kHz range, such as musical synthesizers and industrial control systems, but also aspires to be usable as a platform independent general purpose programming language.
Philosophy:
As to the language design, the general idea is to strike a practical balance between power, ease of use and safety. The intention is to help avoiding many typical programming mistakes without resorting to overly wordy syntax or restricted functionality.
History:
The first incarnation of EEL was in the form of a simple parser for structured audio definitions, used in the sound engine of the Free and Open Source game Kobo Deluxe, an SDL port of the X11 game XKobo. This was a simple interpreter with very limited flow control, and a syntax that's quite different from that of current versions. This initial branch of EEL was first released in 2002, and is still used in Kobo Deluxe as of version 0.5.1.
History:
In December 2003, EEL was split off into a stand-alone project and subject to a major rewrite, in order to be used for real time scripting in an embedded rheology application. This is where the switch from interpreter to compiler/VM was made, and the actual programming language EEL materialized. The first official release was in January 2005. Since then, EEL has evolved slowly, driven mostly by the personal and professional needs of its author.
Features:
General The language is not strictly designed for any particular programming paradigm, but supports object oriented programming, or more specifically, prototype-based programming, through a minimal set of syntax sugar features. Other styles and paradigms of programming, such as functional, modular and metaprogramming are also supported.
As a result of avoiding pointers and providing fully managed structured data types, EEL is "safe" in the sense that EEL programs should not be able to crash the virtual machine or the host application.
Highlights C-like syntax.
Opaque references (as opposed to raw pointers).
Dynamic typing.
Automatic memory management.
Exception handling.
Built-in structured data types, such as: string - immutable string.
dstring - dynamic string.
vector - fixed type numeric array.
array - array of dynamically typed elements.
table - associative array.
Example code:
The classic hello world program can be written as follows: export function main<args> { print("Hello, world!\n"); return 0; } The following is an example of a recursive function: export function main<args> { print("Recursion test 1:\n"); procedure recurse(arg) { print("arg = ", arg, "\n"); if arg recurse(arg - 1); } recurse(10); print("Recursion test 2; Mutual Recursion:\n"); procedure mrecurse2(arg); procedure mrecurse1(arg) { print("arg = ", arg, "\n"); if arg mrecurse2(arg); } procedure mrecurse2(arg) { mrecurse1(arg - 1); }; mrecurse1(10); print("Recursion test 2; Mutual Recursion with Function Reference:\n"); procedure mrrecurse1(arg, fn) { print("arg = ", arg, "\n"); if arg fn(arg, fn); } local mrr2 = procedure (arg, fn) { mrrecurse1(arg - 1, fn); }; mrrecurse1(10, mrr2); print(Recursion tests done.\n); return 0; }
Internals:
EEL source code is compiled into bytecode for a custom VM, which has a relatively high level instruction set designed to minimize instruction count and thus overhead. The EEL VM is register based and "stackless", as in not relying on the C call stack for managing VM contexts.
The basic memory management method is reference counting, which allows automatic memory management with deterministic timing, without the need for concurrent garbage collection.
The VM uses "limbo lists" to keep track of intermediate objects created inside expressions and the like, which greatly simplifies exception handling, and eliminates the need for active reference counting in every single operation.
Applications:
Kobo Deluxe Kobo Deluxe is an application of EEL. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Wage**
Wage:
A wage is payment made by an employer to an employee for work done in a specific period of time. Some examples of wage payments include compensatory payments such as minimum wage, prevailing wage, and yearly bonuses, and remunerative payments such as prizes and tip payouts.
Wages are part of the expenses that are involved in running a business. It is an obligation to the employee regardless of the profitability of the company.
Wage:
Payment by wage contrasts with salaried work, in which the employer pays an arranged amount at steady intervals (such as a week or month) regardless of hours worked, with commission which conditions pay on individual performance, and with compensation based on the performance of the company as a whole. Waged employees may also receive tips or gratuity paid directly by clients and employee benefits which are non-monetary forms of compensation. Since wage labour is the predominant form of work, the term "wage" sometimes refers to all forms (or all monetary forms) of employee compensation.
Origins and necessary components:
Wage labour involves the exchange of money for time spent at work. As Moses I. Finley lays out the issue in The Ancient Economy: The very idea of wage-labour requires two difficult conceptual steps. First it requires the abstraction of a man's labour from both his person and the product of his work. When one purchases an object from an independent craftsman ... one has not bought his labour but the object, which he had produced in his own time and under his own conditions of work. But when one hires labour, one purchases an abstraction, labour-power, which the purchaser then uses at a time and under conditions which he, the purchaser, not the "owner" of the labour-power, determines (and for which he normally pays after he has consumed it). Second, the wage labour system requires the establishment of a method of measuring the labour one has purchased, for purposes of payment, commonly by introducing a second abstraction, namely labour-time.The wage is the monetary measure corresponding to the standard units of working time (or to a standard amount of accomplished work, defined as a piece rate). The earliest such unit of time, still frequently used, is the day of work. The invention of clocks coincided with the elaborating of subdivisions of time for work, of which the hour became the most common, underlying the concept of an hourly wage.Wages were paid in the Middle Kingdom of ancient Egypt, ancient Greece, and ancient Rome. Following the unification of the city-states in Assyria and Sumer by Sargon of Akkad into a single empire ruled from his home city circa 2334 BC, common Mesopotamian standards for length, area, volume, weight, and time used by artisan guilds were promulgated by Naram-Sin of Akkad (c. 2254–2218 BC), Sargon's grandson, including shekels. Codex Hammurabi Law 234 (c. 1755–1750 BC) stipulated a 2-shekel prevailing wage for each 60-gur (300-bushel) vessel constructed in an employment contract between a shipbuilder and a ship-owner. Law 275 stipulated a ferry rate of 3-gerah per day on a charterparty between a ship charterer and a shipmaster. Law 276 stipulated a 21⁄2-gerah per day freight rate on a contract of affreightment between a charterer and shipmaster, while Law 277 stipulated a 1⁄6-shekel per day freight rate for a 60-gur vessel.
Determinants of wage rates:
Depending on the structure and traditions of different economies around the world, wage rates will be influenced by market forces (supply and demand), labour organisation, legislation, and tradition. Market forces are perhaps more dominant in the United States, while tradition, social structure and seniority, perhaps play a greater role in Japan.
Determinants of wage rates:
Wage differences Even in countries where market forces primarily set wage rates, studies show that there are still differences in remuneration for work based on sex and race. For example, according to the U.S. Bureau of Labor Statistics, in 2007 women of all races made approximately 80% of the median wage of their male counterparts. This is likely due to the supply and demand for women in the market because of family obligations. Similarly, white men made about 84% the wage of Asian men, and black men 64%. These are overall averages and are not adjusted for the type, amount, and quality of work done.
Wages in the United States:
Seventy-five million workers earned hourly wages in the United States in 2012, making up 59% of employees. In the United States, wages for most workers are set by market forces, or else by collective bargaining, where a labor union negotiates on the workers' behalf. The Fair Labor Standards Act establishes a minimum wage at the federal level that all states must abide by, among other provisions. Fourteen states and a number of cities have set their own minimum wage rates that are higher than the federal level. For certain federal or state government contacts, employers must pay the so-called prevailing wage as determined according to the Davis-Bacon Act or its state equivalent. Activists have undertaken to promote the idea of a living wage rate which account for living expenses and other basic necessities, setting the living wage rate much higher than current minimum wage laws require. The minimum wage rate is there to protect the well being of the working class.In the second quarter of 2022, the total U.S. labor costs grew up 5.2% year over year, the highest growth since the starting point of the serie in 2001.
Definitions:
For purposes of federal income tax withholding, 26 U.S.C. § 3401(a) defines the term "wages" specifically for chapter 24 of the Internal Revenue Code: "For purposes of this chapter, the term “wages” means all remuneration (other than fees paid to a public official) for services performed by an employee for his employer, including the cash value of all remuneration (including benefits) paid in any medium other than cash;" In addition to requiring that the remuneration must be for "services performed by an employee for his employer," the definition goes on to list 23 exclusions that must also be applied. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Delta-like 1**
Delta-like 1:
Delta-like protein 1 is a protein that in humans is encoded by the DLL1 gene.
Function:
DLL1 is a human homolog of the Notch Delta ligand and is a member of the delta/serrate/jagged family. It plays a role in mediating cell fate decisions during hematopoiesis. It may play a role in cell-to-cell communication.
Interactions:
Delta-like 1 has been shown to interact with NOTCH2 | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Bases Loaded 4**
Bases Loaded 4:
Bases Loaded 4, known in Japan as MoePro! Saikyō Hen (燃えプロ! 最強編, MoePro! Stronger Version), is the fourth installment for the Bases Loaded series for the NES.
Summary:
This video game was released in November 1991 in Japan and April 1993 in North America. The game is the fourth installment of the Bases Loaded series, and the last of the original NES series.
Ending:
When the player completes the game in the US version, they are treated to a one-screen ending. In the Japanese version, the player is treated to a credits screen which reveals the faces of five of the game designers (two designers, one composer, one programmer, one planner), along with their quotations in Japanese (except sound composer Tatsuya Nishimura, whose quotation is in broken English). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Dry riser**
Dry riser:
A standpipe or riser is a type of rigid water piping which is built into multi-story buildings in a vertical position, or into bridges in a horizontal position, to which fire hoses can be connected, allowing manual application of water to the fire. Within the context of a building or bridge, a standpipe serves the same purpose as a fire hydrant.
Dry riser:
In some countries hydrants in streets are below ground level. Fire trucks carry standpipes and key, and there are pry bars on the truck. The bar is used to lift a cover in the road, exposing the hydrant. The standpipe is then "sunk" into the hydrant, and the hose is connected to the exposed ends of the standpipe. The bar is then combined with the key, and is used to turn the hydrant on and off.
Dry standpipe:
When standpipes are fixed into buildings, the pipe is in place permanently with an intake usually located near a road or driveway, so that a fire engine can supply water to the system. The standpipe extends into the building to supply fire fighting water to the interior of the structure via hose outlets, often located between each pair of floors in stairwells in high rise buildings. Dry standpipes are not filled with water until needed in fire fighting. Fire fighters often bring hoses in with them and attach them to standpipe outlets located along the pipe throughout the structure. This type of standpipe may also be installed horizontally on bridges.
Wet standpipe:
A "wet" standpipe is filled with water and is pressurized at all times. In contrast to dry standpipes, which can be used only by firefighters, wet standpipes can be used by building occupants. Wet standpipes generally already come with hoses so that building occupants may fight fires quickly. This type of standpipe may also be installed horizontally on bridges.
Advantages:
Laying a firehose up a stairwell takes time, and this time is saved by having fixed hose outlets already in place. There is also a tendency for heavy wet hoses to slide downward when placed on an incline (such as the incline seen in a stairwell), whereas standpipes do not move. The use of standpipes keeps stairwells clear and is safer for exiting occupants.
Advantages:
Standpipes go in a direct up and down direction rather than looping around the stairwell, greatly reducing the length and thus the loss of water pressure due to friction loss. Additionally, standpipes are rigid and do not kink, which can occur when a firehose is improperly laid on a stairwell.
Standpipe systems also provide a level of redundancy, should the main water distribution system within a building fail or be otherwise compromised by a fire or explosion.
Disadvantages:
Standpipes are not fail-safe systems and there have been many instances where fire operations have been compromised by standpipe systems which were damaged or otherwise not working properly. Firefighters must take precautions to flush the standpipe before use to clear out debris and ensure that water is available. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Pot cheese**
Pot cheese:
Pot cheese is a type of soft, crumbly, unaged cheese. It is very simple to make and also highly versatile, making it a very popular cheese, but it may be hard to find in stores. Pot cheese is in the midway stage between cottage cheese and farmer cheese. It is somewhat dry and crumbly, but with a neutral, creamy texture and is very high in protein. It is most similar to the Mexican queso blanco. In New York and its environs, it was frequently served in a bowl topped with cut-up vegetables.
Pot cheese:
In Austria, Topfen (pot cheese) is another name for Quark.
It is traditionally cut with a sun-shaped object known as a cheese cutter. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**OpenSUSE**
OpenSUSE:
openSUSE ( ) is a free and open source RPM-based Linux distribution developed by the openSUSE project.
The initial release of the community project was a beta version of SUSE Linux 10.0.
Additionally, the project creates a variety of tools, such as YaST, Open Build Service, openQA, Snapper, Machinery, Portus, KIWI, and OSEM.
Product history:
In the past, the SUSE Linux company has focused on releasing the SUSE Linux Personal and SUSE Linux Professional box sets which included extensive printed documentation that was available for sale in retail stores. The company's ability to sell an open-source product was largely due to the closed-source development process used. Although SUSE Linux had always been a free software product licensed with the GNU General Public License (GNU GPL), it was only freely possible to retrieve the source code of the next release 2 months after it was ready for purchase. SUSE Linux' strategy was to create a technically superior Linux distribution with a large number of employed engineers, that would make users willing to pay for their distribution in retail stores.Since the acquisition by Novell in 2003 and with the advent of openSUSE, this has been reversed: starting with version 9.2, an unsupported one-DVD ISO image of SUSE Professional was made available for download. The FTP server continues to operate and has the advantage of "streamlined" installs, allowing the user to download only the packages the user feels they need. The ISO has the advantages of an easy install package, the ability to operate even if the user's network card does not work "out of the box," and less experience needed (i.e., an inexperienced Linux user may not know whether or not to install a certain package, and the ISO offers several preselected sets of packages).
Product history:
The initial stable release from the openSUSE Project, SUSE Linux 10.0, was available for download just before the retail release of SUSE Linux 10.0. In addition, Novell discontinued the Personal version, renaming the Professional version to simply "SUSE Linux," and repricing "SUSE Linux" to about the same as the old Personal version. In 2006, with version 10.2, the SUSE Linux distribution was officially renamed to openSUSE, as it is pronounced similarly to “open source”. Until version 13.2, stable fixed releases with separate maintenance streams from SLE were the project's main offering. Since late 2015, openSUSE has been split into two main offerings, Leap, the more conservative fixed release Leap distribution based on SLE, and Tumbleweed, the rolling release distribution focused on integrating the latest stable packages from upstream projects.Over the years, SUSE Linux has gone from a status of a distribution with restrictive, delayed publications (2 months of waiting for those who had not bought the box, without ISOs available, but installation available via FTP) and a closed development model to a free distribution model with immediate and free availability for all and transparent and open development.On April 27, 2011, Attachmate completed its acquisition of Novell. Attachmate split Novell into two autonomous business units, Novell and SUSE. Attachmate made no changes to the relationship between SUSE (formerly Novell) and the openSUSE project. After the 2014 merger of the Attachmate Group with Micro Focus, SUSE reaffirmed its commitment to openSUSE.EQT Partners announced their intent to acquire SUSE on July 2, 2018. There are no expected changes in the relationship between SUSE and openSUSE. This acquisition is the third acquisition of SUSE Linux since the founding of the openSUSE Project and closed on March 15, 2019.
The openSUSE Project:
The openSUSE Project is a community project to create, promote, improve, and document the openSUSE Linux distribution.The openSUSE Project community, sponsored by SUSE, Arm, B1-Systems, Tuxedo Computers and others, develops and maintains various distributions based on Linux.Beyond the distributions and tools, the openSUSE Project provides a web portal for community involvement. The community develops openSUSE collaboratively with its corporate sponsors through the Open Build Service, openQA, writing documentation, designing artwork, fostering discussions on open mailing lists and in Internet Relay Chat channels, and improving the openSUSE site through its wiki interface.The openSUSE Project develops free software and tools and has two main Linux distributions named openSUSE Leap and openSUSE Tumbleweed. The project has several distributions for specific purposes like MicroOS, which is an immutable operating system that hosts container workloads, and the Kubernetes certified distribution Kubic, which is a multi-purpose standalone and Kubernetes container operating system based on openSUSE MicroOS. The project is sponsored by a number of companies and individuals, most notably SUSE, AMD, B1 Systems, Heinlein Support, and TUXEDO Computers.The first indication that there should be a community-based Linux distribution called OpenSuSE goes back to a mail of August 3, 2005, in which at the same time the launch of the website opensuse.org was announced. This page was available a few days later. One day later the launch of the community project was officially announced.According to its own understanding, openSUSE is a community that propagates the use of Linux and free software wherever possible. Beside a Linux-based distribution it develops tools like the Open Build Service and YaST. Collaboration is open to everyone.
The openSUSE Project:
Activities The openSUSE Project develops the openSUSE Linux distribution as well as a large number of tools around building Linux distributions like the Open Build Service, KIWI, YaST, openQA, Snapper, Machinery, Portus, and more. The project annually hosts free software events. The community's conference is held at a location in Europe and a summit is held at a location in Asia.
The openSUSE Project:
Organization The project is controlled by its community and relies on the contributions of individuals, working as testers, writers, translators, usability experts, artists, and developers. The project embraces a wide variety of technology, people with different levels of expertise, speaking different languages, and having different cultural backgrounds.There is an openSUSE Board which is responsible to lead the overall project. The openSUSE Board provides guidance and supports existing governance structures, but does not direct or control development, since community mechanisms exist to accomplish the goals of the project. The board documents decisions and policies.The project is self-organized without a legal structure, although the establishment of a foundation has been under consideration for some time.SUSE as the main sponsor exerts some influence, but the project is legally independent of SUSE. openSUSE is a "do-ocracy" in which those, who do the work, also decide what happens (those who decide). This primarily refers to desktop and application development, as the sources of the base packages have been coming from SLE since the switch to the Leap development model. To further unify the base, the 'Closing-the-Leap-Gap' project has been started, where openSUSE Leap 15.3 will be completely based on SLE's binary packages.
The openSUSE Project:
Organizational units There are three main organizational units: openSUSE Board: the board consists of 5 members elected for 2 years at a time, plus the chairman, who is provided by SUSE. The Board serves as a central point of contact, helps with conflict resolutions and communicates community interests to SUSE. As of January 2023, the Board has the following members: Douglas DeMaio (US) Dr. Gerald Pfeifer (AT), Chair Gertjan Lettink (NL) Maurizio Galli (CH) Neal Gompa (US) Patrick Fitzgerald (UK) Election Officials: The Election Committee manages and supervises the elections to the openSUSE Board. It consists of three or more volunteers.
The openSUSE Project:
Membership-Officials: The Membership-Officials are appointed by the Board if interested. The Membership-Officials decide on the admission of contributors to the group of openSUSE members upon request. A member receives, among other things, an @opensuse.org address. Only members may vote in the election to the Board.
SUSE Company history
Current distributions:
openSUSE Tumbleweed Tumbleweed is the flagship of the openSUSE Project. Instead of classical version numbers and periodic updates, a rolling release system is used: updates happen continuously; previous states of the operating system are saved as "snapshots". Tumbleweed is preferred by openSUSE users as a desktop system.In the old development model, with each new openSUSE release (13.0, 13.1,...) a new rolling release was set-up, which always received new packages. When the new release was at the doorstep, and Tumbleweed was reset to that release, most packages were newer than the ones in the release, which led to problems.With the switch to Leap, the development model was changed completely: according to the Factory First policy all software packages had to be sent to Factory in the first place before they could be included in a distribution. Out of Factory a daily snapshot is taken and tested in openQA. A successful test is released as the next Tumbleweed snapshot. Unlike other rolling release distributions, Tumbleweed is a tested rolling release, which increases stability dramatically.Technically Tumbleweed is the basis for MicroOS and Kubic.
Current distributions:
openSUSE Leap Leap is a classic stable distribution approach: one release each year, and in between, security updates and bug fixes. This makes Leap very attractive as a server operating system, as well as a desktop operating system, since it requires little maintenance effort.
Current distributions:
For the version released in the fall of 2015, the development team settled on the name openSUSE Leap with the deviating version number 42.1. As in the openSUSE version 4.2 from May 1996, which was called S.u.S.E. Linux at the time, the number 42 refers to the question about "life, the universe and everything" in the Hitchhiker's Guide to the Galaxy book series. After that, the basis packages are received from the SUSE Linux Enterprise, while applications and desktops come from Tumbleweed.At the openSUSE conference held in Nuremberg in 2016, statistics were announced that since the conceptual reorientation with openSUSE Leap 42.1, increasing user numbers had been recorded. According to this, the number of downloads is 400,000 DVD-images per month with an increasing tendency. Each month, 1,600 installations would be added, and 500,000 packages would be installed. The number of Tumbleweed users is 60,000, half of whom frequently perform updates. Thus, the number of Tumbleweed installations had doubled in the last year.
Current distributions:
Other findings from the statistics are that most installations are done via DVD images. The dominant architecture is x64. The geographical distribution of users has hardly changed according to these figures. One-third of users are from Germany, 12% are found in the US, 5% in Russia, and 3% in Brazil.For the openSUSE Leap 15.3 release, the repository for openSUSE Leap and SUSE Linux Enterprise (SLE) was merged and now contains the same source code and binary packages. SLE 15 will be supported until 31 July 2028.
Current distributions:
openSUSE MicroOS MicroOS is an immutable, minimalistic, self-maintained and transactional system, which is primarily, but not exclusively, intended for use in edge computing or as container runtime. Some even use it as desktop system.The system is self-contained and transactional; it updates itself in an all-or-nothing approach (transactional) and rolls back to its previous stage in case something goes wrong. It runs from a read-only file system, preventing accidental changes and malware attacks. The transactional update does not affect the running system. All software available for Tumbleweed is also available for MicroOS. As it comes with podman Container-Runtime, MicroOS is advertised as "the perfect Container-Host." MicroOS Desktop was the focus for the 2021 Hackweek.
Current distributions:
Factory project The Factory project is the rolling development code base for openSUSE Tumbleweed, Factory is mainly used as an internal term for openSUSE's distribution developers, and the target project for all contributions to openSUSE's main code base. There is a constant flow of packages going into the Factory. There is no freeze; therefore, the Factory repository is not guaranteed to be fully stable and is not intended to be used by humans.
Current distributions:
The core system packages receive automated testing via openQA. When automated testing is completed and the repository is in a consistent state, the repository is synced to the download mirrors and published as openSUSE Tumbleweed, That usually happens several times a week.
Supported Architectures:
openSUSE currently (2023) supports installation via ISO and/or over a network from repositories for a wide range of hardware and virtualization platforms. This includes AArch64 (custom version for Raspberry Pi is available), Arm8, POWER8 (ppc64le), IBM zSystems (s390x), the ubiquitous Intel 64 (x86-64), i586, and i686. Arm8 (including earlier Raspberry Pi models, i586, and i686 are available in 32-bit version only. Specialized releases for use in containers and virtualized environments are available for onie, Microsoft Hyper-V, kvm-xen, Digital Ocean Cloud, Container Host with VMWare, Vagrant, and VirtualBox. It can also be installed in conventional virtualization environments with a range of architectures e.g. using VirtualBox, VMWare, or Hyper-V.
Features:
YaST Control Center SUSE includes an installation and administration program called YaST ("Yet another Setup Tool") which handles hard disk partitioning, system setup, RPM package management, online updates, network, and firewall configuration, user administration and more in an integrated interface. By 2010, many more YaST modules were added, including one for Bluetooth support. It also controls all software applications. SaX2 was once integrated into YaST to change monitor settings, however, with openSUSE 11.3 SaX2 has been removed.
Features:
The GTK user interface was removed starting with Leap 42.1, however, the ncurses and Qt interfaces remain.
AutoYaST AutoYaST is part of YaST2 and is used for automatic installation. The configuration is stored in an XML file and the installation happens without user interaction.
WebYaST WebYaST is a web interface version of YaST. It can configure settings and updates of the openSUSE machine it is running on. It can also shut down and check the status of the host.
ZYpp package management ZYpp (or libzypp) is a Linux software management engine. ZYpp is the backend for zypper, the default command line package management tool for openSUSE.
Features:
Build Service The Open Build Service provides software developers with a tool to compile, release and publish their software for many distributions, including Mandriva, Ubuntu, Fedora and Debian. It typically simplifies the packaging process, so developers can more easily package a single program for many distributions, and many openSUSE releases, making more packages available to users regardless of what distribution version they use. It is published under the GNU GPLv2+.
Features:
Default use of Delta RPM By default, OpenSUSE uses Delta RPMs when updating an installation. A Delta RPM contains the difference between an old and a new version of a package. This means that only the changes between the installed package and the new one, are downloaded. This reduces bandwidth consumption and update time, which is especially important on slow Internet connections.
Features:
Desktop innovation KDE SUSE was a leading contributor to the KDE project for many years. SUSE's contributions in this area have been very wide-ranging, and affecting many parts of KDE such as kdelibs and KDEBase, Kontact, and kdenetwork. Other notable projects include: KNetworkManager – a front-end to NetworkManager and Kickoff – a new K menu for KDE Plasma Desktop.From openSUSE Leap 42.1 to 15.0, the default Plasma 5 desktop for openSUSE used the traditional cascading Application Menu in place of the upstream default Kickoff-like Application Launcher menu. The openSUSE Leap KDE experience is built on long-term support versions of KDE Plasma, starting with openSUSE Leap 42.2. With openSUSE Leap 15.1, the Plasma 5 desktop now again defaults to the Kickoff-style application menu.
Features:
GNOME The Ximian group became part of Novell, and in turn made and continued several contributions to GNOME with applications such as F-Spot, Evolution and Banshee.
The GNOME desktop used the slab instead of the classic double-panelled GNOME menu bars from openSUSE 10.2 to openSUSE 11.4. In openSUSE 12.1 slab was replaced with the upstream GNOME Shell and GNOME Fallback designs.
Starting with openSUSE Leap 15.0, GNOME on Wayland is offered as the default GNOME session. GNOME Classic, GNOME on Xorg, and "GNOME SLE" are offered as alternative sessions to the more upstream Wayland-based session.
Releases:
10.x series The initial stable release from the openSUSE Project was SUSE Linux 10.0, released on October 6, 2005. This was released as a freely downloadable ISO image and as a boxed retail package, with certain bundled software only included in the retail package.On May 11, 2006, the openSUSE Project released SUSE Linux 10.1, with the mailing list announcement identifying Xgl, NetworkManager, AppArmor and Xen as prominent features.For their third release, the openSUSE Project renamed their distribution, releasing openSUSE 10.2 on December 7, 2006. Several areas that developers focused their efforts on were reworking the menus used to launch programs in KDE and GNOME, moving to ext3 as the default file system, providing support for internal readers of Secure Digital cards commonly used in digital cameras, improving power management framework (more computers can enter suspended states instead of shutting down and starting up) and the package management system. This release also featured version 2.0 of Mozilla Firefox.
Releases:
The fourth release, openSUSE 10.3, was made available as a stable version on October 4, 2007. An overhaul of the software package management system (including support for 1-Click-Install), legal MP3 support from Fluendo and improved boot-time are some of the areas focused on for this release.
Releases:
11.x series openSUSE 11.0 was released on June 19, 2008. It includes the latest version of GNOME and two versions of KDE (the older, stable 3.5.9 and the newer 4.0.4). It comes in three freely downloadable versions: a complete installation DVD (including GNOME, KDE3, and KDE4), and two Live CDs (GNOME, and KDE4 respectively). A KDE3 Live CD was not produced due to limited resources. Package management and installation were made significantly faster with ZYpp.openSUSE 11.1 was released on December 18, 2008. Updated software includes GNOME 2.24.1, Plasma 4.1.3 + K Desktop Environment 3.5.10, OpenOffice.org 3.0, VirtualBox 2.0.6, Compiz 0.7.8, Zypper 1.0.1, continued improvement in the software update stack, X.Org 7.4, Xserver 1.5.2, and Linux kernel 2.6.27.7. openSUSE 11.1 was the first Evergreen supported release.openSUSE 11.2 was released on November 12, 2009. It includes Plasma 4.3, GNOME 2.28, Mozilla Firefox 3.5, OpenOffice.org 3.1, improved social network support, updated filesystems such as Ext4 as the new default and support for Btrfs, installer support for whole-disk encryption, significant improvements to YaST and zypper, and all ISO images are hybrid and now support both USB and CD-ROM boot.openSUSE 11.3 was released on July 15, 2010. It includes Plasma 4.4.4, GNOME 2.30.1, Mozilla Firefox 3.6.6, OpenOffice.org 3.2.1, SpiderOak support, support for the Btrfs filesystem and support for LXDE. It also updates the Linux kernel to version 2.6.34.openSUSE 11.4 was finished on March 3, 2011, and released on March 10, 2011. It includes Plasma 4.6.0, GNOME 2.32.1, Mozilla Firefox 4.0 beta 12, and switched from OpenOffice.org to LibreOffice 3.3.1. It updates the Linux kernel to version 2.6.37.
Releases:
12.x series openSUSE 12.1 was released on November 16, 2011. This includes Plasma 4.7 and GNOME 3.2 and Firefox 7.0.1. The Linux kernel was updated to 3.1.0 It also introduced an advanced disk snapshot tool, called Snapper, for managing Btrfs snapshots. openSUSE 12.1 was also the first release of openSUSE to use systemd by default rather than the traditional System V init. Users can still select to boot to System V init at startup time.
Releases:
openSUSE 12.2 was to be released on July 11, 2012, but was postponed due to persistent stability issues. The final release candidate was eventually announced on August 2, 2012, and the final release date was September 5, 2012. 12.2 includes the desktop environments Plasma 4.8, GNOME 3.4, Firefox 14.0.1, and Xfce 4.10 and now uses Plymouth and GRUB 2 by default.
Releases:
openSUSE 12.3 was released on schedule on March 13, 2013. This includes Plasma 4.10, GNOME 3.6, Firefox 19.0, LibreOffice 3.6, and the removal of SuSEconfig. Also, the Live CD images were replaced with Live USB images, and an Xfce rescue image.
Releases:
13.x series openSUSE 13.1 was released on November 19, 2013, and includes updates to Plasma 4.11, GNOME 3.10, Firefox 25.0, and LibreOffice 4.1. Some other changes include a YaST port to Ruby, the LightDM KDE greeter, and experimental Wayland support in the GNOME Shell and KDE Plasma Desktop. openSUSE 13.1 is an Evergreen supported release, meaning it will receive community patches for 18 months after SUSE support ends.openSUSE 13.2 was released on November 4, 2014, and includes updates to Plasma 4.11, KDE Applications 4.14, GNOME 3.14.1, Firefox 33.0 and LibreOffice 4.3.2.2.
Releases:
Leap 42.x series The openSUSE team decided that the next version would be based on SUSE Linux Enterprise Server (SLES). They named it "Leap 42" (42 being the answer to life, the universe and everything); this was a temporary anomaly in the version number sequence, as the following release series was numbered 15.X.
Leap 42.2 features KDE Plasma 5.8 LTS as its default desktop environment.
Releases:
Leap 15.x series openSUSE Leap 15 is based on SUSE Linux Enterprise (SLE). The name "Leap 15" is meant to match the SUSE Linux Enterprise version it is based on. Leap 15 (just like SUSE Linux Enterprise 15) uses Linux kernel 4.12 LTS, and the default desktop is KDE Plasma 5.12 LTS. It also allows users to switch to its enterprise variant - SUSE Linux Enterprise 15. The latest Leap 15.5 (released on 7th June 2023) uses Linux kernel 5.14.21, KDE Plasma 5.27 and comes with a new support of Python 3.11. It is expected to be the penultimate release of Leap 15, with version 15.6 scheduled to be released in early June 2024.
Version history:
Starting with version Leap (after version 13.2), each major release (e.g. 15.0) is expected to be supported for at least 36 months, until the next major version is available (e.g. 16.0), aligned with SUSE Linux Enterprise Releases. Each minor release (e.g. 15.5, 15.6 etc.) is expected to be released annually, aligned with SUSE Linux Enterprise Service Packs, and users are expected to upgrade to the latest minor release within 6 months of its availability, leading to an expected support lifecycle of 18 months.
Version history:
Tumbleweed is updated on a rolling basis, and requires no upgrades beyond the regular installation of small updates and snapshots.Evergreen was a community effort to prolong maintenance of selected openSUSE versions after they reached official end-of-life before the Leap series.
From 2009 to 2014, the openSUSE project aimed to release a new version every eight months. Prior to the Leap series, versions 11.2-13.2 were provided with critical updates for two releases plus two months, which resulted in an expected support lifetime of 18 months.
Derivatives:
The project has spawned a few forks and derivative versions over the years, namely SUPER, SLICK Linux, FyreLinux, Lietukas Linux, Nelson GNU/Linux-libre, Edu Li-f-E, Linux Kamarada, and GeckoLinux.
Reception:
Jesse Smith from DistroWatch Weekly reviewed openSUSE Leap 15.0, lauding the "work that has gone into the system installer", simplify for new users, but criticized the lack of media support, and performance issues, like a slow startup or slow shutdown. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Colm O'Donnell**
Colm O'Donnell:
Colm P. O'Donnell is an Irish chemist and engineer; he is a professor of biosystems and food engineering at the University College Dublin who is active in the field of process analytical technology (PAT); he is also a head of university School of biosystems and food engineering — as well as a chairperson of the Dairy processing technical committee of International Federation for Process Analysis and Control (IFPAC). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Postmark**
Postmark:
A postmark is a postal marking made on an envelope, parcel, postcard or the like, indicating the place, date and time that the item was delivered into the care of a postal service, or sometimes indicating where and when received or in transit. Modern postmarks are often applied simultaneously with the cancellation or killer that marks postage stamps as having been used. Sometimes a postmark alone is used to cancel stamps, and the two terms are often used interchangeably. Postmarks may be applied by handstamp or machine, using methods such as rollers or inkjets, while digital postmarks are a recent innovation.
History:
The first postmark, called the "Bishop mark", was introduced by English Postmaster General Henry Bishop in 1661 and showed only the day and month of mailing to prevent the delay of the mail by carriers.In England during the latter part of the 17th century, several postmarks were devised for use with the London Penny Post, a postal system that delivered mailed items within the city of London. The postmarks bore the initial of the particular post office or handling house it was sent from along with a separate time stamp. Postage was prepaid and the postmark was applied to the mailed item by means of an inked hand-stamp. Some historians also consider these postmarks to be the world's first postage "stamps".In the 19th century and early 1900s, it was common for letters to receive multiple postmarks, or backstamps, indicating the time, date, and location of each post office transporting or delivering the letter, and this is still occasionally true. While almost every contemporary postmark includes a location as well as a date, in 2004, New Zealand Post announced plans to eliminate the location on their postmarks and include only the date; however, information about this can be determined by a three-number code on the postmarks.In Great Britain, the first postmark employed for the cancellation of the then new adhesive postage stamps was the Maltese Cross, so named because of its shape and appearance. This was used in conjunction with a date stamp which was applied, usually to the rear of the letter, which denoted the date of posting.
History:
Different types of postmarks include railway post offices (RPOs) and maritime (on-board ship) postmarks. Postmarks on naval vessels during sensitive operations in wartime are sometimes "clean", showing less information than usual to prevent route of travel or other details from falling into enemy hands. Similar to this is the "censored postmark", overprinted with a black obliteration of the time and place of mailing, for similar reasons.The Pony Express used a variety of different postmarks on the mail it carried across the Western United States. There are only 250 known examples of surviving Pony Express mail/postmarks in various collections today bearing one of more than a dozen different types of postmarks.Hawai'i Post, a discontinued personal delivery service, once had a surfboard mail postmark, for covers that traveled by surfboard.A colour postmark is on the United States Postal Service-issued collectible envelope commemorating the 2004 inauguration of George W. Bush.
History:
While postmarks are applied almost universally by or under the authority of the official postal department, service, or authority in the United States it is possible to receive "a permit to apply your own postmark", called a Mailer's Postmark Permit, and under certain conditions specified by the private express statutes in the United States, a privately carried letter may be cancelled with a private postmark. Unofficial entities that issue artistamps may use postmark-like markings as well.Marcophily is the study of postmarks and there are many published work on postmarks covering the topic from before 1900, such as the fancy cancels, until the present day. These include the so-called fancy cancels of the United States to modern machine postmarks.
History:
Fewer postmarks are used now than previously, with the advent of meter labels, some types of computer vended postage, and computerized postage that people can print from their own personal computers (called "PC postage" in the United States, these services have been offered by such companies as Stamps.com and Neopost). These indicia are not always postmarked by the post office but if put into the mailstream later than the date listed on them, they are postmarked about 50% of the time. Because of this, it is a bad idea to try to use the date on your postage as a postmark.An official example relating a numismatic item to postmarks occurred on April 13, 1976 when the U.S. issued a new two-dollar bill. People could buy the bills at face value, add a first class stamp (at the time 13 cents), and have the combination postmarked to show they were the first day of issue. Large numbers of these were produced and they remain common.
Ink colour:
When the first universal postal system was started in the United Kingdom with its Penny Black, the postmark used red ink for contrast. This was not successful, and the stamp was changed to non-black colours so that the postmark could use black ink.
The majority of postmarks today are in black, with red (particularly in the United States with local post offices' handstamps) following, though sometimes they are in other colours. This is particularly true in the case of pictorial postmarks if the colour in question has some connection to the commemoration.
Digital postmarks:
In 2004 the United States Postal Service announced plans to introduce first day digital colour postmarks to be used to cancel some first day covers for commemorative stamps in 2005 and this practice continued and was ongoing as of 2015.
Postmark advertisement:
Singapore Post offers a "postmark advertising" service which, strictly speaking, applies to the "killer" rather than the postmark. Hungarian Post Co., Ltd. offers a similar service.
Unusual postmark techniques:
There have apparently been some postmarks producing a stereoscopic or "3D" effect where a special viewer is required. They are considered more as a novelty than as a practical postmark. The local post Hawai'i Post had a rubber-stamp postmark, parts of which were hand-painted. At Hideaway Island, Vanuatu, the Underwater Post Office has an embossed postmark.
Valuation of cancellations:
The study of postmarks is a specialized branch of philately called marcophily. It may bring added value to the stamps by their historical significance. Other parameters are the rarity and the attractiveness. In particular, the stamps issued by the Empire of Austria during the 1850–1867 period (the 5 issues before the Austro-Hungarian compromise of 1867), are collected for their variety and beauty. More details can be found in Valuation of cancellations of the Austrian Empire.
Valuation of cancellations:
A special or rare postmark can substantially add to the value of a stamp. Also, in addition to everyday postmarks there are postmarks indicating the first day of issue of a particular stamp and pictorial cancellations commemorating local events, anniversaries, and the like' and slogan postmarks which advertise an event or pass information to the public. (There has been a recent change to the term "pictorial postmarks" rather than "pictorial cancellations" by the USPS.) There are some examples of "faked covers" produced by philatelic forgers, most usually to increase their value, in which the postmark has been altered in some way; for example, by changing the date.
Practical uses:
The postmark is often considered as an official confirmation that a cover (letter, packet, etc.) mailed item was mailed at a given location at a specific date. For example, the date of the postmark can be quite important. In the United States, the Internal Revenue Service will still consider income tax returns as filed on time though it receives them late if they are postmarked on time, and this date (with, perhaps, other proof of mailing), may have significance in the context of legal filings and proofs of service or of delivery (though in this case the date may viewed as "on time" if the date of the postmark is no more than one day after the date service is supposed to have been made). Postal voting ballots may be accepted in some places if postmarked by the date of the election, though other places require receipt by a certain deadline. Historically, postmarks, known as backstamps were also applied to the reverse side of a cover to confirm arrival at the post office on a specific date.
Similar marks:
A postmark should not be confused with the killer which are lines, bars, etc. used to cancel a postage stamp. The killer acts as the cancellation, though the postmark can also serve this purpose. Neither should a postmark be confused with overprints generally, or pre-cancels (stamps that have been cancelled before the envelope or package to which they are affixed is submitted or deposited for acceptance into the mailstream, they most commonly have taken the form of a pre-printed city name on the stamp) specifically, which generally do not indicate a date.
Similar marks:
Flight cachets, more or less elaborate rubber-stamps on an envelope indicating on which flight (typically a first flight), a first flight cover has traveled via airmail, are in addition to the postmark and are not postmarks either.
Clubs:
There are many clubs devoted to the hobby of collecting postmarks. One of those clubs is the Post Mark Collector's Club, founded in 1946 and based in the USA. Another is the British Postmark Society, founded in 1958. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Eli Formation**
Eli Formation:
The Eli Formation is a geologic formation in Alaska. It preserves fossils dating back to the Devonian period. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**ABCF1**
ABCF1:
ATP-binding cassette sub-family F member 1 is a protein that in humans is encoded by the ABCF1 gene.The protein encoded by this gene is a member of the superfamily of ATP-binding cassette (ABC) transporters. ABC proteins transport various molecules across extra- and intra-cellular membranes. ABC genes are divided into seven distinct subfamilies (ABC1, MDR/TAP, MRP, ALD, OABP, GCN20, White). This protein is a member of the GCN20 subfamily. Unlike other members of the superfamily, this protein lacks the transmembrane domains which are characteristic of most ABC transporters. This protein may be regulated by tumor necrosis factor-alpha and play a role in enhancement of protein synthesis and the inflammation process. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Roneat**
Roneat:
Roneat (Khmer: រនាត) is the generic Khmer word for referring to several types of xylophones used in traditional Cambodian music; the pinpeat and mohaori.
Roneat may refers to several Cambodian xylophone types such as roneat thmor, roneat ek, roneat thung, roneat dek, and roneat thaong.
Etymology:
The word "roneat" is a Khmer word for the bamboo xylophone, which is an ancient musical instrument of Cambodia. According to the Khmer national dictionary, roneat means xylophone and is described as "the percussive musical instrument that has a long body where its bars are made from bamboo or other good quality woods or metal bars striking with a pair of two roneat sticks played in the pinpeat and mohaori orchestras.The Garland Handbook of Southeast Asian Music edited by Terry E. Miller and Sean Williams, argued that the word roneat is a Khmer generic term that refers to xylophones or metallophones — idiophones, with bars of bamboo, wood, or metal. The word roneat derives from the word "roneap" which means bamboo strips or bamboo bars. It's quite possible in Khmer language and word derivations as the note bars of this instrument are made mostly from bamboo bars or strips.
Etymology:
Moreover, a research compiled by Cambodian professor Hun Sarnin indicated that the Khmer word roneat, which probably derived from the Sanskrit word raghunâ tha-vinâ, appeared since the early Cambodian history during the Funan kingdom.
History:
Music has been part of Khmer daily life since at least the first Khmer kingdom (Funan), as music along with dancing were frequently performed in religious temples, local festivities, and royal ceremony. Therefore, the roneat is thought to have originated from before the Angkor empire. As the sister musical instrument of the roneat ek, the roneat thung was already a member of the pinpeat orchestra before Angkor period.One of the oldest xylophones in mainland Southeast Asia can be found in Lam Dong Province, Central Highlands, Vietnam. This early instrument was known in native language as the goonglu. Researchers have found many stone xylophones in Vietnam's Central Highland where the Mon-Khmer indigenous minority, the K'ho lives. The Koho people knew how to use the stone xylophone long ago; some stone xylophones found there were dated as being about 2500 years old.In Cambodia, this type of prehistoric stone xylophone , known as roneat thmor in Khmer, was also found in a site known as Along Tra Reach in Kampong Chhnang province, Central Cambodia. However, the age is unknown, but is probably as old as those found in Vietnam's Central Highland eastward of Cambodia.
History:
Although, no carving has been found yet, but this does not prelude the possibility that roneat may have been used by the ancient Khmers as it was considered to be common or folk instruments and the musical instruments portrayed at Angkor are composed primarily of stringed and woodwind instruments with rhythmic percussion, usually accompanying dancing.Fortunately, recently, more than 200 hidden paintings were revealed on the wall of Angkor Wat with the help of new technology. Among them, there is a clear depiction of a Khmer traditional orchestra in which the musical instruments are clearly visible through the computer-enhancement. This orchestra includes two hanging gongs, a drum, kong vong thom, roneat, and trumpet. This new discovery is probably the oldest depiction of roneat genres in Cambodia.
History:
According to another source, Cambodian roneat genres were derived from the Javanese gamelan musical instruments which influenced the Khmer musical instrument in the early Angkorian period, and which spread from Kampuchea further northwest to Myanmar. The last monarch of Khmer Kingdom of Chenla King Jayavarman II, who returned from the Javanese Court in 802 a.d., began the grandiose consecration ritual (the concept of Devaraja or God-King on sacred Mount Mahendraparvata), now known as Phnom Kulen, to celebrate the independence of Kambuja (Cambodia) from Javanese dominion. He became the first emperor of the Khmer Empire, as verified by the Sdok Kak Thom inscription. Throughout the history of Cambodian music, especially in the post-Angkorian period, Roneat genres such as roneat ek and roneat thung usually appears in various mural paintings and always represent in the pinpeat or mahori orchestra.
Types of roneat:
Roneat thmor The roneat thmor (Khmer: រនាតថ្ម) or literally stone xylophone is thought to be the earliest form of xylophone.
Types of roneat:
These stone musical instruments can be found in various locations. Many were found in Vietnam's Tay Nguyen or Central Highlands, eastward of Cambodia, played by the Koho people. They are aged to some 2500 years old.In Cambodia, two roneat thmor tone-bars were also found in Kampong Chhnang, in Central Cambodia. Each of these stone xylophone bars are more than 1,5 meter long which is a whole body of roneat thmor, unlike those separating pieces of stone xylophone bars found in Vietnam. These stone xylophone bars generate the same sound as gongs and other roneat genre, but their sound is quite louder. By observing its physical appearance, we can identify their head and end as the end khaols of other roneat genres. By this, researcher can easily identify the sound notes. These stone xylophone bars were likely made from the same stone because the sound note variance of both stone xylophone bars from the head to their ends share similar sound notes. The age of these stone xylophone bars are unknown but probably as old as those found in the region or probably much older.
Types of roneat:
Roneat ek The roneat Ek or roneat aek is a xylophone used in the Khmer classical music of Cambodia. It is built in the shape of a curved, rectangular shaped boat. It has twenty-one thick bamboo or hard wood bars that are suspended from strings attached to the two walls. They are cut into pieces of the same width, but of different lengths and thickness. Originally these instruments were highly decorated with inlay and carvings on the sides of the sound box. Now they are simpler. The Roneat is played in the pinpeatensemble. In that ensemble, sits on the right of the roneat thung, a lower-pitched xylophone. The roneat ek is the analogous equivalent to the Thai xylophone called ranat ek, and the Burmese bamboo xylophone called "pattala".Roneat ek play significant role in both pinpeat and mahori orchestra. Throughout the history of Cambodian music, especially in the post-Angkorian period, roneat ek usually appears in various mural paintings and always represent in both traditional orchestras due to its significant function and musical contribution.
Types of roneat:
Roneat Thung The roneat thung is a low-pitched xylophone used in the Khmer classical music of Cambodia. It is built in the shape of a curved, rectangular shaped boat. This instrument plays an important part in the pinpeat ensemble. The roneat thung is placed on the left of the roneat ek, a higher-pitched xylophone.
The roneat thung, sister musical instrument to the roneat ek, was part of the pinpeat orchestra before the Angkor period.
Roneat Dek The roneat dek is a Cambodian metallophone, comparable to the roneat ek. It is an ancient instrument made of 21 blackened-iron bars. It may be used in the pinpeat ensemble and mahaori orchestra. It is believed to have originated from the Royal Courts before the Angkor period.
Roneat Thaong See Variation of roneat dek | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**BD-1047**
BD-1047:
BD-1047 is a sigma receptor antagonist, selective for the σ1 subtype. It has effects in animal studies suggestive of antipsychotic activity and may also be useful in the treatment of neuropathic pain.More recent studies also suggest a novel role for BD-1047 in attenuating ethanol-induced neurotoxicity in vitro, and additional research is being conducted on this compound as a possible pharmacotherapy for alcohol use disorder (AUD) | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Crowding**
Crowding:
Crowding (or visual crowding) is a perceptual phenomenon where the recognition of objects presented away from the fovea is impaired by the presence of other neighbouring objects (sometimes called "flankers"). It has been suggested that crowding occurs due to mandatory integration of the crowded objects by a texture-processing neural mechanism, but there are several competing theories about the underlying mechanisms. It is considered a kind of grouping since it is "a form of integration over space as target features are spuriously combined with flanker features."Crowding has long been thought to be predominantly a characteristic of peripheral vision. Yet, while it is indeed particularly prominent there, it is present in the whole of the visual field, with only its spatial extent varying (governed by Bouma's law; see below). In particular, crowding is of utmost importance in foveal vision, overriding the importance of visual acuity in pattern recognition and reading where crowding represents the bottleneck in processing.Crowding is prominently present in amblyopia and has been first mentioned in that context and studied quantitatively there. Crowding deficits have further been found in neuropsychiatric disorders such as schizophrenia and autism and may have clinical implications in these disorders. It is also suggested that head injuries can cause a crowding effect. Normally sighted children up to the age of about eight years further have more pronounced crowding than adults, and this may be the reason for larger print in children's books.
Bouma's law:
The extent of crowding is mostly independent of a letter's or form's size, unlike what is the case in acuity. Instead, it depends very systematically on the distance to its neighbors. If the latter is above a critical value, crowding vanishes. In 1970, Herman Bouma has described a rule-of-thumb for that critical distance, stating that it amounts to about half the eccentricity value under which the crowded letter is seen (eccentricity measured as visual angle away from the fovea's center). If, e.g., a letter is shown at 2.5 deg away from the fovea center – which is approximately at the border of the fovea – the critical distance amounts to 1.25 deg visual angle. When the flankers are closer, crowding will thus occur.
Bouma's law:
Newer research suggests that the factor in Bouma's rule (originally ½) can vary quite a bit, and might often be a little smaller (e.g., 0.4). Furthermore, a small constant should be added in the equation, and there are further caveats. Overall, however, Bouma's rule has since proven valid over a large variety of perceptual tasks. For its robustness, it is now often considered a perceptual law, similar to other perceptual laws (like Weber's law, Riccò's law, Bloch's law).
History:
Crowding, as we know today, is – except in a few special circumstances – the essential bottleneck for human pattern recognition and can be demonstrated in the easiest of ways. It is thus striking that it has been overlooked over the centuries; the cause for degraded pattern recognition has mostly been, and still is, incorrectly ascribed to degraded visual acuity.The percepts in peripheral vision have already been described by Ibn al-Haytham in the 11th century as "confused and obscure". Later, James Jurin in 1738 described the phenomenon of "indistinct vision" which, in two examples, could be seen as the result of crowding. In the 19th century, the ophthalmologists Hermann Aubert and Richard Förster in Breslau/Poland described the percept of two neighboring points in indirect vision as “quite strangely undefined ["ganz eigenthümlich unbestimmt"] as something black, the form of which cannot be further specified”. Note that, in none of these examples, the description is as "blurred" or "distorted", as is often (and misleadingly) seen in today's characterizations.
History:
Crowding itself, however, i.e. the difference between singular letters and groups thereof, went unnoticed up to the 20th century. In 1924, then, the Gestalt psychologist Wilhelm Korte was the first to describe, in detail, percepts and phenomena of form perception in indirect vision (peripheral vision). Probably around that time, crowding has become an issue in optometry and ophthalmology when testing amblyopic subjects with eye charts, as is apparent from a remark of the Danish ophthalmologist Holger Ehlers in 1936. James A. Stuart und Hermann M. Burian in Iowa were, in 1962, the first to study crowding systematically, for amblyopic subjects. In foveal vision, the related phenomenon of contour interaction was described (Merton Flom, Frank Weymouth & Daniel Kahneman, 1963).
History:
Herman Bouma, in 1970, famously found what was later called Bouma's law, yet that paper was fully neglected for many years. In the coming three decades, the phenomenon was studied in experimental psychology, under different terms. Only then, the subject of Crowding found increasingly wide attention in visual perception research (Levi et al. 1985; Strasburger et al, 1991; Toet & Levi, 1992, Pelli et al., 2004). Today, it is a major topic in vision and perception and is increasingly recognized for being the major limitation of foveal and peripheral form perception. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Barm**
Barm:
Barm, also called ale yeast, is the foam or scum formed on the top of a fermenting liquid, such as beer, wine, or feedstock for spirits or industrial ethanol distillation. It is used to leaven bread, or set up fermentation in a new batch of liquor. Barm, as a leaven, has also been made from ground millet combined with must out of wine-tubs and is sometimes used in English baking as a synonym for a natural leaven (sourdough). Various cultures derived from barm, usually Saccharomyces cerevisiae, became ancestral to most forms of brewer's yeast and baker's yeast currently on the market. A barm cake is a soft, round, flattish bread roll from North West England, traditionally leavened with barm. In Ireland, barm is used in the traditional production of barmbrack, a fruited bread. Emptins, a homemade product similar to barm and usually made from hops or potatoes and the dregs of cider or ale casks, was a common leavener for those living in rural areas far from a brewery, distillery, or bakery from which they could source barm or yeast. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Microsoft Popfly**
Microsoft Popfly:
Microsoft Popfly (internally codenamed Springfield) was a Website that allowed users to create web pages, program snippets, and mashups using the Microsoft Silverlight rich web applications runtime and the set of online tools provided. It was discontinued on August 24, 2009.
Tools:
The Popfly included four tools based on Silverlight technology, which are described as follows.
Game Creator The Game Creator was a tool that allowed you to create your own game or extend a game already built. It could be exported to Facebook, or be used as a Windows Live Gadget.
Tools:
Mashup Creator The Mashup Creator was a tool that let users fit together pre-built blocks in order to mash together different web services and visualization tools. For example, a user could join together photo and map blocks in order to get a geotagged map of pictures on a topic of their choice. An advanced view for blocks allowed users to modify the code of the block in JavaScript, as well as giving users flexibility in designing the programs. Additional HTML code could also be added to the mashups. A feature similar to IntelliSense, with autocompletion of HTML code, was available as well.
Tools:
The Mashup Creator also provided a preview function, with live preview in the background as users link blocks. Tutorials were available, and error notices were given to users when incompatible data was sent between blocks.
Tools:
Web Creator The Web Creator was a tool for creating Web pages. The user interface layout was similar to the ribbon user interface for Office 2007. Web pages were created without HTML coding, and could be customized by choosing predefined themes, styles, and color schemes. Users could embed their shared mashups in the Web page. Completed Web pages could also be saved in each user's Popfly space.
Tools:
Popfly Space Completed mashups and Web pages were stored on Popfly Space (100 MB maximum per user), where users also received a customizable profile page and other social networking features. Public projects could be shared, rated, or "ripped" by other users. Popfly allowed users to download mashups as gadgets for Windows Sidebar or embed them into Windows Live Spaces, with some support for other blog service providers.Another feature of Popfly Space was the Popfly Explorer plug-in for Visual Studio Express. Users could utilize Visual Studio Express (Visual Studio 2005 Express Editions or higher required) to download the mashups and modify the coding, as well as perform actions such as uploading, sharing, ripping, and rating the mashups.
Tools:
Shutdown On July 16, 2009, the Popfly team announced that the Popfly service would be discontinued on August 24, 2009.
All sites, references, and resources of popfly were taken down, and this product is considered defunct. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Tryptophan-rich sensory protein**
Tryptophan-rich sensory protein:
Tryptophan-rich sensory proteins (TspO) are a family of proteins that are involved in transmembrane signalling. In either prokaryotes or mitochondria they are localized to the outer membrane, and have been shown to bind and transport dicarboxylic tetrapyrrole intermediates of the haem biosynthetic pathway. They are associated with the major outer membrane porins (in prokaryotes) and with the voltage-dependent anion channel (in mitochondria).TspO of Rhodobacter sphaeroides is involved in signal transduction, functioning as a negative regulator of the expression of some photosynthesis genes (PpsR/AppA repressor/antirepressor regulon). This down-regulation is believed to be in response to oxygen levels. TspO works through (or modulates) the PpsR/AppA system and acts upstream of the site of action of these regulatory proteins. It has been suggested that the TspO regulatory pathway works by regulating the efflux of certain tetrapyrrole intermediates of the haem/bacteriochlorophyll biosynthetic pathways in response to the availability of molecular oxygen, thereby causing the accumulation of a biosynthetic intermediate that serves as a corepressor for the regulated genes. A homologue of the TspO protein in Sinorhizobium meliloti is involved in regulating expression of the ndi locus in response to stress conditions.In animals, the peripheral benzodiazepine receptor is a mitochondrial protein (located in the outer mitochondrial membrane) characterised by its ability to bind with nanomolar affinity to a variety of benzodiazepine-like drugs, as well as to dicarboxylic tetrapyrrole intermediates of the haem biosynthetic pathway. Depending upon the tissue, it was shown to be involved in steroidogenesis, haem biosynthesis, apoptosis, cell growth and differentiation, mitochondrial respiratory control, and immune and stress response, but the precise function of the PBR remains unclear. The role of PBR in the regulation of cholesterol transport from the outer to the inner mitochondrial membrane, the rate-determining step in steroid biosynthesis, has been studied in detail. PBR is required for the binding, uptake and release, upon ligand activation, of the substrate cholesterol. PBR forms a multimeric complex with the voltage-dependent anion channel (VDAC) and adenine nucleotide carrier. Molecular modeling of PBR suggested that it might function as a channel for cholesterol. Indeed, cholesterol uptake and transport by bacterial cells was induced upon PBR expression. Mutagenesis studies identified a cholesterol recognition/interaction motif (CRAC) in the cytoplasmic C terminus of PBR.In complementation experiments, rat PBR (pk18) protein functionally substitutes for its homologue TspO in R. sphaeroides, negatively affecting transcription of specific photosynthesis genes. This suggests that PBR may function as an oxygen sensor, transducing an oxygen-triggered signal leading to an adaptive cellular response.
Tryptophan-rich sensory protein:
These observations suggest that fundamental aspects of this receptor and the downstream signal transduction pathway are conserved in bacteria and higher eukaryotic mitochondria. The alpha-3 subdivision of the purple bacteria is considered to be a likely source of the endosymbiont that ultimately gave rise to the mitochondrion. Therefore, it is possible that the mammalian PBR remains both evolutionarily and functionally related to the TspO of R. sphaeroides. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**3DO Blaster**
3DO Blaster:
The 3DO Blaster is an add-on produced by Creative Labs and designed to allow compatible Windows-based PCs to play games for the 3DO Interactive Multiplayer. It is a full-sized ISA compatibility card, and unlike other such add-ons, it does not emulate a 3DO system, but rather the whole system's logic board is included, with the input (controllers) and output (video & audio) redirected to the PC.
3DO Blaster:
The product was marketed as a single board for CD-ROM drive owners (but only drives with a Panasonic interface) or bundled with the necessary CD-ROM drive. The software drivers allowed for Windows (3.1) based gameplay, which featured real-time stretching of the game window and screenshot capturing. As graphics boards of the time (1994) were not up to par with the system's needs, a pass-through using a VGA feature connector link was used, thus reserving an area on screen to be used by the 3DO Blaster card's output. Thus, there was no impact on the CPU. As with the first 3DO system from Panasonic (REAL FZ-1) an FMV daughter-card enabling Video CD playback was planned, but since the 3DO Blaster failed to achieve momentum, it was never released. Saved games were stored in NVRAM on the card.
Bundle contents:
The card was sold with the cables needed, a 3DO controller by Logitech, and two 3DO games on CD: Shock Wave from Electronic Arts and Gridders from Tetragon. Despite showing the 'long boxes' of the two games on the back of the packing box, they were included in jewel cases only. A third CD, containing demos of popular 3DO games was also included. Not included was software from Aldus; Aldus Photostyler SE and Aldus Gallery Effects Vol. 1, but pictures of both titles can be seen on the back of the 3DO Blaster packing box.
Hardware requirements:
Intel or compatible PC with 80386 CPU and Microsoft Windows Any of these Sound Blaster cards: Sound Blaster Pro, Sound Blaster 16 or Sound Blaster AWE32 A CD-ROM drive with a Panasonic interface A free ISA slot A VGA graphics card with VGA feature connector | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Information-based complexity**
Information-based complexity:
Information-based complexity (IBC) studies optimal algorithms and computational complexity for the continuous problems that arise in physical science, economics, engineering, and mathematical finance. IBC has studied such continuous problems as path integration, partial differential equations, systems of ordinary differential equations, nonlinear equations, integral equations, fixed points, and very-high-dimensional integration. All these problems involve functions (typically multivariate) of a real or complex variable. Since one can never obtain a closed-form solution to the problems of interest one has to settle for a numerical solution. Since a function of a real or complex variable cannot be entered into a digital computer, the solution of continuous problems involves partial information. To give a simple illustration, in the numerical approximation of an integral, only samples of the integrand at a finite number of points are available. In the numerical solution of partial differential equations the functions specifying the boundary conditions and the coefficients of the differential operator can only be sampled. Furthermore, this partial information can be expensive to obtain. Finally the information is often contaminated by noise.
Information-based complexity:
The goal of information-based complexity is to create a theory of computational complexity and optimal algorithms for problems with partial, contaminated and priced information, and to apply the results to answering questions in various disciplines. Examples of such disciplines include physics, economics, mathematical finance, computer vision, control theory, geophysics, medical imaging, weather forecasting and climate prediction, and statistics. The theory is developed over abstract spaces, typically Hilbert or Banach spaces, while the applications are usually for multivariate problems.
Information-based complexity:
Since the information is partial and contaminated, only approximate solutions can be obtained. IBC studies computational complexity and optimal algorithms for approximate solutions in various settings. Since the worst case setting often leads to negative results such as unsolvability and intractability, settings with weaker assurances such as average, probabilistic and randomized are also studied. A fairly new area of IBC research is continuous quantum computing.
Overview:
We illustrate some important concepts with a very simple example, the computation of ∫01f(x)dx.
For most integrands we can't use the fundamental theorem of calculus to compute the integral analytically; we have to approximate it numerically. We compute the values of f at n points [f(t1),…,f(tn)].
The n numbers are the partial information about the true integrand f(x).
We combine these n numbers by a combinatory algorithm to compute an approximation to the integral. See the monograph Complexity and Information for particulars.
Overview:
Because we have only partial information we can use an adversary argument to tell us how large n has to be to compute an ϵ -approximation. Because of these information-based arguments we can often obtain tight bounds on the complexity of continuous problems. For discrete problems such as integer factorization or the travelling salesman problem we have to settle for conjectures about the complexity hierarchy. The reason is that the input is a number or a vector of numbers and can thus be entered into the computer. Thus there is typically no adversary argument at the information level and the complexity of a discrete problem is rarely known.
Overview:
The univariate integration problem was for illustration only. Significant for many applications is multivariate integration. The number of variables is in the hundreds or thousands. The number of variables may even be infinite; we then speak of path integration. The reason that integrals are important in many disciplines is that they occur when we want to know the expected behavior of a continuous process. See for example, the application to mathematical finance below.
Overview:
Assume we want to compute an integral in d dimensions (dimensions and variables are used interchangeably) and that we want to guarantee an error at most ϵ for any integrand in some class. The computational complexity of the problem is known to be of order ϵ−d.
(Here we are counting the number of function evaluations and the number of arithmetic operations so this is the time complexity.) This would take many years for even modest values of d.
The exponential dependence on d is called the curse of dimensionality. We say the problem is intractable.
Overview:
We stated the curse of dimensionality for integration. But exponential dependence on d occurs for almost every continuous problem that has been investigated. How can we try to vanquish the curse? There are two possibilities: We can weaken the guarantee that the error must be less than ϵ (worst case setting) and settle for a stochastic assurance. For example, we might only require that the expected error be less than ϵ (average case setting.) Another possibility is the randomized setting. For some problems we can break the curse of dimensionality by weakening the assurance; for others, we cannot. There is a large IBC literature on results in various settings; see Where to Learn More below.
Overview:
We can incorporate domain knowledge. See An Example: Mathematical Finance below.
An example: mathematical finance:
Very high dimensional integrals are common in finance. For example, computing expected cash flows for a collateralized mortgage obligation (CMO) requires the calculation of a number of 360 dimensional integrals, the 360 being the number of months in 30 years. Recall that if a worst case assurance is required the time is of order ϵ−d time units. Even if the error is not small, say 10 −2, this is 10 720 time units. People in finance have long been using the Monte Carlo method (MC), an instance of a randomized algorithm. Then in 1994 a research group at Columbia University (Papageorgiou, Paskov, Traub, Woźniakowski) discovered that the quasi-Monte Carlo (QMC) method using low discrepancy sequences beat MC by one to three orders of magnitude. The results were reported to a number of Wall Street finance to considerable initial skepticism. The results were first published by Paskov and Traub, Faster Valuation of Financial Derivatives, Journal of Portfolio Management 22, 113-120. Today QMC is widely used in the financial sector to value financial derivatives.
An example: mathematical finance:
These results are empirical; where does computational complexity come in? QMC is not a panacea for all high dimensional integrals. What is special about financial derivatives? Here's a possible explanation. The 360 dimensions in the CMO represent monthly future times. Due to the discounted value of money variables representing times for in the future are less important than the variables representing nearby times. Thus the integrals are non-isotropic. Sloan and Woźniakowski introduced the very powerful idea of weighted spaces, which is a formalization of the above observation. They were able to show that with this additional domain knowledge high dimensional integrals satisfying certain conditions were tractable even in the worst case! In contrast the Monte Carlo method gives only a stochastic assurance. See Sloan and Woźniakowski When are Quasi-Monte Carlo Algorithms Efficient for High Dimensional Integration? J. Complexity 14, 1-33, 1998. For which classes of integrals is QMC superior to MC? This continues to be a major research problem.
Brief history:
Precursors to IBC may be found in the 1950s by Kiefer, Sard, and Nikolskij. In 1959 Traub had the key insight that the optimal algorithm and the computational complexity of solving a continuous problem depended on the available information. He applied this insight to the solution of nonlinear equations, which started the area of optimal iteration theory. This research was published in the 1964 monograph Iterative Methods for the Solution of Equations.
Brief history:
The general setting for information-based complexity was formulated by Traub and Woźniakowski in 1980 in A General Theory of Optimal Algorithms. For a list of more recent monographs and pointers to the extensive literature see To Learn More below.
Prizes:
There are a number of prizes for IBC research.
Prize for Achievement in Information-Based Complexity This annual prize, which was created in 1999, consists of $3000 and a plaque. It is given for outstanding achievement in information-based complexity. The recipients are listed below. The affiliation is as of the time of the award.
Prizes:
1999 Erich Novak, University of Jena, Germany 2000 Sergei Pereverzev, Ukrainian Academy of Science, Ukraine 2001 G. W. Wasilkowski, University of Kentucky, USA 2002 Stefan Heinrich, University of Kaiserslautern, Germany 2003 Arthur G. Werschulz, Fordham University, USA 2004 Peter Mathe, Weierstrass Institute for Applied Analysis and Stochastics, Germany 2005 Ian Sloan, Scientia Professor, University of New South Wales, Sydney, Australia 2006 Leszek Plaskota, Department of Mathematics, Informatics and Mechanics, University of Warsaw, Poland 2007 Klaus Ritter, Department of Mathematics, TU Darmstadt, Germany 2008 Anargyros Papageorgiou, Columbia University, USA 2009 Thomas Mueller-Gronbach, Fakultaet fuer Informatik und Mathematik, Universitaet Passau, Germany 2010 Boleslaw Z. Kacewicz, Department of Mathematics, AGH University of Science and Technology, Cracow, Poland 2011 Aicke Hinrichs, Fakultät für Mathematik und Informatik, FSU Jena, Germany 2012 Michael Gnewuch, Department of Computer Science, Christian-Albrechts-Universitaet zu Kiel, Germany and School of Mathematics and Statistics, University of New South Wales, Sydney, Australia 2012 (Special prize) Krzysztof Sikorski, Department of Computer Science, University of Utah 2013 Co-winners Josef Dick, University of New South Wales, Sydney, Australia Friedrich Pillichshammer, Johannes Kepler University, Linz, Austria 2014 Frances Kuo, School of Mathematics, University of New South Wales, Sydney, Australia 2015 Peter Kritzer, Department of Financial Mathematics, University of Linz, Austria 2016 Fred J. Hickernell, Department of Applied Mathematics, Illinois Institute of Technology, Chicago, USA 2017 Co-winners Thomas Kühn, University of Leipzig, Germany Winfried Sickel, University of Jena, Germany.
Prizes:
2018 Paweł Przybyłowicz, AGH University of Science and Technology in Kraków, Poland 2019 Jan Vybíral, Czech Technical University, Prague, Czech Republic Information-Based Complexity Young Researcher Award This annual award, which created in 2003, consists of $1000 and a plaque. The recipients have been 2003 Frances Kuo, School of Mathematics, University of New South Wales, Sydney, Australia 2004 Christiane Lemieux, University of Calgary, Calgary, Alberta, Canada, and Josef Dick, University of New South Wales, Sydney, Australia 2005 Friedrich Pillichshammer, Institute for Financial Mathematics, University of Linz, Austria 2006 Jakob Creutzig, TU Darmstadt, Germany and Dirk Nuyens, Katholieke Universiteit, Leuven, Belgium 2007 Andreas Neuenkirch, Universität Frankfurt, Germany 2008 Jan Vybíral, University of Jena, Germany 2009 Steffen Dereich, TU Berlin, Germany 2010 Daniel Rudolf, University of Jena, Germany 2011 Peter Kritzer, University of Linz, Austria 2012 Pawel Przybylowicz, AGH University of Science and Technology, Cracow, Poland 2013 Christoph Aistleitner, Department of Analysis and Computational Number Theory, Technische Universitat Graz, Austria 2014 Tino Ullrich, Institute for Numerical Simulation, University of Bonn, Germany 2015 Mario Ullrich, Institute of Analysis, Johannes Kepler University Linz, Austria 2016 Mario Hefter, TU Kaiserslautern, Germany 2017 Co-winners Takashi Goda, University of Tokyo Larisa Yaroslavtseva, University of Passau 2018 Arnulf Jentzen, Eidgenössische Technische Hochschule (ETH) Zürich, Switzerland Best Paper Award, Journal of Complexity This annual award, which was created in 1996, consists of $3000 ($4000 since 2015) and a plaque. Many, but by no means all of the awards have been for research in IBC. The recipients have been 1996 Pascal Koiran 1997 Co-winners B. Bank, M. Giusti, J. Heintz, and G. M. Mbakop R. DeVore and V. Temlyakov 1998 Co-winners Stefan Heinrich P. Kirrinis 1999 Arthur G. Werschulz 2000 Co-winners Bernard Mourrain and Victor Y. Pan J. Maurice Rojas 2001 Erich Novak 2002 Peter Hertling 2003 Co-winners Markus Blaeser Boleslaw Kacewicz 2004 Stefan Heinrich 2005 Co-winners Yosef Yomdin Josef Dick and Friedrich Pillichshammer 2006 Knut Petras and Klaus Ritter 2007 Co-winners Martin Avendano, Teresa Krick and Martin Sombra Istvan Berkes, Robert F. Tichy and the late Walter Philipp 2008 Stefan Heinrich and Bernhard Milla 2009 Frank Aurzada, Steffen Dereich, Michael Scheutzow and Christian Vormoor 2010 Co-winners Aicke Hinrichs Simon Foucart, Alain Pajor, Holger Rauhut, Tino Ullrich 2011 Co-winners Thomas Daun Leszek Plaskota, Greg W. Wasilkowski 2012 Co-winners Dmitriy Bilyk, V.N. Temlyakov, Rui Yu Lutz Kämmerer, Stefan Kunis, Daniel Potts 2013 Co-winners Shu Tezuka Joos Heintz, Bart Kuijpers, Andrés Rojas Paredes 2014 Bernd Carl, Aicke Hinrichs, Philipp Rudolph 2015 Thomas Müller-Gronbach, Klaus Ritter, Larisa Yaroslavtseva 2016 Co-winners David Harvey, Joris van der Hoeven and Grégoire Lecerf Carlos Beltrán, Jordi Marzo and Joaquim Ortega-Cerdà 2017 Martijn Baartse and Klaus Meer 2018 Co-winners Stefan Heinrich Julian Grote and Christoph Thäle 2019 Winners Aicke Hinrichs, Joscha Prochno, Mario Ullrich | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Conda (package manager)**
Conda (package manager):
Conda is an open-source, cross-platform, language-agnostic package manager and environment management system. It was originally developed to solve difficult package management challenges faced by Python data scientists, and today is a popular package manager for Python and R.
Conda (package manager):
At first part of Anaconda Python distribution developed by Anaconda Inc., it ended up being useful on its own and for things other than Python, so it was spun out as a separate package, released under the BSD license. The Conda package and environment manager is included in all versions of Anaconda, Miniconda, and Anaconda Repository. Conda is a NumFOCUS affiliated project.
Features:
Conda allows users to easily install different versions of binary software packages and any required libraries appropriate for their computing platform. Also, it allows users to switch between package versions and download and install updates from a software repository. Conda is written in the Python programming language, but can manage projects containing code written in any language (e.g., R), including multi-language projects. Conda can install Python, while similar Python-based cross-platform package managers (such as wheel or pip) cannot.
Features:
A popular Conda channel for bioinformatics software is Bioconda, which provides multiple software distributions for computational biology.
Comparison to pip:
The big difference between Conda and the pip package manager is in how package dependencies are managed, which is a significant challenge for Python data science and the reason Conda was created. In versions of Pip released prior to version 20.3, Pip installs all Python package dependencies required, whether or not those conflict with other packages previously installed. So a working installation of, for example, Google TensorFlow will suddenly stop working when a user pip-installs a new package that needs a different version of the NumPy library. Everything might still appear to work but the user could get different results or be unable to reproduce the same results on a different system because the user did not pip-install packages in the same order. Conda checks the current environment, everything that has been installed, any version limitations that the user specifies (e.g. the user only wants TensorFlow >= 2.0) and figures out how to install compatible dependencies. Otherwise, it will tell the user that what they want to do can't be done. Pip, by contrast, will just install the package the user specified and any dependencies, even if that breaks other packages.
Readings:
Grüning, B., Dale, R., Sjödin, A., Chapman, B. A., Rowe, J., Tomkins-Tinch, C. H., Valieris, R., Köster, J., the Bioconda Team (2018), "Bioconda: sustainable and comprehensive software distribution for the life sciences", Nature Methods, 15 (7): 475–476, doi:10.1038/s41592-018-0046-7, PMID 29967506, S2CID 196664439 | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Mute English**
Mute English:
Mute English is a term coined in the People's Republic of China to describe a phenomenon where people cannot speak English well and have a poor listening comprehension as a second language, typically through the traditional method of English language teaching where English is only taught as a subject. The phrase is a calque of the Chinese phrase "哑巴英语" (yǎbā yīngyǔ in pinyin). The phenomenon is sometimes referred to as Dumb English.
Mute English:
Mute English occurs primarily due to an emphasis on literacy, grammar, and correctness in language education. Efforts to mitigate Mute English in China have resulted in numerous commercial products including TEFL schools and teach-yourself courses, international exchanges, and the eagerness with which Chinese students strive to practice their English with foreign visitors.
Though any language can have its form of mute speakers (e.g. Mute Polish), the phenomenon of 'Mute English' in China, Japan and Korea is a massive, acknowledged problem, one which the school systems and students are attempting to address.
A related concept is the less-common Deaf English.
Speech Patterns:
In places where Mute English seems to be most prominent, the English education is often described as "a communicative language taught as if it were a dead language, like Latin". There is little to no emphasis on developing speaking abilities of the students under the system. As a result, Mute English speakers struggle with piecing together basic sentences despite having gone through roughly eight years’ worth of formal English education. Their pronunciation is typically described as "choppy" with a "robotic inflection".Typically affected by Mute English are countries that use East Asian languages, which belong to various language families while English belongs to the Indo-European Language family. These language families are considered to be very far apart from one another because they all have significant phonetical, semantic and syntactic differences. Hence, to be able to master English, a great amount of effort is required from the learner.Some of the difficulties Mute English speakers have been observed to have are difficulties with the /rl/ combination of consonants. For example, when they pronounce the word "world", it comes off as sounding more like "word" or "ward". They also tend to struggle with minimal pairs such as /ɛ/ versus /æ/, because these sounds do not exist in their language, so they often have trouble differentiating and pronouncing words that only differ by a minimal pair (i.e. "bet" and "bat").
Mute English in China:
In spite of the rising quality and heightened efforts in English education in China, it has not translated into good English proficiency, with many fresh graduates complaining that they were unable to carry out simple communicative functions since the late 1980s even after years of studying English, resulting in ‘mute english’.
Mute English in China:
Prominence of English in China Under the new post cultural revolution Chinese leadership, a large pool of English-proficient personnel was deemed to be required for China in securing its access to global scientific and technological advances in propelling towards modernisation. This resulted in a venture to expand the provision and improve the quality of English learning teaching since the 1970s, through a series of reforms carried out in areas such as curriculum development, syllabus design, textbook production, teacher training and pedagogy.Since the mid-1990s, English has become one of the three core components in China's College Entrance Examinations, known as Gaokao, alongside Chinese and Math. In 2001, the Chinese Ministry of Education launched Chinese-English bilingual education in tertiary institutions to meet the needs of economic globalisation and technical revolution, potentially train competent and multi-talented candidates for the new century, and to further improve the overall quality of higher education in China. Today, millions of Chinese take English proficiency tests every year to secure employment or professional promotion in lines of work that do not necessarily require substantial or any use of English.As such, English is seen to have a vital role in national and personal development and has a spreading acceptance in the country as the language of prestige, social progress, cultural refinement, and economic development, in which English proficiency is emphasised to be one of the most important and defining characteristics of talent in present-day society.
Mute English in China:
English Pedagogy in China In China, English is considered to be one of the core subjects. Students study it for eight years from elementary through high school. A typical English lesson in China would span four hours a week; three hours for intensive reading and one hour for listening. Occasionally, some teachers will allocate 30 minutes of speaking practice once every two to three weeks. However, a big factor that contributes to the rise of Mute English is the teaching pedagogy of Chinese teachers of the English language. This section will cover some of the major mistakes that teachers make in the classroom or within the Chinese education system.
Mute English in China:
Overuse of Chinese during English lessons In a 2011 study conducted by Yuru Shen, she observed 15 teachers for a month. She noticed that 80% of the teachers used both English and Chinese in their lessons by first speaking in English then translating the instruction or learning material into Chinese. Another 13% of teachers just lectured all the way through in Chinese, only using English to read passages or exercises. Only one teacher used English most of the time and used Chinese only when trying to explain a difficult point to the students to better facilitate their understanding. Furthermore, all informal conversations between student and teacher are held in Chinese. 90% of the teachers observed used a "Grammar Translation" method which inadvertently taught students instead to be able to translate things from Chinese to English. This then does not strengthen the students’ foundation or mastery in the language and the main focus of learning English then becomes the mastery of grammar via translation. Consequently, students do not properly learn how to express themselves and instead mistakenly believe that the study of English is the study of translation between English and Chinese. Moreover, 64% of English majors at Leshan Normal University agreed that there was too much use of Chinese during English lessons which could have affected their overall mastery of the language. Therefore, when Chinese is overused in the classroom it undermines a student's ability to learn English in its communicative or expressive form.
Mute English in China:
Lack of native English speakers as teachers The need for native speakers in English is very important because it helps to foster good pronunciation and communicative habits when speaking the language. Furthermore, learners will have a clear point of reference and could potentially mimic the speaker's pronunciation. There are not many native speakers of English in China or even teachers who managed to achieve a native-like fluency in the language. As a result, these teachers struggled to explain basic grammar rules or vocabulary in English. The initial lack of native English speakers in China was due to several deep-seated political sentiments that China had towards the British as the ex-colonisers and the Americans as the new imperialists in the Korean War. Furthermore, students in China are more used to a prescriptivist approach to their education and as a result may not be too receptive to the teaching methodology of native English speakers in explaining rules. These two factors have greatly affected Chinese students’ ability to acquire English as a second language.
Mute English in China:
Lack of communicative opportunities In June 2011, a survey on "Hierarchical Teaching" was conducted by the writer and her colleagues in Leshan Normal University. It was between 18 and 20-year-old students who had eight years worth of English education in local Chinese schools. None of these students had ever been to an English-speaking country, nor did they presently have any opportunity to practice English for communicative purposes outside of a school setting. The survey showed that 49.44% of the participants did not get to practice their speaking skills at an individual level. Moreover, as mentioned in the above section about prescriptivism in the Chinese syllabus, there is a very strong focus on test-taking. As such, students are not particularly interested in the workings and communicative aspects of English as a language, but instead are more interested in how their knowledge in English will transfer onto test papers. As such, the focus of English teaching is removed from speaking skills and is instead focused on growing the skills required for written tests. As a result, 94% of students found that the compulsory oral courses were not of use in their future careers. The evident lack of spoken opportunities for English, coupled with no motivation to master English as a language, it is no wonder the spoken proficiency of English in China is generally poor.
Mute English in China:
Deficiency of written tests As mentioned in the above section of lack of communicative opportunities, part of the problem is the test-taking culture in China. As the need for English grew rapidly, companies started to vy for communicatively competent students, putting pressure on schools to produce such talents. This then escalated testing in English. All possible forms of test-taking in China, from elementary school through to university, emphasises on accuracy. These examinations focus on written grammar and vocabulary, neglecting listening and speaking. These tests have been highlighted to affect student's prospective job opportunities and whether or not they can graduate. As such, there is immense pressure from the student to perform during these tests which deviates their focus from English mastery, to just being able to score during examinations. As a result, despite years of formal education in English, the vast majority of these students are unable to express themselves in English.
Mute English in Japan:
It is widely known that Japanese people have difficulties in communicating in English, which is seen to be a result from the entrance examination, student's lack of motivation and teachers’ insufficient communicative competence in English. Many point to this uncommunicativeness as a source of failure when referring to English language education in Japan. The situation of years of training not translating into an ability to interact with native English speakers beyond surface level causes some dissatisfaction among English teachers and students. On the flip side, in preparing the students for what is required in the entrance exams, the English education is considered more than successful.Japan ranks 55th out of the 100 countries measured in the 2020 EF English Proficiency Index, overall tallying to 'low proficiency’.
Mute English in Japan:
Prominence of English in Japan After the conclusion of the Treaty of Peace and Amity with the United States, English language education in Japan started in 1854 and opened up to the West. The popularity of English in Japan today is largely due to Japan's prospering economy, the increased need for foreign language skills and proficiency brought about by industrialisation, as well as favourable attitudes towards the west that were developed during Japan's industrialisation. Fascination with the outside world and desire of internalisation can be seen through the usage of English across advertisements and products in Japan. Over the past decades, there has also been rapid adoption of English loanwords into Japanese, where in some instances differently connotes formality and degree of technicality between Japanese words and the English loanwords.Today, English enjoys prestige as the top foreign language despite not having a legal status in Japan. The Japanese Ministry of Education has laid down for all middle and high school students to study a foreign language, where in most cases English is the foreign language chosen. The teaching of English in schools is primarily aimed at preparing students for college entrance examinations, where it can be seen to have a crucial role as education and prestige of school is highly valued and a determining factor for vocational success and opportunities.
Mute English in Japan:
English Pedagogy in Japan Unlike China, Japan is largely considered to be monolingual, but they have consistently included English education in their syllabus. The Japanese study English for 3 years in junior high school, 3 years in high school and at least another 2 years at university, yet until 1999, they have averaged less than 500 for the TOEFL. However, its severe lack of practical application has caused the proliferation of Mute English in the country. Despite the continued efforts, it has even been discovered that Japan's level of English has even decreased. Hence, this section will explore some of the pedagogical and policy mistakes that have resulted in this phenomenon.
Mute English in Japan:
Insufficient practical training There are fundamental issues with Japan's qualifications of a teacher. Firstly, a Japanese student can obtain a teaching certificate from any public or private university so long as they fulfil the required amount of credits. Hence, candidates can potentially gain a teaching certificate in English at a university without a full-time English faculty. As a result, most prospective teachers do not have in-depth training in the English language, most of these classes they take are literature or linguistics. With only 3% of teachers majoring in English Second Language (ESL)/English Foreign Language (EFL), there is therefore a gap in teaching methodology when it comes to communicative teaching. Moreover, teachers do not have sufficient practical experience when it comes to actually teaching in classrooms, hence they tend to mimic the way that they were taught when they were students. Additionally, in-service teaching training is available for current English teachers, but it is clear that at a national level, it is inconsistently conducted. This is due to the different legislatures from prefecture to prefecture and the presence of privatised Japanese high schools of which these trainings are not available to. As a result, the English education in Japan has suffered due to insufficient practical training.
Mute English in Japan:
Yakudoku Yakudoku is the most popular teaching methodology of any foreign language in Japan. It stresses the word-by-word translation of English to Japanese. This method is commonly applied to long reading passages because government-approved English texts are usually of higher difficulty than what the student can actually cope with. This is further fuelled by the insufficient training of Japanese English teachers because they usually do not have a strong enough command of English to be able to understand the passage without translations. As a result of this Yakudoku, English lessons in Japan are almost fully conducted Japanese; including grammatical explanations. The only exception is during reading exercises. As such, students do not have any English speaking opportunities in class except for when they repeat after the teacher during reading aloud exercises. This therefore has negatively impacted the speaking ability of Japanese students of the English Language, resulting in the development of Mute English.
Mute English in Japan:
Issues with standardised testing Like China, Japan's English curriculum is also driven by standardised testing. The Japanese tend to use standardised international tests (TOEFL, TOEIC, Cambridge ESOL, etc.) as their benchmark. There are also internal, in-class testing, called "Jidō Eiken" that is done with younger children while they are still within Japan's education system. "Jidō Eiken" is a test done voluntarily by young pupils, but it is highly popular, attracting over 1.4 million test-takers annually. "Eiken" has other forms of tests for students at higher levels, but they are all done voluntarily. These tests are considered to be one of the most accurate ways to measure English-language proficiency in Japan and affects employment and further education opportunities. As a result, many government and private institutions have used this test as an objective means of measuring a student's English language abilities. Furthermore, these tests are canonically harder than the actual level of English of the examinees which encourages students to study English as a "requirement" rather than as a means of communication. Additionally, despite the "Eiken" having oral tests, examinees must first pass the written and listening parts before qualifying for the oral test. This is bad for communicative learning because there is a lot of emphasis on written and reading proficiency instead which perpetuates the Mute English phenomenon.
Mute English in South Korea:
From elementary school to high school, South Korean students spend about 730 hours on English classes at school alongside private tutoring and cram schools, online English classes and even going abroad to improve their English. With the ability of English communicative competence in bringing potential opportunities, office workers voluntarily or involuntarily take up offline or online English classes as well. However, there seems to be no noticeable improvement in South Koreans’ communicative competence in English despite efforts and pressure in attaining it. It was noted in 2009 that South Koreans ranked 136th out of 161 nations in speaking skills, with points falling below average in the internet-based test (iBT) of TOEFL.
Mute English in South Korea:
Prominence of English in South Korea After the Korean War in the 1950s, there is a rising demand for English and is currently being taught as the mandatory foreign language at secondary schools. Recognised as a vital tool of competition in society, proficiency in English is required to enter a competitive school, to get a prestigious job, and to be promoted at work. Education in South Korea has been valued for centuries deeply rooted by Confucian attitudes and neoliberal ideologies, with it seen as the most powerful means to achieve upward social mobility and economic prosperity.In the late 1990s, English listening tests in the entrance examinations were introduced, and later revised to be less grammar-focused and towards a more communicative approach in 1994. This created an increasing competition for English learning and proficiency in order to be academically, thereafter socioeconomically, successful, leading to the boom of English in South Korea. Globalisation was another driving force in the English boom, with the 1997 Korean financial crisis causing Koreans to realise how valued English was in this process.English has become a symbol of modernisation and globalisation, and is seen as one of the most significant "soft skills" for employment, with the mandatory submission of TOEIC scores for white-collar jobs. As of 2013, the number of TOEIC applicants exceeded 2.07 million in South Korea. Deemed as "a lifelong project for individual excellence", English has become a necessity for Koreans and associated with one's aspirations in enhancing their worth in a competitive society.A widespread use of English in street signs, brand and government policy names, entertainment, beauty and fashion industries and academia today reflects the positive attitude towards the language. Other ways of usage include borrowing, compounding or deriving of English words, alongside mixing English words with Korean expressions or switching to English.
Mute English in South Korea:
English pedagogy in Korea Amongst these three countries, South Korea first began introducing English into their elementary school curriculum in 1997. In fact, the South Korean government has expressed plans to turn English into the second official language of the country. This would mean plans to implement English-medium instructions and a restructuring of English teaching licensure, but they are still largely considered to be monolingual. However, the issue of Mute English is still incredibly prevalent in Korea. In this section, like the other countries, it will be covering some of the issues in teaching and policies that could have led to the spread of Mute English.
Mute English in South Korea:
Class size In a typical Korean classroom, the class size is roughly 30-37 per class. This is an incredibly large class size as compared to North American English Second Language classes which rarely have more than 20 students per class . As a result, this has fostered a hierarchical student-teacher relationship so that the teacher can better manage the class. Despite South Korea adapting a communicative style of teaching, the large class size has significantly raised students’ resistance to class participation, contributing to poor spoken English due to lack of practice. In fact, in a survey conducted by Jeon in 2009, it was found that the greatest stress that teachers experience while teaching English, is the number of students. With a smaller class, teachers can make the lessons more communicative and interactive, which helps to mitigate the effects of Mute English . Presently, Korea is trying to cut their class sizes down to 24 by 2022, but until that happens, Mute English will continue to be a significant issue in Korea.
Mute English in South Korea:
University entrance examinations Korea has a strong test-taking culture to the point that they are even known as "exam hell". Annually, South Koreans spend $752 million on additional support to take English proficiency tests and they are globally regarded as the largest market to take the TOEFL. Furthermore, there is a phenomenon called "jogi yuhak'', where middle to high income parents send their children to English-speaking countries such as the US or Australia to help improve their English. However, these efforts are mainly skewed towards the national university entrance examinations, CSAT, so that their children can enter top-class universities. The English syllabus in Korea is no exception. Centered mainly around the entrance exams, English lessons leave little to no room for oral skills. This is because the entrance exam only assesses a student’s reading and listening comprehension abilities. If they do poorly on the English section, it greatly reduces a Korean student’s chance of getting into a top university, which continues encouraging them to only focus on what is tested. This therefore perpetuates the Mute English issue because the focus on entrance exams would mean less opportunities to develop speech skills in the classroom.
Mute English in South Korea:
Lack of quality learning materials In a 2009 study by Jeon, she wanted to see what were some of the stresses that English teachers in Korea faced. She found that at every level of education (elementary, middle and high school), teachers ranked supplementing interesting and additional materials for their students were the fourth and fifth most reasons for stress. In general, the teachers felt that the school sanctioned materials for English lessons were neither practical nor interesting. As such, teachers feel the need to produce their own materials to better help their students understand lessons. However, teachers have no time and have no access to supporting material. As such, without improved quality in educational materials, students still continue to have to make do with whatever is given, stagnating their English learning progress.
Attempts to mitigate Mute English:
"Mute English" students may display limited pragmatic English knowledge with a highly restricted repertoire of language learning strategies. Schools mainly employ the traditional ‘grammar-translation’ and ‘examination-oriented’ method that does not take into consideration pragmatics. This ends up reducing English- learning students into ‘mute’ and ‘deaf’ language learners. Students may lack the pragmatic knowledge on the ways to interpret discourse by relating utterances to their meanings, understanding the intention of a speaker, and the way the English language is used in different settings In order to correct Mute English, the approach to teaching English have to transition from language learning to language acquisition.
Attempts to mitigate Mute English:
China China employs the use of Foreign English Teachers, fluent in speaking English, to teach English lessons. They primarily work in private language schools or public schools in China, teaching around 20–25 hours a week, with an additional 10–12 hours on average for lesson planning and grading assessments The Foreign English Teachers are certified with TEFL, where the first-time foreign teachers would have to receive 20 hours of ideology training on the Chinese constitution and regulations.
Attempts to mitigate Mute English:
Japan Earlier Mandatory English Education From education year 2020 onwards, English teaching is mandatory from elementary school onwards. Students in the third and fourth grades go through "foreign language activities" for 35 hours per year, about one or two lessons per week, to learn the basics of English language. Fifth- and sixth-graders will study the language for 70 hours a year to achieve the goal of reading, writing, comprehending and speaking English properly with a vocabulary estimated to be around 600 to 700 words.
Attempts to mitigate Mute English:
Teaching English in English English classes will deviate from the norm of being taught in Japanese, with new reforms mandating the language of teaching English to be English itself as a basic rule. In 1994, Oral Communication, a subject consisting of three courses: listening, speaking and discussion/debate, was introduced as a subject and implemented across many high schools. This allows the high school students to place emphasis on the practical usage of the English language, rather than learning the English language for academic achievements only.
Attempts to mitigate Mute English:
Japan Exchange and Teaching (JET) Programme The JET programme is a Japanese Government initiative which brings native English speaking Assistant Language Teachers (ALTs) to Japan to assist public school English classes. In 2019, there were 5,234 participating ALTs from 57 countries.
New Standardised University Entrance Exam Starting 2020, private testers will take over English assessments such as the TOEFL and TOEIC, as universities are requiring students to attain certain scores in such private tests.
South Korea Since introducing English education into the curriculum in 1997, there have been several improvements made to improve the quality of English from year 2000 onwards namely, emphasizing communicative language in teaching and testing, emphasizing performance assessment as part of language testing, and teaching English in English.
Attempts to mitigate Mute English:
National English Competence Assessment Test The Korean Ministry of Education, Science and Technology (MEST) developed and officially accredited the National English Competence Assessment Test from 2010 onwards, assessing all four skills of listening, reading, speaking and writing. There are three levels aimed to achieve different goals, namely: Level 1 (Highest Level): For college sophomores and juniors, for usage after graduation, application of jobs and for overseas education (to replace TOEIC and TOEFL).
Attempts to mitigate Mute English:
Level 2: For college departments that uses English Level 3: Level required for general college educationThe test will be mainly online.
Attempts to mitigate Mute English:
Increasing Class Hours in Elementary School English class hours of elementary school students will increase by one hour per week to improve their English abilities. Students in the third and fourth grades go through 2 hours of English lesson per week, while fifth- and sixth-graders go through 3 hours of English lessons per week. The increased exposure and time spent on learning English aims to enhance and expedite the student's English learning progress.
Attempts to mitigate Mute English:
Jogiyuhak Jogiyuhak or jogi yuhak (early study abroad) is the educational and linguistic investment that many Korean families take part in, in order to achieve good English standards - a native-like fluency and accent. Families would migrate with the intention of submersion in an English monolingual environment among native speakers to access better quality of English education in an English-speaking environment to hone the child's English fluency skills from young.
Attempts to mitigate Mute English:
English Villages English Villages in South Korea provide a short-term immersion English experience in a live-in environment to promote English learning and to build students' Anglo-American cultural awareness. The first English village was opened in August 2004 in Ansan, Gyeonggi-do province. Additional English villages have been opened in both Gyeonggi-do and Seoul. As of September 2012, there are 32 of such mini towns in suburban areas.
Attempts to mitigate Mute English:
English villages employ a mixture of foreign native speakers of English and fluent English-speaking Korean staff. They are intended to help students face the particular challenges of speaking English in the Korean context. Many families seek to improve their children's English ability by sending them to several expensive after-school programs and by sending them to study abroad in English-speaking countries. Study abroad results in a substantial amount of money leaving the country. The English villages are intended to reduce this loss, and make the immersion experience accessible to students from low-income families as well. However, many questions remain as to whether the English villages will be cost-effective. In fact, most have been privatized due to operating losses.
Attempts to mitigate Mute English:
The English village concept is to be expanded in the near future as financially it has not been a complete failure. The government will begin to use money for projects like this in the future in addition to sending students on scholarships overseas, despite spending money on short term construction projects.
There are several English Villages in different areas in Korea, namely, the Gyeonggi-do English Village, the Ansan English Village on Daebu Island on the coast of the Yellow Sea, and the Seoul English Village.
Sources:
Mao, Luming; Min, Yue (2004). "Foreign Language Education in the PRC". Language Policy in the People's Republic of China. Language Policy. Vol. 4. pp. 319–329. doi:10.1007/1-4020-8039-5_18. ISBN 1-4020-8038-7.
Stevens, Gillian; Jin, Kinam; Song, Hyun Jong (March 2006). "Short-term Migration and the Acquisition of a World Language". International Migration. 44 (1): 167–180. doi:10.1111/j.1468-2435.2006.00359.x.
Sources:
董洪亮. "莫学'哑巴英语'" [Don't learn 'dumb English'] (Document) (in Chinese). {{cite document}}: Cite document requires |publisher= (help); Unknown parameter |archive-date= ignored (help); Unknown parameter |archive-url= ignored (help); Unknown parameter |url= ignored (help) Fang, Guo (2003). "A Comparison Between Online English Language Teaching and Classroom English Language Teaching" (Document). {{cite document}}: Cite document requires |publisher= (help); Unknown parameter |archive-date= ignored (help); Unknown parameter |archive-url= ignored (help); Unknown parameter |url= ignored (help) | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Laddermill**
Laddermill:
A laddermill kite system is an airborne wind turbine consisting of a long string or loop of power kites.
Laddermill:
The loop or string of kites (the "ladder") would be launched in the air by the lifting force of the kites, until it is fully unrolled, and the top reaches a height determined by designers and operators; some designers have considered heights of about 30,000 feet (9,100 meters), but the concept is not height-dependent. The laddermill method may use one endless loop, two endless loops, or more such loops.
Introduction:
In a 2007 "road map" report on renewable energy adopted by the European Parliament, laddermill technology was listed among various "promising and challenging" new energy sources into which revenue from emissions trading could be reinvested.
Operating modes:
There are currently two operating modes considered: The kites pull up the long string on which they are tethered, and the resulting energy is then used to drive an electric generator. When the end of the string is reached the pull force of the kites is reduced by changing the angle of attack of the kites "wing shape", and the string is then rewound with the electric generator acting as a motor, or by other means. If the string is reduced to its minimum length the next energy generating cycle is started by restoring the angle of attack of the kites to maximum lift.
Operating modes:
Kites on one side of a wire loop generate lift while the ones on the other side do not because the angle of attack of the kites "wing shape" changes when the kite passes the top of the loop. So the kites pull up only one end of an endless loop, causing the loop to start to rotate, and the resulting released energy is then used to drive an electric generator.
Design:
A "rotating loop" "LadderMill" project was designed and developed by the Dutch ex-astronaut and physicist Wubbo Ockels.
As quoted from his website: The LadderMill is the response to the challenge for exploiting the gigantic energy source contained in the airspace up to high altitudes of 10 km. The concept has been developed with the aim to convert wind energy at altitude in electricity on the ground in an environmental and cost effective manner. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Colin Baigent**
Colin Baigent:
Colin Baigent (born 1961) is a British academic physician and cardiovascular epidemiologist. He is a professor of epidemiology, Director of the Medical Research Council Population Health Research Unit at the University of Oxford, and deputy director of the Clinical Trial Service Unit and Epidemiological Studies Unit (CTSU), part of Oxford Population Health (the Nuffield Department of Population Health at the University of Oxford). His work is focused in the design and coordination of large-scale randomised trials and the use of meta-analysis to assess the efficacy and safety of drugs for the prevention of cardiovascular disease (CVD) or premature death.
Education:
Baigent was educated at St Bartholomew's School, Newbury, Berkshire. He studied mathematics at the University of Oxford, where he graduated in 1983. In 1995, he completed an MSc in epidemiology at the London School of Hygiene & Tropical Medicine, University of London.
Career:
Baigent started his research career as a Junior Research Fellow at Green College at the University of Oxford in 1993. He was then appointed as an Honorary Senior Clinical Lecturer in 2000, Reader in Clinical Epidemiology in 2002, and since 2006 has served as a professor of epidemiology. He has been deputy director of the Clinical Trial Service Unit and Epidemiological Studies Unit (CTSU) since 2013 and Director of the MRC Population Health Research Unit at the University of Oxford since 2016. He is also an Honorary Consultant in cardiovascular epidemiology at the Oxford University Hospitals NHS Foundation Trust.
Research:
Chronic kidney disease and CVD Baigent pioneered the design and conduct of large-scale randomised trials in chronic kidney disease alongside Martin Landray. He served as Chief Investigator of the SHARP (Study of Heart and Renal Protection) trial, which recruited over 9,000 patients and established the efficacy and safety of lowering cholesterol in patients with chronic kidney disease. More recently, his group has completed the EMPA-KIDNEY trial, which recruited over 6,600 patients, and demonstrated the efficacy and safety of empagliflozin for slowing progression of kidney disease.
Research:
Cardiovascular epidemiology Baigent has coordinated many collaborative meta-analyses in which individual participant data from randomised controlled trials have been used to develop a better understanding of the effects and safety of drug treatments. Since 1993, he has coordinated the Cholesterol Treatment Trialists’ (CTT) Collaboration with Rory Collins, which has provided information about the efficacy and safety of statin therapy in people with or without cardiovascular disease. He has also coordinated the Antithrombotic Treatment Trialists’ (ATT) Collaboration, which has shown that daily low-dose aspirin does not result in a net benefit for primary prevention, whereas in secondary prevention the benefits of aspirin greatly outweigh the bleeding risks.
Awards and honors:
2005 – Elected Fellow, Faculty of Public Health, London 2006 – Elected Fellow, Royal College of Physicians, London 2015 – Elected Fellow, European Society of Cardiology 2019 – Elected Fellow, Academy of Medical Sciences (United Kingdom) | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Abdominis**
Abdominis:
The term abdominis is an old Latin term for abdomen. In modern times, it is still used in anatomical classification of muscles in the human abdomen, such as: Rectus abdominis muscle Transverse abdominal muscle | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**GABRB3**
GABRB3:
Gamma-aminobutyric acid receptor subunit beta-3 is a protein that in humans is encoded by the GABRB3 gene. It is located within the 15q12 region in the human genome and spans 250kb. This gene includes 10 exons within its coding region. Due to alternative splicing, the gene codes for many protein isoforms, all being subunits in the GABAA receptor, a ligand-gated ion channel. The beta-3 subunit is expressed at different levels within the cerebral cortex, hippocampus, cerebellum, thalamus, olivary body and piriform cortex of the brain at different points of development and maturity. GABRB3 deficiencies are implicated in many human neurodevelopmental disorders and syndromes such as Angelman syndrome, Prader-Willi syndrome, nonsyndromic orofacial clefts, epilepsy and autism. The effects of methaqualone and etomidate are mediated through GABBR3 positive allosteric modulation.
Gene:
The GABRB3 gene is located on the long arm of chromosome 15, within the q12 region in the human genome. It is located in a gene cluster, with two other genes, GABRG3 and GABRA5. GABRB3 was the first gene to be mapped to this particular region. It spans approximately 250kb and includes 10 exons within its coding region, as well as two additional alternative first exons that encode for signaling peptides. Alternatively spliced transcript variants encoding isoforms with distinct signal peptides have been described. This gene is located within an imprinting region that spans the 15q11-13 region. Its sequence is considerably longer than the two other genes found within its gene cluster due to a large 150kb intron it carries. A pattern is observed in GABRB3 gene replication, in humans the maternal allele is replicated later than the paternal allele. The reasoning and implications of this pattern are unknown.
Gene:
When comparing the human beta-3 subunit's genetic sequence with other vertebrate beta-3 subunit sequences, there is a high level of genetic conservation. In mice the Gabrb3 gene is located on chromosome 7 of its genome in a similar gene cluster style with some of the other subunits of the GABAA receptor.
Function:
GABRB3 encodes a member of the ligand-gated ion channel family. The encoded protein is one of at least 13 distinct subunits of a multisubunit chloride channel that serves as the receptor for gamma-aminobutyric acid, the major inhibitory neurotransmitter of the nervous system. The two other genes in the gene cluster both encode for related subunits of the family. During development, when the GABRB3 subunit functions optimally, its role in the GABAA receptor allows for proliferation, migration, and differentiation of precursor cells that lead to the proper development of the brain. GABAA receptor function is inhibited by zinc ions. The ions bind allosterically to the receptor, a mechanism that is critically dependent on the receptor subunit composition.De novo heterozygous missense mutations within a highly conserved region of the GABRB3 gene can decrease the peak current amplitudes of neurons or alter the kinetic properties of the channel. This results in the loss of the inhibitory properties of the receptor.
Function:
The beta-3 subunit has very similar function to the human version of the subunit.
Structure:
The crystal structure of a human β3 homopentamer was published in 2014. The study of the crystal structure of the human β3 homopentamer revealed unique qualities that are only observed in eukaryotic cysteine-loop receptors. The characterization of the GABAA receptor and subunits helps with the mechanistic determination of mutations within the subunits and what direct effect the mutations may have on the protein and its interactions.
Expression:
The expression of GABRB3 is not constant among all cells or at all stages of development. The distribution of expression of the GABAA receptor subunits (GABRB3 included) during development indicates that GABA may function as a neurotrophic factor, impacting neural differentiation, growth, and circuit organization. The expression of the beta-3 subunit reaches peak at different times in different locations of the brain, during development. The highest expression of Gabrb3 in mice, within the cerebral cortex and hippocampus are reached prenatally, while they are reached postnatally in the cerebellar cortex. After the highest peak of expression, Gabrb3 expression is down-regulated substantially in the thalamus and inferior olivary body of the mouse. By adulthood, the level of expression in the cerebral cortex and hippocampus drops below developmental expression levels, but the expression in the cerebellum does not change postnatally. The highest levels of Gabrb3 expression in the mature mouse brain occur in the Purkinje and granule cells of the cerebellum, the hippocampus, and the piriform cortex.In humans, the beta-3 subunit, as well as the subunits of its two neighbouring genes (GABRG3 and GABRA5), are bi-allelically expressed within the cerebral cortex, indicating that the gene is not subjected to imprinting within those cells.
Expression:
Imprinting Patterns Due to the location of GABRB3 in the 15q11-13 imprinting region found in humans, this gene is subject to imprinting depending on the location and the cells developmental state. Imprinting is not present in the mouse brain, having an equal expression from maternal and paternal alleles.
Regulation:
Phosphorylation of the GABAA by cAMP-dependent protein kinase (PKA) has a regulatory effect dependent on the beta subunit involved. The mechanism by which the kinase is targeted towards the bata-3 subunit is unknown. AKAP79/150 binds directly to the GABRB3 subunit, which is critical for its own phosphorylation, mediated by PKA.Gabrb3 shows significantly reduced expression postnatally, when mice are deficient in MECP2. When the MECP2 gene is knocked out, the expression of Gabrb3 is reduced, suggesting a relationship of positive regulation between the two genes.
Clinical significance:
Mutations in this gene may be associated with the pathogenesis of Angelman syndrome, nonsyndromic orofacial clefts, epilepsy and autism. The GABRB3 gene has been associated with savant skills accompanying such disorders.In mice, the knockout mutation of Gabrb3 causes severe neonatal mortality with the cleft palate phenotype present, the survivors experiencing hyperactivity, lack of coordination and suffering with epileptic seizures. These mice also exhibit changes to the vestibular system within the ear, resulting in poor swimming skills, difficulty in walking on grid floors, and are found to run in circles erratically.
Clinical significance:
Angelman syndrome Deletion of the GABRB3 gene results in Angelman syndrome in humans, depending on the parental origin of the deletion. Deletion of the paternal allele of GABRB3 has no known implications with this syndrome, while deletion of the maternal GABRB3 allele results in development of the syndrome.
Clinical significance:
Nonsyndromic Orofacial Clefting There is a strong association between GABRB3 expression levels and proper palate development. A disturbance in GABRB3 expression can be lined to the malformation of nonsyndromic cleft lip with or without cleft palate. Cleft lip and palate have also been observed in children who have inverted duplications encompassing the GABRB3 locus. Knockout of the beta-3 subunit in mice results in clefting of the secondary palate. Normal facial characteristics can be restored through the insertion of a Gabrb3 transgene into the mouse genome, making the Gabrb3 gene primarily responsible for cleft palate formation.
Clinical significance:
Autism Spectrum Disorder Duplications of the Prader-Willi/Angelman syndrome region, also known as the imprinting region (15q11-13) that encompasses the GABRB3 gene are present in some patients diagnosed with Autism. These patients exhibit classic symptoms that are associated with the disorder. Duplications of the 15q11-13 region displayed in autistic patients are almost always of maternal origin (not paternal) and account for 1–2% of diagnosed autism disorder cases. This gene is also a candidate for autism because of the physiological response that benzodiazepine has on the GABA-A receptor, when used to treat seizures and anxiety disorders.The Gabrb3 gene deficient mouse has been proposed as a model of autism spectrum disorder. These mice exhibit similar phenotypic symptoms such as non-selective attention, deficits in a variety of exploratory parameters, sociability, social novelty, nesting and lower rearing frequency as can be equated to characteristics found in patients diagnosed with autism spectrum disorder. When studying Gabrb3 deficient mice, significant hypoplasia of the cerebellar vermis was observed.There is an unknown association between autism and the 155CA-2 locus, located within an intron in GABRB3.
Clinical significance:
Epilepsy/Childhood absence epilepsy Defects in GABA transmission has often been implicated in epilepsy within animal models and human syndromes. Patients that are diagnosed with Angelman syndrome and have a deletion of the GABRB3 gene exhibit absence seizures. Reduced expression of the beta-3 subunit is a potential contributor to childhood absence epilepsy. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Sitz bath**
Sitz bath:
A sitz bath or hip bath is a bath in which a person sits in water up to the hips. It is used to relieve discomfort and pain in the lower part of the body, for example, due to hemorrhoids (piles), anal fissures, perianal fistulas, rectal surgery, an episiotomy, uterine cramps, inflammatory bowel disease, pilonidal cysts and infections of the bladder, prostate or vagina. It works by keeping the affected area clean and increasing the flow of blood to it.
Sitz bath:
Such hip baths were originally a European custom, although modern sitz baths are used mainly for therapeutic purposes. The term sitz bath is derived from the German word Sitzbad, meaning a bath (Bad) in which one sits (sitzen).
Preparation:
A sitz bath may be created simply by filling a bathtub with some water and sitting in it for a few minutes. Alternatively, a large basin can be used. There are also special devices that fit into toilet bowls. Sitz baths may either be warm or cool, or alternating between the two. Substances such as salt, baking soda, or vinegar may be added to the water.
Preparation:
Warm baths are recommended for reducing the itching, pain and discomfort associated with conditions such as hemorrhoids and genital problems. An ordinary bathtub can be filled with 3 to 4 inches (7.6 to 10.2 cm) of hot water (about 110 °F (43 °C)), and sat in for 15–20 minutes or until the water cools down. Alternatively, a large basin can be used, and there are specially built devices that fit into toilet bowls.Cool sitz baths are said to be helpful in easing constipation, inflammation and vaginal discharge, and, in cases of fecal or urinary incontinence, in toning the muscles.Several variations of the procedure can be used, with different therapeutic effects depending on the temperature of the water, the length of time spent immersed and the method of immersion (such as dipping and 'hot and cold alternate'). Some people find that alternating three to five times between a hot bath for 3–4 minutes and an ice-cold bath for 30–60 seconds is soothing. A towel soaked in cold water can be used in place of a cold bath.For most purposes sitz baths with water are sufficient, though some people prefer to use saline water or water mixed with baking soda. The use of such additives helps to reduce infections. People with candidiasis (a vaginal yeast infection) may benefit from a warm bath with salt and vinegar.Electronic bidets which irrigate the anal region with a flow of warm water have been compared with sitz baths, and found to produce very similar reduction in anal pressure, with no change in temperature, if used with low-pressure warm water. Some electronic bidets have a dedicated "sitz" function.
Benefits:
A warm sitz bath could be helpful to relieve congestion and edema by aiding venous return from the perianal area. Its major effect is thought to be due to the reductions of spasms by relaxing the anal sphincter pressure, reducing anal pain. It has benefits for patients with elevated anal pressure due to anorectal diseases such as anal fissure or inflamed hemorrhoids, and after surgical operations involving the anus.
Risks:
Sitz baths are considered very low risk. Because hot baths cause blood vessels to dilate, on rare occasions some people can feel dizzy or have palpitations (rapid or abnormal heartbeat). People prone to such occurrences are advised to have someone standing by to assist them. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Unique identifier**
Unique identifier:
A unique identifier (UID) is an identifier that is guaranteed to be unique among all identifiers used for those objects and for a specific purpose. The concept was formalized early in the development of computer science and information systems. In general, it was associated with an atomic data type.
In relational databases, certain attributes of an entity that serve as unique identifiers are called primary keys.In mathematics, set theory uses the concept of element indices as unique identifiers.
Classification:
There are some main types of unique identifiers, each corresponding to a different generation strategy: serial numbers, assigned incrementally or sequentially, by a central authority or accepted reference.
Classification:
random numbers, selected from a number space much larger than the maximum (or expected) number of objects to be identified. Although not really unique, some identifiers of this type may be appropriate for identifying objects in many practical applications and are, with informal use of language, still referred to as "unique" Hash functions: based on the content of the identified object, ensuring that equivalent objects use the same UID.
Classification:
Random number generator: based on random process.
names or codes allocated by choice which are forced to be unique by keeping a central registry such as the EPC Information Services.
Classification:
names or codes allocated using a regime involving multiple (concurrent) issuers of unique identifiers that are each assigned mutually exclusive partitions of a global address space such that the unique identifiers assigned by each issuer in each exclusive address space partition are guaranteed to be globally unique. Examples include (1) the media access control address MAC address uniquely assigned to each individual hardware network interface device produced by the manufacturer of the devices, (2) consumer product bar codes assigned to products using identifiers assigned by manufacturers that participate in GS1 identification standards, and (3) the unique and persistent Legal Entity Identifier assigned to a legal entity by one of the LEI registrars in the Global Legal Entity Identifier System (GLEIS) managed by the Global LEI Foundation (GLEIF).The above methods can be combined, hierarchically or singly, to create other generation schemes which guarantee uniqueness. In many cases, a single object may have more than one unique identifier, each of which identifies it for a different purpose.
Examples:
Electronic Identifier Serial Publication (EISP) Electronic Product Code (EPC) International eBook Identifier Number (IEIN) International Standard Book Number (ISBN) National identification number Part number Radio call signs Stock keeping unit (SKU) Track and trace National identification number National identification number is used by the governments of many countries as a means of tracking their citizens, permanent residents, and temporary residents for the purposes of work, taxation, government benefits, health care, and other governance-related functions.
Examples:
Chemistry CAS registry number IUPAC nomenclature Computing Cryptographic hashes Identity correlation MAC address Object identifier (OID) Organizationally unique identifier (OUI) Universally unique identifier (UUID) or globally unique identifier (GUID) World Wide Port Name Economics, tax and regulation Harmonized System Payment card number Unique Transaction Identifier (UTI) Universal Product Code Internet architecture and standards Best Current Practice (BCP) For Your Information (FYI) Internet Draft (I-D) Internet Experiment Note (IEN) Internet Standard (STD) Request for Comments (RFC) RARE Technical Reports (RTR) Legal Bates numbering European Case Law Identifier (ECLI) Gun serial number Legal Entity Identifier (LEI) Lex (URN) Mathematical publications Mathematical Reviews number Zentralblatt MATH identifier Research / Science Archival resource keys (ARK), with 8.2 billion ARKs issued.
Examples:
Digital object identifiers (DOI), with 200 million DOIs issued.
Identifiers.org ORCID (Open Researcher and Contributor ID) Smithsonian trinomial Systematic name Transportation American rail transportation Reporting marks IMO number to identify sea-going ships International Air Transport Association airport codes IMO container codes according to ISO 6346 for shipping containers License plate number Maritime Mobile Service Identity (MMSI) UIC wagon numbers | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**IFNAR2**
IFNAR2:
Interferon-alpha/beta receptor beta chain is a protein that in humans is encoded by the IFNAR2 gene.
Function:
The protein encoded by this gene is a type I membrane protein that forms one of the two chains of a receptor for interferons alpha and beta. Binding and activation of the receptor stimulates Janus protein kinases, which in turn phosphorylate several proteins, including STAT1 and STAT2. Multiple transcript variants encoding at least two different isoforms have been found for this gene.
Interactions:
IFNAR2 has been shown to interact with: GNB2L1, IFNA2, STAT1, and STAT2. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**D-Scribe Digital Publishing**
D-Scribe Digital Publishing:
D-Scribe Digital Publishing is an open access electronic publishing program of the University Library System (ULS) of the University of Pittsburgh. It comprises over 100 thematic collections that together contain over 100,000 digital objects. This content, most of which is available through open access, includes both digitized versions of materials from the collections of the University of Pittsburgh and other local institutions as well as original 'born-electronic' content actively contributed by scholars worldwide. D-Scribe includes such items as photographs, maps, books, journal articles, dissertations, government documents, and technical reports, along with over 745 previously out-of-print titles published by the University of Pittsburgh Press. The digital publishing efforts of the University Library System began in 1998 and have won praise for their innovation from the leadership at the Association of Research Libraries and peer institutions.
Major digitized collections:
The University Library System at the University of Pittsburgh has created various digital collections through its D-Scribe Digital Publishing program and has made them available to the public via the Internet. The following is a selection of the more prominent or larger collections available online.
19th-century schoolbooks A full-text digitized presentation of over 140 historic books in the 16,000 volume Neitz Old Textbook Collection. The textbooks date from the 19th century and are fully searchable.
Major digitized collections:
Archive of European Integration A digitized repository and archive of material dealing with European integration that focuses on the normalization of relations of Eastern and Western Europe following the Cold War and the integration movements in West Europe that resulted in the European Community. Nearly 30 universities throughout Europe and America contribute content to the AEI. The AEI collects both independently produced research materials and official European Community/European Union documents. Many of the digitized documents in the AEI are drawn from the University Library System's collection of EU documents received in 2007 when the library of the Delegation of the European Commission to the US in Washington, D.C. was donated to the University of Pittsburgh.
Major digitized collections:
Audubon's Birds of America The University's complete double elephant folio set of John James Audubon's The Birds of America, one of only 120 complete sets of all 435 plates in existence, was preserved and restored over a five-month process in 2000. In 2007, along with the five volume set of Audubon's Ornithological Biography, the plates were digitized at high resolution and made available in one complete online collection.
Major digitized collections:
Darlington Digital Library The Darlington Digital Library contains digitized materials from the Darlington Memorial Library. The Library is a major collection related to American history, particularly colonial American history in Western Pennsylvania. Digitized items included vintage atlases, books, broadsides, images, manuscripts, and maps.
Dick Thornburgh Papers Former Pennsylvania governor and United States Attorney General Dick Thornburgh donated his personal papers to the University of Pittsburgh in 1998. Portions of the collection are digitized and arranged in twenty-one chronological sections, representing Thornburgh's life and career, each with introductory information about the point in time, the position held, and items of importance.
George Washington Manuscripts A digitized collection of broadsides manuscripts, maps, images, and personal communications that depict George Washington's time in Western Pennsylvania at various points in his career.
Major digitized collections:
Historic Pittsburgh Collection This digital collection includes digitized historical resources on the history of Western Pennsylvania including texts, videos, maps, images, census records, and archival finding aids. Included are over 25,000 images from multiple photographic collections that originated from a digitization project funded by the Institute of Museum and Library Services and completed in 2004. The presentation represents a collaboration between Pittsburgh-area libraries, museums, and universities and includes historic material derived from those held by the University Library System, University of Pittsburgh; the Library & Archives at the Heinz History Center; Chatham University Archives; Oakmont Carnegie Library; Pittsburgh History & Landmarks Foundation; and Point Park University Archives.
Major digitized collections:
University of Pittsburgh Press Digital Editions The University of Pittsburgh Press Digital Editions is a collaboration between the University of Pittsburgh Press and the University Library System that has digitized over 745 monographs in order make them freely available to the public via the internet. Mostly out-of-print titles, the collection includes fully searchable titles from the Pitt Latin American Series; Pitt Series in Russian and East European Studies; and Composition, Literacy, and Culture.
Major digitized collections:
Stephen Foster Sketchbook A digitized and searchable presentation of Stephen Foster's sketchbook that contains 113 leaves with hand-written drafts for 64 different songs, including some unpublished ones, as well as other notations and doodles. The full sketchbook was digitized in Oxford in 2005, with the original stored in a vault at the University of Pittsburgh.
Other digitized collections D-Scribe includes many other collections of materials and photographs. Major themes include Asian studies, labor and socialist movement, philosophy, atlases, the Carnegie Museum of Art Collection of Photographs, and historic Pittsburgh photo archives. Also included are photo archives from various conferences and industries.
Asian studies collections The ULS has digitized a variety of titles and artwork held in the university's East Asian Library. These include the Barry Rosensteel Japanese Print Collection; Tsukioka Kōgyo, The Art of Noh, 1869-1927; and Modern China Studies.
Major digitized collections:
Free at Last? exhibit Free at Last? is an exhibit based on a collection of Allegheny County, Pennsylvania slavery manumissions discovered in 2007 by staff in the Allegheny County Recorder of Deeds Office that document the widespread existence of slavery in Western Pennsylvania up until the US Civil War period. Staged at the Heinz History Center in Pittsburgh, the exhibit focused on the original documentation coupled with interpretative panels and other artifacts to tell the story of African American slaves in Western Pennsylvania between 1792-1857. Shortly after the close of the exhibit in April 2009, the University Library System, University of Pittsburgh built a virtual exhibit with particular attention focused on the manumission documents.
Major digitized collections:
Industry photo archives D-Scribe includes photographic archives from various Western Pennsylvania companies including American Steel and Wire Company, CONSOL Energy Mining, H. J. Heinz Company, Lyon Shorb & Company, Mesta Machine Company, Otto's Suburban Dairy, Pittsburgh Railways Company, Rust Engineering Company, and Trimble Company.
Labor and socialist collections Digitized repositories of Pittsburgh labor and socialist movements include the A.E. Forbes Communist Collection, American Left Ephemera Collection, the Cartoons of Fred Wright, the UE News Photograph Collection, the Union Switch & Signal Strike Photograph Collection, Stalinka: the Digital Library of Staliniana, as well as the Pittsburgh and Western Pennsylvania Labor Legacy project.
Lillian Friedberg Postcard Collection A digitized collection of postcards dealing with the 1933 World's Fair in Chicago, World War II Allied and Nazi leadership propaganda, and French cartoons parodying Nazi leadership.
Philosophy collections The ULS has digitized portions of the collected paper of prominent philosophers, including Frank P. Ramsey and Wilfrid Sellars.
Electronic archives and repositories:
The D-Scribe Publishing Program has also developed several electronic archives and repositories. These repositories have been developed using Open Access principles, meaning that scholarly content is online, freely available, and immediately accessible to a global audience.Archive content includes both peer-reviewed and non-refereed content; unpublished and published articles (preprints or postprints); conference proceedings; other grey literature, such as white papers, policy papers, and technical reports; multimedia content including audio, video, and images; and primary research data.These online archives serve many needs, such as storing the scholarly works of university authors; preserving information from specific research disciplines; and disseminating new scholarly work quickly, without a lengthy publication process.The content for these archives is drawn from a variety of sources including digitization of ULS print collections and direct author contributions from the worldwide research community. Metadata for each item published in the repository is searchable through search tools such as Google and Yahoo. Based on EPrints, free open source software developed at the University of Southampton, these subject-based repositories offer simple Web-based submission interfaces for authors and a variety of tools for readers including RSS feeds, rich citation export options, and sharing on major social networking sites.Electronic archives created by the D-Scribe Digital Publishing Program include: Aphasiology Archive Archive of European Integration D-Scholarship@Pitt, the Institutional Repository of the University of Pittsburgh, including Electronic Theses and Dissertations (ETDs) Industry Studies Working Papers Minority Health and Health Equity Archive PhilSci-Archive, a preprint repository for the field of Philosophy of Science
Electronic journal publishing program:
D-Scribe also contains 40 scholarly journals published by the University Library System (ULS), University of Pittsburgh. Through this program, the ULS works with partners around the world to publish peer-reviewed, international Open Access electronic journals. Services offered include server and software hosting; graphic design services; consultation in editorial workflow management and best practices for electronic publishing; and ISSN and DOI registration. These services are offered free of charge in an effort to incentivize academic journal editors to publish their research results through free and Open Access for researchers worldwide. The ULS also publishes several subscription-based journals under a delayed open access model. The publishing platform is based on Open Journal Systems, free open source software developed by the Public Knowledge Project (PKP). As of 2016, 40 journals are published in this program, including: Bolivian Studies Journal CINEJ Cinema Journal Contemporaneity: Historical Presence in Visual Culture EMAJ Emerging Markets Journal Etudes Ricoeuriennes/Ricoeur Studies (ERRS) Excellence in Higher Education Health, Culture and Society Hungarian Cultural Studies International Journal of Telerehabilitation Japanese Language and Literature Journal of French and Francophone Philosophy Journal of Law and Commerce Journal of World-Systems Research Ledger, a journal on cryptocurrency and blockchain technology, "the first peer-reviewed journal on Bitcoin" Names Pittsburgh Journal of Technology Law & Policy Pittsburgh Tax Review Pennsylvania Libraries: Research and Practice from the Pennsylvania Library Association Radical Teacher Revista Iberoamericana, a journal of the literature, literary theory, and literary criticism in Latin American Spanish and Portuguese The Carl Beck Papers in Russian and East European Studies University of Pittsburgh Law Review. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Global Descriptor Table**
Global Descriptor Table:
The Global Descriptor Table (GDT) is a data structure used by Intel x86-family processors starting with the 80286 in order to define the characteristics of the various memory areas used during program execution, including the base address, the size, and access privileges like executability and writability. These memory areas are called segments in Intel terminology.
Description:
The GDT is a table of 8-byte entries. Each entry may refer to a segment descriptor, Task State Segment (TSS), Local Descriptor Table (LDT), or call gate. Call gates were designed for transferring control between x86 privilege levels, although this mechanism is not used on most modern operating systems.
Description:
There is also a Local Descriptor Table (LDT). Multiple LDTs can be defined in the GDT, but only one is current at any one time: usually associated with the current Task. While the LDT contains memory segments which are private to a specific process, the GDT contains global segments. The x86 processors have facilities for automatically switching the current LDT on specific machine events, but no facilities for automatically switching the GDT.
Description:
Every memory access performed by a process always goes through a segment. On the 80386 processor and later, because of 32-bit segment offsets and limits, it is possible to make segments cover the entire addressable memory, which makes segment-relative addressing transparent to the user.
Description:
In order to reference a segment, a program must use its index inside the GDT or the LDT. Such an index is called a segment selector (or selector). The selector must be loaded into a segment register to be used. Apart from the machine instructions which allow one to set/get the position of the GDT, and of the Interrupt Descriptor Table (IDT), in memory, every machine instruction referencing memory has an implicit segment register, occasionally two. Most of the time this segment register can be overridden by adding a segment prefix before the instruction.
Description:
Loading a selector into a segment register reads the GDT or LDT entry at the time it is loaded, and caches the properties of the segment in a hidden register. Subsequent modifications to the GDT or LDT will not take effect until the segment register is reloaded.
GDT in 64-bit:
The GDT is still present in 64-bit mode; a GDT must be defined, but is generally never changed or used for segmentation. The size of the register has been extended from 48 to 80 bits, and 64-bit selectors are always "flat" (thus, from 0x0000000000000000 to 0xFFFFFFFFFFFFFFFF). However, the base of FS and GS are not constrained to 0, and they continue to be used as pointers to the offset of items such as the process environment block and the thread information block.
GDT in 64-bit:
If the System bit (4th bit of the Access field) is cleared, the size of the descriptor is 16 bytes instead of 8. This is because, even though code/data segments are ignored, TSS are not, but the TSS pointer can be 64bit long and thus the descriptor needs more space to insert the higher dword of the TSS pointer.
64-bit versions of Windows forbid hooking of the GDT; attempting to do so will cause the machine to bug check.
Local Descriptor Table:
A Local Descriptor Table (LDT) is a memory table used in the x86 architecture in protected mode and containing memory segment descriptors, just like the GDT: address start in linear memory, size, executability, writability, access privilege, actual presence in memory, etc.
Local Descriptor Table:
LDTs are the siblings of the Global Descriptor Table (GDT), and each define up to 8192 memory segments accessible to programs - note that unlike the GDT, the zeroeth entry is a valid entry, and can be used like any other LDT entry. Also note that unlike the GDT, the LDT cannot be used to store certain system entries: TSSs or LDTs. Call Gates and Task Gates are fine, however.
History:
On x86 processors not having paging features, like the Intel 80286, the LDT is essential to implementing separate address spaces for multiple processes. There will be generally one LDT per user process, describing privately held memory, while shared memory and kernel memory will be described by the GDT. The operating system will switch the current LDT when scheduling a new process, using the LLDT machine instruction or when using a TSS. On the contrary, the GDT is generally not switched (although this may happen if virtual machine monitors like VMware are running on the computer).
History:
The lack of symmetry between both tables is underlined by the fact that the current LDT can be automatically switched on certain events, notably if TSS-based multitasking is used, while this is not possible for the GDT. The LDT also cannot store certain privileged types of memory segments (e.g. TSSes). Finally, the LDT is actually defined by a descriptor inside the GDT, while the GDT is directly defined by a linear address.
History:
Creating shared memory through the GDT has some drawbacks. Notably such memory is visible to every process and with equal rights. In order to restrict visibility and to differentiate the protection of shared memory, for example to only allow read-only access for some processes, one can use separate LDT entries, pointed at the same physical memory areas and only created in the LDTs of processes which have requested access to a given shared memory area.
History:
LDT (and GDT) entries which point to identical memory areas are called aliases. Aliases are also typically created in order to get write access to code segments: an executable selector cannot be used for writing. (Protected mode programs constructed in the so-called tiny memory model, where everything is located in the same memory segment, must use separate selectors for code and data/stack, making both selectors technically "aliases" as well.) In the case of the GDT, aliases are also created in order to get access to system segments like the TSSes.
History:
Segments have a "Present" flag in their descriptors, allowing them to be removed from memory if the need arises. For example, code segments or unmodified data segments can be thrown away, and modified data segments can be swapped out to disk. However, because entire segments need to be operated on as a unit, it is necessary to limit their size in order to ensure that swapping can happen in a timely fashion. However, using smaller, more easily swappable segments means that segment registers must be reloaded more frequently which is itself a time-consuming operation.
History:
Modern usage The Intel 80386 microprocessor introduced paging - allocating separate physical memory pages (themselves very small units of memory) at the same virtual addresses, with the advantage that disk paging is far faster and more efficient than segment swapping. Therefore, modern 32-bit x86 operating systems use the LDT very little, primarily to run legacy 16-bit code.
History:
Should 16-bit code need to run in a 32-bit environment while sharing memory (this happens e.g. when running OS/2 1.x programs on OS/2 2.0 and later), the LDT must be written in such a way that every flat (paged) address has also a selector in the LDT (typically this results in the LDT being filled with 64 KiB entries). This technique is sometimes called LDT tiling. The limited size of the LDT means the virtual flat address space has to be limited to 512 megabytes (8191 times 64 KiB) - this is what happens on OS/2, although this limitation was fixed in version 4.5. It is also necessary to make sure that objects allocated in the 32-bit environment do not cross 64 KiB boundaries; this generates some address space waste.
History:
If 32-bit code does not have to pass arbitrary memory objects to 16-bit code, e.g. presumably in the OS/2 1.x emulation present in Windows NT or in the Windows 3.1 emulation layer, it is not necessary to artificially limit the size of the 32-bit address space. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Low pressure hydrocephalus**
Low pressure hydrocephalus:
Low-pressure hydrocephalus (LPH) is a condition whereby ventricles are enlarged and the individual experiences severe dementia, inability to walk, and incontinence – despite very low intracranial pressure (ICP).Low pressure hydrocephalus appears to be a more acute form of normal pressure hydrocephalus. If not diagnosed in a timely fashion, the individual runs the risk of remaining in the low pressure hydrocephalic state or LPHS. Shunt revisions, even when they are set to drain at a low ICP, are not always effective. The pressure in the brain does not get high enough to allow the cerebrospinal fluid to drain in a shunt system, therefore the shunt is open, but malfunctioning in LPH. In cases of LPH, chronic infarcts can also develop along the corona radiata in response to the tension in the brain as the ventricles increase in size. Certain causes of LPH include trauma, tumor, bleeding, inflammation of the lining of the brain, whole brain radiation, as well as other brain pathology that affects the compliance of the brain parenchyma. One treatment for the LPHS is an external ventricular drain (EVD) set at negative pressures. According to Pang & Altschuler et al., a controlled, steady, negative pressure siphoning with EVD, carefully monitored with partial computer tomography scans is a safe and effective way of treating LPH. In their experience, this approach helps restore the brain mantle. They caution against dropping or raising the pressure of the EVD too quickly as it increases risk and also destabilizes the ventricles. Getting the ventricles smaller, is the initial step, stabilising them is the second step before placing a shunt – which is the final step in therapy. Any variation from this formula can lead to an ineffective, yet patent shunt system, despite a low-pressure setting. Care should be taken with EVD therapy, as mismanagement of the EVD can lead to long-term permanent complications and brain injury. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Loop invariant**
Loop invariant:
In computer science, a loop invariant is a property of a program loop that is true before (and after) each iteration. It is a logical assertion, sometimes checked with a code assertion. Knowing its invariant(s) is essential in understanding the effect of a loop.
In formal program verification, particularly the Floyd-Hoare approach, loop invariants are expressed by formal predicate logic and used to prove properties of loops and by extension algorithms that employ loops (usually correctness properties).
The loop invariants will be true on entry into a loop and following each iteration, so that on exit from the loop both the loop invariants and the loop termination condition can be guaranteed.
Loop invariant:
From a programming methodology viewpoint, the loop invariant can be viewed as a more abstract specification of the loop, which characterizes the deeper purpose of the loop beyond the details of this implementation. A survey article covers fundamental algorithms from many areas of computer science (searching, sorting, optimization, arithmetic etc.), characterizing each of them from the viewpoint of its invariant.
Loop invariant:
Because of the similarity of loops and recursive programs, proving partial correctness of loops with invariants is very similar to proving the correctness of recursive programs via induction. In fact, the loop invariant is often the same as the inductive hypothesis to be proved for a recursive program equivalent to a given loop.
Informal example:
The following C subroutine max() returns the maximum value in its argument array a[], provided its length n is at least 1.
Comments are provided at lines 3, 6, 9, 11, and 13. Each comment makes an assertion about the values of one or more variables at that stage of the function.
The highlighted assertions within the loop body, at the beginning and end of the loop (lines 6 and 11), are exactly the same. They thus describe an invariant property of the loop.
When line 13 is reached, this invariant still holds, and it is known that the loop condition i!=n from line 5 has become false. Both properties together imply that m equals the maximum value in a[0...n-1], that is, that the correct value is returned from line 14.
Informal example:
Following a defensive programming paradigm, the loop condition i!=n in line 5 should better be modified to i<n, in order to avoid endless looping for illegitimate negative values of n. While this change in code intuitively shouldn't make a difference, the reasoning leading to its correctness becomes somewhat more complicated, since then only i>=n is known in line 13. In order to obtain that also i<=n holds, that condition has to be included into the loop invariant. It is easy to see that i<=n, too, is an invariant of the loop, since i<n in line 6 can be obtained from the (modified) loop condition in line 5, and hence i<=n holds in line 11 after i has been incremented in line 10. However, when loop invariants have to be manually provided for formal program verification, such intuitively too obvious properties like i<=n are often overlooked.
Floyd–Hoare logic:
In Floyd–Hoare logic, the partial correctness of a while loop is governed by the following rule of inference: {C∧I}body{I}{I}while(C)body{¬C∧I} This means: If some property I is preserved by the code body —more precisely, if I holds after the execution of body whenever both C and I held beforehand— (upper line) then C and I are guaranteed to be false and true, respectively, after the execution of the whole loop while(C)body , provided I was true before the loop (lower line).In other words: The rule above is a deductive step that has as its premise the Hoare triple {C∧I}body{I} . This triple is actually a relation on machine states. It holds whenever starting from a state in which the boolean expression C∧I is true and successfully executing some code called body , the machine ends up in a state in which I is true. If this relation can be proven, the rule then allows us to conclude that successful execution of the program while(C)body will lead from a state in which I is true to a state in which ¬C∧I holds. The boolean formula I in this rule is called a loop invariant.
Floyd–Hoare logic:
With some variations in the notation used, and with the premise that the loop halts, this rule is also known as the Invariant Relation Theorem. As one 1970s textbook presents it in a way meant to be accessible to student programmers:Let the notation P { seq } Q mean that if P is true before the sequence of statements seq run, then Q is true after it. Then the invariant relation theorem holds that P & c { seq } P implies P { DO WHILE (c); seq END; } P & ¬c Example The following example illustrates how this rule works. Consider the program while (x < 10) x := x+1; One can then prove the following Hoare triple: 10 10 := 10 } The condition C of the while loop is 10 . A useful loop invariant I has to be guessed; it will turn out that 10 is appropriate. Under these assumptions it is possible to prove the following Hoare triple: 10 10 := 10 } While this triple can be derived formally from the rules of Floyd-Hoare logic governing assignment, it is also intuitively justified: Computation starts in a state where 10 10 is true, which means simply that 10 is true. The computation adds 1 to x, which means that 10 is still true (for integer x).
Floyd–Hoare logic:
Under this premise, the rule for while loops permits the following conclusion: 10 10 := 10 10 } However, the post-condition 10 10 (x is less than or equal to 10, but it is not less than 10) is logically equivalent to 10 , which is what we wanted to show.
The property 0≤x is another invariant of the example loop, and the trivial property true is another one.
Applying the above inference rule to the former invariant yields 10 := 10 ≤x} Applying it to invariant true yields 10 := 10 ≤x} , which is slightly more expressive.
Programming language support:
Eiffel The Eiffel programming language provides native support for loop invariants. A loop invariant is expressed with the same syntax used for a class invariant. In the sample below, the loop invariant expression x <= 10 must be true following the loop initialization, and after each execution of the loop body; this is checked at runtime.
Programming language support:
Whiley The Whiley programming language also provides first-class support for loop invariants. Loop invariants are expressed using one or more where clauses, as the following illustrates: The max() function determines the largest element in an integer array. For this to be defined, the array must contain at least one element. The postconditions of max() require that the returned value is: (1) not smaller than any element; and, (2) that it matches at least one element. The loop invariant is defined inductively through two where clauses, each of which corresponds to a clause in the postcondition. The fundamental difference is that each clause of the loop invariant identifies the result as being correct up to the current element i, whilst the postconditions identify the result as being correct for all elements.
Use of loop invariants:
A loop invariant can serve one of the following purposes: purely documentary to be checked within in the code, e.g. by an assertion call to be verified based on the Floyd-Hoare approachFor 1., a natural language comment (like // m equals the maximum value in a[0...i-1] in the above example) is sufficient.
Use of loop invariants:
For 2., programming language support is required, such as the C library assert.h, or the above-shown invariant clause in Eiffel. Often, run-time checking can be switched on (for debugging runs) and off (for production runs) by a compiler or a runtime option.For 3., some tools exist to support mathematical proofs, usually based on the above-shown Floyd–Hoare rule, that a given loop code in fact satisfies a given (set of) loop invariant(s).
Use of loop invariants:
The technique of abstract interpretation can be used to detect loop invariant of given code automatically. However, this approach is limited to very simple invariants (such as 0<=i && i<=n && i%2==0).
Distinction from loop-invariant code:
Loop-invariant code consists of statements or expressions that can be moved outside a loop body without affecting the program semantics. Such transformations, called loop-invariant code motion, are performed by some compilers to optimize programs.
Distinction from loop-invariant code:
A loop-invariant code example (in the C programming language) is where the calculations x = y+z and x*x can be moved before the loop, resulting in an equivalent, but faster, program: In contrast, e.g. the property 0<=i && i<=n is a loop invariant for both the original and the optimized program, but is not part of the code, hence it doesn't make sense to speak of "moving it out of the loop".
Distinction from loop-invariant code:
Loop-invariant code may induce a corresponding loop-invariant property. For the above example, the easiest way to see it is to consider a program where the loop invariant code is computed both before and within the loop: A loop-invariant property of this code is (x1==x2 && t1==x2*x2) || i==0, indicating that the values computed before the loop agree with those computed within (except before the first iteration). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**One Planet One Future**
One Planet One Future:
One Planet One Future is a US public charity, based in New York and Milan, Italy. The Foundation was established in 2016 by artist and film director Anne de Carbuccia. The aim is to draw attention to human-caused threats to the planet, to the environmental crisis and the dangers of the Anthropocene through art, culture and scientific information.
Origins and development:
Anne de Carbuccia began conceptualizing One Planet One Future on a filming expedition to Antarctica in 2013.The concept first came to life through a series of photos where she had the idea of creating the TimeShrines, installations staged in symbolically significant environments incorporating organic elements and found objects, each carefully chosen for its symbolic meaning. The TimeShrines are symbols pointing to the transient nature of human existence and the resilience of the earth.She created her first time shrine installation at Lake Powell, and since then she has travelled all over the world producing more than one hundred images for her artistic project One Planet One FutureIn 2016 the project evolved with a Public Foundation in the USA and in 2018 an Association in Italy. The Foundation harnesses the universal language of art to raise awareness and inspire individual and collective actions, to finally shift our perspectives.
Educational project:
The Foundation launched an educational project in 2016. Founded on the conviction that, education is fundamental to address the environmental crisis and the rights of the future Generation; and that they need to start now to play a key role in devising solutions to protect and save our planet. The learning experience interests students from kindergarten through college. The project is free of charge.Now that educational resources are more important than ever, we are expanding our digital content with our Lessons for the Planet. Through Anne's images, the lessons recount the key themes of the Anthropocene: Water, Drought, Climate Refugees, War, Trash, Endangered Species and Cultures, as well as the infinite possibilities of a positive Anthropocene: Wonder, Hope, Protection, Action, Love. Through her stories, they also address certain educational themes that are becoming increasingly relevant for the school of the future: urban responsibility and the importance of choice, the connections and interconnections between events and between us and the Planet. Lessons in English and Italian. For extra materials and webinars: https://oneplanetonefuture.org/education
Exhibitions:
Latest exhibitions: Florence, Brun Fine Art - Palazzo Larderel - One Planet One Future - Jun 11 to Jun 30, 2019 London, Brun Fine Art - One Planet One Future - Sep 28 to Nov 15, 2018 Naples, Castel dell'Ovo - One Planet One Future – Jun 23 to Sept 30, 2018 Moscow, Museum of Modern Art – One Planet One Future – Jun 21 to Sept 10, 2017 Milano, Ventura Lambrate – One Planet One Future – Mar 30 to Apr 12, 2017 New York, Westbeth Art Foundation – One Planet One Future – Sep 16 to Nov 21, 2016 Monaco, Museum of Oceanography – Water at Dusk – Jan 30 to Feb 29, 2016Permanent Art Centers: Milan, Via Conte Rosso 8, 20134 Milan, Italy- Opening in September 2017 | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Polynesian paralysis**
Polynesian paralysis:
Polynesian paralysis is a term describing the relaxed lifestyle in the Hawaiian islands and the spirit of aloha reflecting the love of the Hawaiian people. Far away from the haste, anxiety, and impatience that makes the rest of the world stressed and frantic, people in Hawaii live life a little slower and believe that they will get to where they need to go and do what needs to be done in good time. Visitors to the Hawaiian islands can fall in love with this more relaxed state of life and feel the effects of "Polynesian paralysis".
Polynesian paralysis:
Time magazine published an article in 1966 that describes Polynesian paralysis as a "pleasant affliction" because "everything in Hawaii seems to be soft and warm—the air, the ocean, the sand, the music and the people." Polynesian paralysis involves the ability to simply be still and listen to your heartbeat, to stop and observe a beautiful rainbow or to watch the whales dance with the ocean. Polynesian paralysis results in making observation, appreciation and relaxation a priority instead of getting to a destination on time.
Polynesian paralysis:
Fashion model Marie Helvin was raised in Hawaii and she experienced Polynesian paralysis in the 1960s as feeling isolated on an island in the middle of the Pacific. She and others often wondered "When are we going to get off this rock?" The Honolulu Weekly published an article in 1991 by journalist Derek Davies which describes Polynesian paralysis as equivalent to falling beneath the spell of aloha or suffused with general bonhomie toward others.
Forms of Polynesian paralysis:
Polynesian paralysis in Hawaii The Honolulu Star Bulletin describes Robert C. Schmitt as a prolific author and "Distinguished Historian". Between 1949 and 1995, Schmitt authored more than 200 professional articles and wrote several books, including 17 articles in the Hawaii Medical Journal (now the Hawaiʻi Journal of Health & Social Welfare). In the November 1995 issue of the Hawaii Medical Journal, he relates Polynesin paralysis to "lotus-eating". A "lotus eater" generally refers to a person who leads a life of dreamy, indolent ease, indifferent to the busy world or a daydreamer. Schmitt concludes his article noting that life expectancy in Hawaii is the highest of any of the 50 states. In a recent article by Travel and Leisure, the author states that Hawaii continues to have the longest life expectancy in America and is considered one of the healthiest states in the USA. The Travel and Leisure article references a study published in the Journal of the American Medical Association (JAMA) that found the average life expectancy for a Hawaiian from birth is the longest in the country. Hawaiians also have one of the lowest rates of depression in the country as well.There is no reference to Polynesian paralysis on the Center for Disease Control (CDC) website because Polynesian paralysis is not a disease or medical condition. Polynesian paralysis is usually referred to a mental state with symptoms of happiness, relaxation, euphoria, and a deep sense of meaning and contentment.
Forms of Polynesian paralysis:
Polynesian paralysis music Andy Yamashita writes in The Daily that the University of Washington Husky Marching Band play a rousing rendition of “Polynesian Paralysis.” A YouTube video posted on September 19, 2019, shows the band performing "Polynesian Paralysis".In 2011 the Coconut Boat Band released their third album, Sunsetted, which included a song titled "Polynesian Paralysis" . The lyrics of this song describes a person with Polynesian Paralysis as someone who might be sitting by the ocean in a lounge chair in perfect bliss watching the sunset.
Forms of Polynesian paralysis:
Polynesian paralysis pills In 2021, Rx Aloha in Kahului, Hawaii began to market sugar candy pills as Polynesian Paralysis Pills (tm). These pills have no chemicals or medicinal ingredients, but are recommended to be taken twice daily to get a daily dose of aloha. RX Aloha also uses "Less Stress . . . More Aloha" (tm) and "Get Your Daily Dose Of Aloha" (tm) in their marking campaigns.
Forms of Polynesian paralysis:
Polynesian paralysis drinks There are several cocktail drinks called Polynesian paralysis. Most contain rum or the ancient Hawaiian alcohol okolehao. Jeff "Beachbum" Berry is a mixologist who has invented and published many of his own cocktail recipes over the years. One of his signature drinks is called the Polynesian paralysis and includes 3 oz. okolehao, 3 oz. orange juice, 3 oz. unsweetened pineapple juice, and 3/4 oz. lemon juice along with orgeat syrup and other sweeteners blended with crushed ice. In his book, Waikiki Beachnik, author H. Allen Smith describes the symptoms of Polynesian paralysis as "a screaming desire not to work or do anything that requires any physical or mental efforts" Polynesian paralysis food Da Kitchen was established in 1998 in Maui and serves creative diverse cuisine with an emphasis on traditional Hawaiian foods. Da Kitchen has been featured on the Travel Channel Bizarre Food Show, Man vs. Food, and The Food Network Diners. Da Kitchen has 2 locations in Maui in both Kihei and Kahului. Da Kitchen serves a local Hawaiian dish called Polynesian Paralysis which contains fish tempura, kaula pork, two eggs, onions and mushrooms with brown gravy over fried rice. One review on YELP stated "Polynesian paralysis moco - now this.....was soooo good. Like omg good, the kalua pork was smoky and flavorful, the fish tempura was crunchy and the fish was soft, the pork fried rice was perfect, eggs, gravy, onions, everything!!! … I think this is better than the Notorious BIG Moco. This one has better and unique flavors." | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Common Lisp Object System**
Common Lisp Object System:
The Common Lisp Object System (CLOS) is the facility for object-oriented programming which is part of ANSI Common Lisp. CLOS is a powerful dynamic object system which differs radically from the OOP facilities found in more static languages such as C++ or Java. CLOS was inspired by earlier Lisp object systems such as MIT Flavors and CommonLoops, although it is more general than either. Originally proposed as an add-on, CLOS was adopted as part of the ANSI standard for Common Lisp and has been adapted into other Lisp dialects such as EuLisp or Emacs Lisp.
Features:
The basic building blocks of CLOS are methods, classes, instances of those classes, and generic functions.
CLOS provides macros to define those: defclass, defmethod, and defgeneric. Instances are created with the method make-instance.
Features:
Classes can have multiple superclasses, a list of slots (member variables in C++/Java parlance) and a special metaclass. Slots can be allocated by class (all instances of a class share the slot) or by instance. Each slot has a name and the value of a slot can be accessed by that name using the function slot-value. Additionally special generic functions can be defined to write or read values of slots. Each slot in a CLOS class must have a unique name.
Features:
CLOS is a multiple dispatch system. This means that methods can be specialized upon any or all of their required arguments. Most OO languages are single-dispatch, meaning that methods are only specialized on the first argument. Another unusual feature is that methods do not "belong" to classes; classes do not provide a namespace for generic functions or methods. Methods are defined separately from classes, and they have no special access (e.g. "this", "self", or "protected") to class slots.
Features:
Methods in CLOS are grouped into generic functions. A generic function is an object which is callable like a function and which associates a collection of methods with a shared name and argument structure, each specialized for different arguments. Since Common Lisp provides non-CLOS classes for structures and built-in data types (numbers, strings, characters, symbols, ...), CLOS dispatch works also with these non-CLOS classes. CLOS also supports dispatch over individual objects (eql specializers). CLOS does not by default support dispatch over all Common Lisp data types (for example dispatch does not work for fully specialized array types or for types introduced by deftype). However, most Common Lisp implementations provide a metaobject protocol which allows generic functions to provide application specific specialization and dispatch rules.
Features:
Dispatch in CLOS is also different from most OO languages: Given a list of arguments, a list of applicable methods is determined.
This list is sorted according to the specificity of their parameter specializers.
Selected methods from this list are then combined into an effective method using the method combination used by the generic function.
The effective method is then called with the original arguments.This dispatch mechanism works at runtime. Adding or removing methods thus may lead to changed effective methods (even when the generic function is called with the same arguments) at runtime. Changing the method combination also may lead to different effective methods.
Features:
For example, Like the OO systems in most dynamic languages, CLOS does not enforce encapsulation. Any slot can be accessed using the slot-value function or via (optionally auto-generated) accessor methods. To access it via slot-value you have to know the name of the slot. CL programmers use the language's package facility to declare which functions or data structures are intended for export.
Features:
Apart from normal ("primary") methods, there also are :before, :after, and :around "auxiliary" methods. The former two are invoked prior to, or after the primary method, in a particular order based on the class hierarchy. An :around method can control whether the primary method is executed at all. Additionally, the programmer can specify whether all possible primary methods along the class hierarchy should be called or just the one providing the closest match.
Features:
The Standard Method-Combination provides the primary, before, after and around methods explained above. There are other Method-Combinations with other method types. New (both simple and complex) Method-Combinations and method types can be defined.
CLOS allows multiple inheritance. When the default order in which methods are executed in multiple inheritance is not correct, the programmer may resolve the diamond inheritance problems by specifying the order of method combinations.
Features:
CLOS is dynamic, meaning that not only the contents, but also the structure of its objects can be modified at runtime. CLOS supports changing class definitions on-the-fly (even when instances of the class in question already exist) as well as changing the class membership of a given instance through the change-class operator. CLOS also allows one to add, redefine and remove methods at runtime. The Circle-Ellipse Problem is readily solved in CLOS, and most OOP design patterns either disappear or are qualitatively simpler.CLOS is not a prototype language: classes must be defined before objects can be instantiated as members of that class.
Metaobject Protocol:
Outside of the ANSI Common Lisp standard, there is a widely implemented extension to CLOS called the Metaobject Protocol (MOP). The MOP defines a standard interface to the underpinnings of the CLOS implementation, treating classes, slot-descriptions, generic-functions and methods themselves as instances of metaclasses, and allows the definition of new metaclasses and the modification of all CLOS behavior. The flexibility of the CLOS MOP prefigures aspect-oriented programming, which was later developed by some of the same engineers, such as Gregor Kiczales. The MOP defines the behavior of the whole object system by a set of protocols. These are defined in terms of CLOS. Thus it is possible to create new object-systems by extending or changing the provided CLOS functionality. The book The Art of the Metaobject Protocol describes the use and implementation of the CLOS MOP.
Metaobject Protocol:
The various Common Lisp implementations have slightly different support for the Meta-Object Protocol. The Closer project aims to provide the missing features.
Influences from older Lisp-based object systems:
Flavors (and its successor New Flavors) was the object system on the MIT Lisp Machine. Large parts of the Lisp Machine operating systems and many applications for it use Flavors or New Flavors. Flavors introduced multiple inheritance and mixins, among other features. Flavors is mostly obsolete, though implementations for Common Lisp do exist. Flavors was using the message passing paradigm. New Flavors introduced generic functions.
Influences from older Lisp-based object systems:
CommonLoops was the successor of LOOPS (from Xerox Interlisp-D). CommonLoops was implemented for Common Lisp. A portable implementation called Portable CommonLoops (PCL) was the first implementation of CLOS. PCL is widely ported and still provides the base for the CLOS implementation of several Common Lisp implementations. PCL is implemented mostly in portable Common Lisp with only a few system dependent parts.
CLOS in other programming languages:
Because of the power and expressivity of CLOS, as well as the historical availability of Tiny CLOS (a simplified portable CLOS implementation written by Gregor Kiczales for use with Scheme), CLOS-like MOP-based object systems have become the de facto norm in most Lisp dialect implementations, as well as finding their way into some other languages' OOP facilities: COS, the C Object System Dylan Dynace, a (largely) CLOS implementation in C EIEIO for Emacs Lisp Gauche, Scheme with CLOS GOOPS in GNU Guile ILOS in ISLISP Meroon, an Object System in Scheme Sagittarius, a Scheme with CLOS ScmObj, for Scheme SOS for MIT Scheme STklos, a Scheme with CLOS Swindle in Racket COOPS in Chicken Scheme VCLOS for Skill Tiny CLOS
Literature:
Sonya Keene, Object-Oriented Programming in Common Lisp: A Programmer's Guide to CLOS, 1988, Addison-Wesley. ISBN 0-201-17589-4 Gregor Kiczales, Jim des Rivieres, and Daniel G. Bobrow, The Art of the Metaobject Protocol, 1991, MIT Press. ISBN 0-262-61074-4 Jo A. Lawless and Molly M. Miller, Understanding CLOS: the Common Lisp Object System, 1991, Digital Press, ISBN 1-55558-064-5 Andreas Paepcke, Object-Oriented Programming: the CLOS Perspective, 1993, The MIT Press. ISBN 0-262-16136-2 The Common Lisp Object System: An Overview by Richard P. Gabriel and Linda DeMichiel provides a good introduction to the motivation for defining classes by means of generic functions.
Literature:
Fundamentals of CLOS by Nick Levine provides a step-by-step exposure to the implementation of OO concepts in CLOS, and how to utilize them. It is intended for anybody with a basic knowledge of Lisp or Scheme.
Common Lisp HyperSpec, Chapter 7: Objects | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Binocular summation**
Binocular summation:
Binocular summation refers to the improved visual performance of binocular vision compared to that of monocular vision. The most vital benefit of binocular vision is stereopsis or depth perception, however binocular summation does afford some subtle advantages as well. By combining the information received in each eye, binocular summation can improve visual acuity, contrast sensitivity, flicker perception, and brightness perception. Though binocular summation generally enhances binocular vision, it can worsen binocular vision relative to monocular vision under certain conditions. Binocular summation decreases with age and when large interocular differences are present.
Visual improvements:
Some of the ways in which binocular summation improves binocular visual performance are Brightness perception. The binocularly perceived brightness is larger than the brightness seen by each individual eye. This helps with detection of dim lights and also provoke pupil to decrease its size, which improves focusing.
Visual improvements:
Flicker perception. Binocular summation can increase the critical flicker fusion rate (CFF) which is the highest perceivable flicker rate before the image appears continuous. The CFF is increased when both eyes see the same flicker, and it is decreased when the flicker for one eye is out of phase with the other. Binocular summation also increases the perceived brightness of the flicker when both inputs are in phase.
Visual improvements:
Contrast sensitivity.
Visual acuity.A practical measure of binocularity is the binocular summation ratio BSR, which is the ratio of binocular contrast sensitivity to the contrast sensitivity of the better eye.
BSR=CSbinocular/CSbettereye
Models for binocular brightness:
One might expect the inputs from each eye to simply add together, and that the perceived brightness with two eyes is twice that of a single eye. However, the perceived brightness with two eyes is only slightly higher compared to a single eye. If one eye sees a bright scene, the perceived brightness will actually decrease if the other eye is presented with a dim light. This counterintuitive phenomenon is known as Fechner's Paradox. Several different models have been proposed to explain how the inputs from each eye are combined.
Models for binocular brightness:
The renowned physicist Erwin Schrödinger, known for his contributions to quantum theory, had a fascination for psychology and he explored topics related to color perception. Schrödinger (1926) put forth an equation for binocular brightness and contrast combination where each monocular input is weighted by the ratio of the signal strength from that eye to the sum of the signal from both eyes. The inputs fl and fl are monocular brightness flux signals. This equation can be thought of as the sum of the lengths of two vectors.
Models for binocular brightness:
B=flflfl+fr+frfrfl+fr=fl2+fr2fl+fr MacLeod (1972) expanded upon Schrödinger's work by proposing the following formula for the signal strength of a neural signal f in terms of internal noise f0 , luminance difference across the contour l , and threshold luminance difference l0 log if if l<l0
Process:
It is still uncertain exactly how this process is performed by the brain and remains an active area of research. The mechanism can be explained by some combination of probability summation, neural summation, and effects due to binocular-monocular differences in pupil size, accommodation, fixation, and rivalry. Probability summation comes from the principle that there is a greater chance of detecting a visual stimulus with two eyes than with one eye.
Process:
There are five possible results when the input stimuli are summed together. These are Binocular facilitation. The summation is more than twice that of a single input.
Complete binocular summation. The summation is exactly twice that of a single input.
Partial binocular summation. The summation is greater than that of a single input, but less than twice as large.
No binocular summation. The summation is the same as a single input.
Binocular inhibition. The summation is lower than worse than a single input.
Binocular Fusion:
Both motor fusion and sensory fusion mechanisms are used to combine the two images into a single perceived image. Motor fusion describes the vergence eye movements that rotate the eyes about the vertical axis. Sensory fusion is the psychological process of the visual system that creates a single image perceived by the brain. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Enterprise social graph**
Enterprise social graph:
An enterprise social graph is a representation of the extended social network of a business, encompassing relationships among its employees, vendors, partners, customers, and the public. With the advent of Web 2.0 and Enterprise 2.0 technologies a company can monitor and act on these relationships in real-time. Given the number of relationships and the volume of associated data, algorithmic approaches are used to focus attention on changes that are deemed relevant.
Origin:
The term was first popularized in a 2010 Forbes article, to describe the multi-relational nature of enterprise-centric networks that are now at least partially observable at scale. The enterprise social graph integrates representations of the various social networks in which the enterprise is embedded into a unified graph representation. Given the online context of many of the relationships, social interactions often comprise direct communication along with interactions around digital artifacts. Therefore, the enterprise social graph codifies not only relationships among individuals but also individual-object interaction patterns. This definition follows Facebook's and Google's concept of a social graph that explicitly includes the objects with which individuals interact in a network.Examples of these relationship patterns can include authorship, sharing or sending information, management or other social hierarchy, bookmarking, and other gestural signals that describe a relationship between two or more nodes. Additional representational challenges arise with the need to capture interaction dynamics and their changing social context over time, and as such, representational choices vary based ultimately on the analytic questions that are of interest.
Origin:
Besides being a specialized type of social graph, the enterprise social graph is related to network science and graph theory.
Applications:
Changes in how people connect, share, accomplish tasks through online social networks, combined with the growth of ambient public information relevant to an enterprise, contribute to the dynamism and increasing complexity of enterprise social graphs. Whereas meetings, phone calls, or email have been the traditional media for these exchanges, increasingly collaboration and conversation occurs via online social media. As Kogut and Zander point out, the more tacit knowledge is, the more difficult and expensive it is to transmit, since the costs of codifying and teaching will rise as tacitness increases. The consumerization of social business software enables simpler and more cost-effective ways making relationships and tacit knowledge both observable and actionable.
Applications:
From an internal enterprise perspective, understanding the enterprise social graph can provide greater awareness of internal dynamics, organizational and information flow inefficiencies, information seeking and expert identification, or exposing opportunities for new valued connections. From an external perspective, it can provide deeper insights into marketplace conditions and customer demand, customer issues and concerns, product development and co-creation, supply-side operational awareness or external causal relationships.
Applications:
Recent developments in big data analysis, combined with graph mining techniques, make it possible to analyze petabytes of structured and unstructured information and feed user-facing applications. In making use of the enterprise social graph, such applications excel at search, routing, and matching operations, particularly where these include personalization, statistical analysis and machine learning. Examples of applications that combine big data mining techniques over the enterprise social graph include business intelligence, personalized activity streams and intelligent filtering, social search, recommendation engines, automated question or message routing, expertise identification, and information context discovery. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Transformation semigroup**
Transformation semigroup:
In algebra, a transformation semigroup (or composition semigroup) is a collection of transformations (functions from a set to itself) that is closed under function composition. If it includes the identity function, it is a monoid, called a transformation (or composition) monoid. This is the semigroup analogue of a permutation group.
A transformation semigroup of a set has a tautological semigroup action on that set. Such actions are characterized by being faithful, i.e., if two elements of the semigroup have the same action, then they are equal.
An analogue of Cayley's theorem shows that any semigroup can be realized as a transformation semigroup of some set.
In automata theory, some authors use the term transformation semigroup to refer to a semigroup acting faithfully on a set of "states" different from the semigroup's base set. There is a correspondence between the two notions.
Transformation semigroups and monoids:
A transformation semigroup is a pair (X,S), where X is a set and S is a semigroup of transformations of X. Here a transformation of X is just a function from a subset of X to X, not necessarily invertible, and therefore S is simply a set of transformations of X which is closed under composition of functions. The set of all partial functions on a given base set, X, forms a regular semigroup called the semigroup of all partial transformations (or the partial transformation semigroup on X), typically denoted by PTX .If S includes the identity transformation of X, then it is called a transformation monoid. Obviously any transformation semigroup S determines a transformation monoid M by taking the union of S with the identity transformation. A transformation monoid whose elements are invertible is a permutation group.
Transformation semigroups and monoids:
The set of all transformations of X is a transformation monoid called the full transformation monoid (or semigroup) of X. It is also called the symmetric semigroup of X and is denoted by TX. Thus a transformation semigroup (or monoid) is just a subsemigroup (or submonoid) of the full transformation monoid of X.
If (X,S) is a transformation semigroup then X can be made into a semigroup action of S by evaluation: for s∈S,x∈X.
This is a monoid action if S is a transformation monoid.
The characteristic feature of transformation semigroups, as actions, is that they are faithful, i.e., if for all x∈X, then s = t. Conversely if a semigroup S acts on a set X by T(s,x) = s • x then we can define, for s ∈ S, a transformation Ts of X by Ts(x)=T(s,x).
The map sending s to Ts is injective if and only if (X, T) is faithful, in which case the image of this map is a transformation semigroup isomorphic to S.
Cayley representation:
In group theory, Cayley's theorem asserts that any group G is isomorphic to a subgroup of the symmetric group of G (regarded as a set), so that G is a permutation group. This theorem generalizes straightforwardly to monoids: any monoid M is a transformation monoid of its underlying set, via the action given by left (or right) multiplication. This action is faithful because if ax = bx for all x in M, then by taking x equal to the identity element, we have a = b.
Cayley representation:
For a semigroup S without a (left or right) identity element, we take X to be the underlying set of the monoid corresponding to S to realise S as a transformation semigroup of X. In particular any finite semigroup can be represented as a subsemigroup of transformations of a set X with |X| ≤ |S| + 1, and if S is a monoid, we have the sharper bound |X| ≤ |S|, as in the case of finite groups.: 21 In computer science In computer science, Cayley representations can be applied to improve the asymptotic efficiency of semigroups by reassociating multiple composed multiplications. The action given by left multiplication results in right-associated multiplication, and vice versa for the action given by right multiplication. Despite having the same results for any semigroup, the asymptotic efficiency will differ. Two examples of useful transformation monoids given by an action of left multiplication are the functional variation of the difference list data structure, and the monadic Codensity transformation (a Cayley representation of a monad, which is a monoid in a particular monoidal functor category).
Transformation monoid of an automaton:
Let M be a deterministic automaton with state space S and alphabet A. The words in the free monoid A∗ induce transformations of S giving rise to a monoid morphism from A∗ to the full transformation monoid TS. The image of this morphism is the transformation semigroup of M.: 78 For a regular language, the syntactic monoid is isomorphic to the transformation monoid of the minimal automaton of the language.: 81 | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Wii Menu**
Wii Menu:
The Wii Menu is the graphical shell of the Wii and Wii U game console, as part of the Wii system software. It has four pages, each with a 4:3 grid, and each displaying the current time and date. Available applications, known as "channels", are displayed and can be navigated using the pointer capability of the Wii Remote. The grid is customizable; users can move channels (except for the Disc Channel) among the menu's 48 customizable slots by pressing and holding the B button while hovering over the channel the user wanted to move, then pressing and holding the A button and moving the channel. By pressing the plus and minus buttons on the Wii Remote users can scroll across accessing empty slots.
Pre-installed channels:
Disc Channel The Disc Channel is the primary way to play Wii and GameCube titles from supported Nintendo optical discs inserted into the console.
Pre-installed channels:
If no disc is inserted, the message "Please insert a disc." will be displayed along with images of a template Wii and GameCube disc (the latter is not visible on the Wii Family Edition units, the Wii Mini, and the Wii U due to lack of official GameCube support). The "Start" button will also remain deactivated until a playable disc is inserted.
Pre-installed channels:
When a disc is inserted, the channel preview and banner on the menu will change to the one supplied by the title and the "Start" button will become available. If it is a GameCube disc, the banner and preview will change to the GameCube logo with the GameCube startup theme playing.
Pre-installed channels:
Each Wii game disc includes a system update partition, which includes the latest Wii software from the time the game was released. If a disc that is inserted contains newer software than the one installed on the console, installing the new software will be required to play the game. This allows users without an internet connection to still receive system updates. When loaded into the disc slot, an icon on the Disc Channel that says "Wii System Update" appears. After selecting the channel, the Wii will automatically update. If these updates are not installed, the game will remain unplayable until the update is installed, as each time the channel is loaded with the game inserted, the update prompt will appear, and declining the update will return the player to the Wii Menu instead of starting the game.
Pre-installed channels:
Games requiring a system update can still be played without updating using homebrew software, such as Gecko OS or a USB loader.
Pre-installed channels:
Mii Channel The Mii Channel is an avatar creator, where users can design 3D caricatures of people called Miis by selecting from a group of facial and bodily features. At the Game Developers Conference 2007, Shigeru Miyamoto explained that the look and design of the Mii characters are based on Kokeshi, a form of Japanese doll used as souvenir gifts.
Pre-installed channels:
A Wired interview of Katsuya Eguchi (producer of Animal Crossing and Wii Sports) held in 2006 confirmed that the custom player avatar feature shown at Nintendo's E3 Media Briefing would be included in the hardware. The feature was described as part of a "profile" system that contains the Mii and other pertinent player information. This application was officially unveiled by Nintendo in September 2006. It is incorporated into Wii's operating system interface as the "Mii Channel". Users can select from pre-made Miis or create their own by choosing custom facial shapes, colors, and positioning. In certain games like Wii Sports, Wii Play, Wii Fit, Wii Music, Wii Sports Resort, Wii Party, Wii Fit Plus, Wii Play: Motion, Mario & Sonic at the Olympic Games, WarioWare: Smooth Moves, Mario Kart Wii, Mario Party 8, My Pokémon Ranch, Animal Crossing: City Folk, Big Brain Academy: Wii Degree, Mario Strikers Charged, and Guitar Hero 5, each player's Mii will serve as the character the player controls in some/all forms of gameplay. Miis can interact with other Wii users by showing up on their Wii consoles through the WiiConnect24 feature or by talking with other Miis created by Wii owners all over the world. This feature is called Mii Parade. Early-created Miis as well as those encountered in Mii Parades may show up as spectators in some games. Miis can be stored on Wii Remotes and taken to other Wii consoles. The Wii Remote can hold a maximum of 10 Miis.
Pre-installed channels:
In addition, Mii characters can be transferred from a user's Wii to Nintendo 3DS consoles, as well as supported Nintendo DS games via the Mii Channel. While in the channel, pressing A, followed by B, then 1, and holding 2 on the Wii Remote allows the user to unlock the feature. The Mii Channel is succeeded by the Mii Maker app for both Nintendo 3DS and Wii U, and the Mii options in Settings for Nintendo Switch.
Pre-installed channels:
According to Nintendo president Satoru Iwata, over 160 million Mii characters had been created using the Mii Channel as of May 2010.
Pre-installed channels:
Photo Channel If a user inserts an SD card into the console, or receives photos (JPEG) or videos (MJPEG) via email, they can be viewed using the Photo Channel. The user can create a slideshow simply by inserting an SD card with photos and, optionally, MP3 or AAC files (see note regarding December 10, 2007 update to version 1.1). The Wii will automatically add Ken Burns Effect transitions between the photos and play either the music on the SD card or built-in music in the background. A built-in editor allows users to add markings and effects to their photos or videos (The edits float statically above the videos). Mosaics can also be created with this feature. Puzzles can be created from photos or videos with varying degrees of difficulty (However, your first puzzle will be six-pieces) with 6, 12, 24 and 48 piece puzzles available, with 192 selectable while holding down 1 on the Wii Remote. Edited photos can be saved to the Wii and sent to other Wiis via the message board. According to the system's manual, the following file extensions (i.e. formats) are supported: Photos (jpeg/jpg), Movies (mov/avi), and Music (mp3/aac).
Pre-installed channels:
JPEG files can be up to 8192x8192 resolution and in baseline format. Video data contained within the .mov or .avi files must be in an OpenDML-compliant MotionJPEG and use some variant of this format for their videos, with a resolution of up to 848×480 pixels (Wide VGA). Photos, even high resolution ones, are compressed and decreased in resolution.
Pre-installed channels:
Photo Channel 1.1 Photo Channel 1.1 is an optional update to the Photo Channel that became available on the Wii Shop Channel on December 10, 2007. It allows users to customize the Photo Channel icon on the Wii Menu with photos from an SD Card or the Wii Message Board. It also allows playback of songs in random order. The update replaced MP3 support with support for MPEG-4 encoded audio files encoded with AAC in the .m4a extension.Wii owners who updated to version 1.1 can revert to version 1.0 by deleting it from the channels menu in the data management setup. Consoles released after December 10, 2007 come with the version 1.1 update pre-installed, and cannot be downgraded to version 1.0.
Pre-installed channels:
Owners of Japanese systems can download a "Revert to Photo Channel 1.0" Channel from the Wii Shop Channel if they wish to do so.
Pre-installed channels:
Wii Shop Channel The Wii Shop Channel allowed users to download games and other software by redeeming Wii Points, which could be obtained by purchasing Nintendo Points cards from retail outlets or directly through the Wii Shop Channel using MasterCard or Visa credit cards online. Users could browse in the Virtual Console, WiiWare, or Wii Channels sections for downloads. A feature to purchase downloaded software as gifts for others became available worldwide on December 10, 2007. Additional channels that were not released at the console's launch were available for purchase in the Wii Shop Channel. These included: Internet Channel, Everybody Votes Channel, Check Mii Out Channel, Nintendo Channel, Netflix Channel, and the Japan-only Television Friend Channel. Until the channel's shut down on January 30, 2019, all downloadable channels were free of charge. The name was originally going to be called the Shopping Channel.
Pre-installed channels:
Nintendo discontinued the Wii Shop Channel on January 30, 2019 (having announced that they planned to do so on September 29, 2017), with the purchase of Wii Points ending on March 26, 2018. The ability to redownload previously purchased content and/or transfer Wii data from the Wii to the Wii U still remains available.
Pre-installed channels:
Forecast Channel The Forecast Channel allowed weather reports and forecasts provided by Weathernews to be shown on the console from the Internet via the WiiConnect24 service. The Forecast Channel displayed a view of the Earth as a globe (courtesy of NASA's The Blue Marble image), with which users can view weather in other regions. The user could also spin the globe. When fully zoomed out, an accurate star map was visible in the background. (The Big Dipper and the constellation Orion were easily recognizable, for example.) The Forecast Channel features included the current forecast, the UV index, today's overall forecast, tomorrow's forecast, a 5-day forecast (only for the selected country in which the user lives), a laundry check (Japan Only) and pollen count (Japan only). The Forecast Channel first became available on December 19, 2006. Certain games like Madden NFL 07, Nights: Journey of Dreams, and Mario & Sonic at the Olympic Winter Games could use the Forecast Channel to simulate weather conditions depending on the player's region.There are slight variations of Forecast Channel versions in different regions. When viewing weather conditions in Japan, a different set of weather icons is used. Additionally, the laundry index was only featured in the Japanese version.After the August 6, 2007 update, the Forecast Channel showed the icon for the current weather on the Wii Menu.
Pre-installed channels:
Long neglect of this channel would result in the icon not appearing, although the set time was longer than that of the News Channel.
The Forecast Channel (along with the News Channel) was not available in South Korea.Like the four other Wii channels (News Channel, Everybody Votes Channel, Check Mii Out Channel/Mii Contest Channel, Nintendo Channel), the Forecast Channel ended its seven-year support on June 27, 2013.
Pre-installed channels:
News Channel The News Channel allowed users to access news headlines and current news events obtained from the Internet. News articles were available on a globe view, allowing users to view news from certain areas of the world (similar to the Forecast Channel), and as a slide show. The content was automatically updated and viewable via WiiConnect24 with clickable news images supported. The channel contained seven categories: National News, International News, Sports, Arts/Entertainment, Business, Technology and Oddities.
Pre-installed channels:
The News Channel became available in North America, Europe, and Australia on January 26, 2007. Content was in a variety of languages provided by the Associated Press, who had a two-year contract to provide news and photos to Nintendo. Canadian news was submitted by the Canadian Press for publication. Japanese news was provided by Goo. European news was provided by Agence France-Presse.
Pre-installed channels:
Starting with the August 6, 2007 update, the News Channel showed a news ticker in the Wii Menu, and when selecting the channel. However, not visiting the channel for a period of time resulted in the ticker not appearing, instead displaying "You must use the News Channel regularly for news to be displayed on this screen." on the preview screen until the channel was opened up. A December 20, 2007 PAL region update increased the number of news feeds to the channel, sourced from a larger number of news resources and agencies, providing more news that were available per country.The News Channel (along with the Forecast Channel) was not available in South Korea.Like the four other Wii channels (Forecast Channel, Everybody Votes Channel, Mii Contest Channel, Nintendo Channel), the News Channel ended its seven-year support on June 27, 2013.
Pre-installed channels:
Get Connected Video Channel The Get Connected Video Channel or Wii & the Internet Channel (or alternatively known as the Wii + Internet Channel or Wii: See What You Can Do On the Internet) is pre-installed onto Wii console units manufactured in October 2008 or later. It contains an informational video specifying the benefits of connecting the Wii console to the Internet, such as downloading extra channels, new software, Virtual Console titles, and playing games over Nintendo Wi-Fi Connection.
Pre-installed channels:
The Get Connected Video Channel is the only pre-installed channel that takes up spare internal memory, and the only channel that can be manually deleted or moved to an SD Card by the user. The channel takes up 1,180 blocks of memory, which is over half the Wii's internal memory space. The large size of this channel is likely due to the fact it is available in multiple languages; three videos in the U.S. versions, and six videos in the PAL versions. Upon connecting to the Internet and running the channel, the user will be asked if they would like to delete it. It cannot be re-downloaded or restored upon deletion.The same video presentation contained in the channel can also be viewed on an archived version of Nintendo's official website. Furthermore, several gaming stores such as GameStop had this channel in their Wii stations.
Pre-installed channels:
The channel is also available in multiple languages. Unlike the other channels, the video in the channel is not translated digitally, but is presented in multiple dubs, which means there are multiple copies of the same video in a single channel. The language of the video is presented is respectively according to the Wii's language setting. Available languages are English, French, and Spanish in the U.S. versions; and English, French, Spanish, German, Italian, and Dutch in the PAL version. The availability of multiple dubs is a likely factor that contributes to the large size of the channel.
Pre-installed channels:
Internet Channel The Internet Channel is a version of the Opera web browser for use on the Wii by Opera Software and Nintendo. On December 22, 2006 a free demo version (promoted as "Internet Channel: Trial Version") of the browser was released. The final version (promoted as "Internet Channel: Final Version") of the browser was released on April 11, 2007 and was free to download until June 30, 2007. After this deadline had passed, the Internet Channel cost 500 Wii Points to download until September 1, 2009, though users who downloaded the browser before June 30, 2007, could continue to use it at no cost for the lifetime of the Wii system. An update (promoted as the "Internet Channel") on October 10, 2007 added USB keyboard compatibility. On September 1, 2009 the Internet Channel was made available to Wii owners for no cost of Wii Points and updated to include improved Adobe Flash Player support. A refund was issued to those who paid for the channel in the form of one free NES game download worth 500 Wii Points.
Pre-installed channels:
The Internet Channel uses whichever connection is chosen in the Wii settings, and utilizes the user's internet connection directly; there is no third party network that traffic is being routed through. It receives a connection from a router/modem and uses a web browser to pull up HTTP and HTTPS (secure and encrypted) web pages. Opera, the Wii's web browser, is capable of rendering most web sites in the same manner as its desktop counterpart by using Opera's Medium Screen Rendering technology. For most Internet users, the Wii offers all of the functionality they need to perform the most common Internet tasks.
Pre-installed channels:
The software is saved to the Wii's 512 MB internal flash memory (it can be copied to an SD card after it has been downloaded). The temporary Internet files (maximum of 5MB for the trial version) can only be saved to the Wii's internal memory. The application launches within a few seconds, after connecting to the Internet through a wireless LAN using the built-in interface or a wired LAN by using the USB to the Ethernet adapter.
Pre-installed channels:
The Opera-based Wii browser allows users full access to the Internet and supports all the same web standards that are included in the desktop versions of Opera, including CSS and JavaScript. It is also possible for the browser to use technologies such as Ajax, SVG, RSS, and Adobe Flash Player 8 and limited support for Adobe Flash Player 9. Opera Software has indicated that the functionality will allow for third parties to create web applications specifically designed for the use on the Wii Browser, and it will support widgets, standalone web-based applications using Opera as an application platform.Third party APIs and SDKs have been released that allow developers to read the values of the Wii Remote buttons in both Flash and JavaScript. This allows for software that previously required keyboard controls to be converted for use with the Wii Remote. The browser was also used to stream BBC iPlayer videos from April 9, 2008 after an exclusive deal was made with Nintendo UK and the BBC to offer their catch-up service for the Wii. However, the September 2009 update caused the iPlayer to no longer operate. The BBC acknowledged the issue and created a dedicated channel instead. In June 2009, YouTube released YouTube XL, a TV-friendly version of the popular video-sharing website. The regular YouTube page would redirect the browser to YouTube XL, if the website detects that the Internet Channel or the PlayStation 3 browser is being used.
Pre-installed channels:
Everybody Votes Channel Everybody Votes Channel allowed users to vote in simple opinion polls and compare and contrast opinions with those of friends, family, and people across the globe.
Pre-installed channels:
Everybody Votes Channel was launched on February 13, 2007, and was available in the Wii Channels section of the Wii Shop Channel. The application allowed Wii owners to vote on various questions using their Mii as a registered voter. Additionally, voters were also able to make predictions for the choice that will be the most popular overall after their own vote has been cast. Each Mii's voting and prediction record is tracked and voters can also view how their opinions compare to others. Whether the Mii is correct in its predictions or not is displayed on a statistics page along with a counter of how many times that Mii has voted. Up to six Miis would be registered to vote on the console. The channel was free to download. Each player would make a suggestion for a poll a day.
Pre-installed channels:
Like the other four Wii channels (Forecast Channel, News Channel, Nintendo Channel, Check Mii Out Channel/Mii Contest Channel), the Everybody Votes Channel ended its seven-year support on June 27, 2013 due to Nintendo shifting its resources to its next generation projects. Unlike the other discontinued channels, Everybody Votes Channel remains accessible with users able to view the latest poll data posted, albeit the channel will never be updated again.
Pre-installed channels:
Check Mii Out Channel The Check Mii Out Channel (also known as the Mii Contest Channel in Australia, Europe and Japan and Canal Miirame in Spanish-speaking countries in Latin America) was a channel that allowed players to share their Miis and enter them into popularity contests. It was first available on November 11, 2007. It was available free to download from the Wii Channels section of the Wii Shop Channel.
Pre-installed channels:
Users would post their own Miis in the Posting Plaza, or import other user-submitted Miis to their own personal Mii Parade. Each submitted Mii was assigned a 12-digit entry number to aid in searching. Submitted Miis were given 2 initials by their creator and a notable skill/talent to aid in sorting.
Pre-installed channels:
In the Contests section, players submitted their own Miis to compete in contests to best fit a certain description (e.g. Mario without his cap). After the time period for sending a Mii had expired, the user had the choice of voting for three Miis featured on the judging panel, with ten random Miis being shown at a time. Once the judging period is over, the results of the contest may be viewed. Their selection and/or submission's popularity in comparison to others was displayed, as well as the winning Mii and user.
Pre-installed channels:
The Check Mii Out Channel sent messages to the Wii Message Board concerning recent contests. Participants in certain contests would add their user and submitted Mii to a photo with a background related to the contest theme. This picture would then be sent to the Wii Message Board.
This channel ended its seven-year support on June 27, 2013 like the four other channels (Forecast Channel, News Channel, Everybody Votes Channel, Nintendo Channel).
Pre-installed channels:
Nintendo Channel The Nintendo Channel (known as the Everybody's Nintendo Channel in Japan) allowed Wii users to watch videos such as interviews, trailers, commercials, and even download demos for the Nintendo DS line of systems. The Nintendo Channel has the ability to support Nintendo Entertainment System games, Super NES games, Nintendo 64 games, and GameCube games. Later the channel was used for the Wii U, and the Nintendo Switch under the name of the Nintendo eShop. In this capacity the channel worked in a similar way to the DS Download Station. The channel provided games, info, pages and users could rate games that they have played. A search feature was also available to assist users in finding new games to try or buy. The channel had the ability to take the user directly into the Wii Shop Channel for buying the wanted game immediately. The Nintendo Channel was launched in Japan on November 27, 2007, in North America on May 7, 2008, and in Europe and Australia on May 30, 2008. The Nintendo Channel was updated with different Nintendo DS demos and new videos every week; the actual day of the week varies across different international regions. Nintendo DS demos can be transmitted to the handheld console.An updated version of the Nintendo Channel was released in Japan on July 15, 2009, North America on September 14, 2009, and in Europe on December 15, 2009. The update introduced a new interface and additional features, options, and statistics for users to view. However, the European version was missing some of these new additional features, such as options for choosing video quality. In addition, a weekly show known as Nintendo Week began airing exclusively on the North American edition of the channel, while another show, Nintendo TV, was available on the UK version of the channel.The Nintendo Channel and the other 4 channels (Forecast Channel, News Channel, Everybody Votes Channel, and Check Mii Out Channel/Mii Contest Channel) ended their seven-year support on June 27, 2013.A few shows appeared on Nintendo Channel which were no more than 20 minutes long: Nintendo Week: The hosts were Gary and Allison, but other co-hosts appeared as well like Dark Gary, Daniel, and others.
Pre-installed channels:
Ultimate Wii Challenge/New Super Mario Bros. Wii Challenge: The hosts were David and Ben. They tried to beat each other's time in Nintendo Games like New Super Mario Bros. Wii, Donkey Kong Country Returns, Super Mario Galaxy 2, and Kirby's Epic Yarn. In a few episodes, Ben and David worked together in levels of a few games.Many Nintendo DS demos were available in Nintendo Channel's DS Download Service: Fossil Fighters: Champions Kirby Mass Attack Ōkamiden Ghost Trick: Phantom Detective Sonic Colors Crafting Mama Pokémon Ranger: Guardian Signs Ivy the Kiwi? Dragon Ball: Origins 2 Picross 3D America's Test Kitchen Pots de Creme America's Test Kitchen Roasted Red Potatoes Rooms DS Battle of Giants: Dragons Battle of Giants: Mutant Insects Ace Attorney INVESTIGATIONS: Miles Edgeworth James Patterson Woman's Murder Club: Games of Passion Fossil Fighters Gift Fossil (Neutral) Fossil Fighters Gift Fossil (Water) Fossil Fighters Gift Fossil (Fire) Fossil Fighters Gift Fossil (Earth) Fossil Fighters Cleaning Mega Man Star Force 3 (until 9/20/2009) Ice Age: Dawn of the Dinosaurs (until 9/20/2009) Rhythm Heaven Personal Trainer: Math Personal Trainer: Cooking Mac & Cheese (until 12/21/2008) Personal Trainer: Cooking Lasagna (until 3/22/2009) Mystery Case Files: MillionHeir Crosswords DS-Crosswords Crosswords DS-Wordsearch Crosswords DS-Anagrams (until 7/27/2008) Brain Age Brain Age 2 Flash Focus Jam Sessions Rayman Raving Rabbids 2 Cooking Mama 2: Dinner with Friends Disney Friends Ninja Gaiden: Dragon Sword Elebits: The Adventures of Kai and Zero(until 12/21/2008) Soul Bubbles (until 12/21/2008) PICTOIMAGE (until 1/18/2009) Carnival Games (until 7/6/2008) The Incredible Hulk Kung Fu Panda Walt Disney Pictures Bolt (until 1/18/2009) Imagine Ice Champions Avalon Code MLB 2K9 Fantasy All-Stars Big Bang Mini Madagascar: Escape 2 Africa Spectrobes: Beyond the Portals Ninjatown Miami Law Up Naruto Shippuden: Ninja Council 4 Knights in the Nightmare Tutorial MySims Kingdom Battle of Giants: Dinosaurs Brain Quest Grades 3 & 4 Brain Quest Grades 5 & 6 Spore Creatures Lock's Quest My Word Coach Disconnection Forecast Channel, the News Channel, the Everybody Votes Channel, the Check Mii Out Channel/Mii Contest Channel, were shut down permanently on June 27, 2013, as Nintendo terminated the WiiConnect24 service which these channels required, and shifted their resources to their next-generation projects, such as the Wii U and Nintendo 3DS.
Other channels:
These channels were those that could be acquired through the usage of various games and accessories.
Wii Fit/Wii Fit Plus Channel Wii Fit allowed users to install the Wii Fit Channel to the Wii Menu. The channel allowed them to view and compare their results, and those of others, as well as their progress in the game, without requiring the game disc to be inserted.
Other channels:
The channel allowed users to access some of the features of Wii Fit. It allowed users to view statistics from the game including users' BMI measurements and balance test scores in the form of a line graph, as well as keep track of the various activities they have undertaken with a calendar. Users were also able to weigh themselves and do a BMI and balance test with the channel once per day. However, if the player wishes to do any exercises or play any of the aerobics games and/or balance games, the game prompted the user to insert the Wii Fit game disc.
Other channels:
Mario Kart Channel Mario Kart Wii allows players to install the Mario Kart Channel on their Wii console. The channel can work without inserting the Mario Kart Wii disc into the console, but to compete in races and time trials the disc is required. The use of the Mario Kart Channel allows for a number of options. A ranking option lets players see their best Time Trial scores for each track and compare their results to those of their friends and other players worldwide, represented by their Miis. Players will have the option of racing against the random or selective ghosts, or improving their results gradually by taking on the ghosts of rivals, those with similar race times. Users have the option to submit these times for others around the world to view. Players can also manage and register friends using the channel and see if any of them are currently online.
Other channels:
Another feature of the channel are Tournaments, where Nintendo invited players to challenges similar to the missions on Mario Kart DS. Players were also able to compare their competition rankings with other players.As of May 20, 2014, most features of the channel have been discontinued, such as Tournaments.
Other channels:
Jam with the Band Live Channel (Japan and PAL regions only) The Nintendo DS game Jam with the Band supports the Jam with the Band Live Channel (known as the Speaker Channel in Japan) that allows players to connect their game to a Wii console and let the game's audio be played through the channel. The channel supports multiple players.
Other channels:
Wii Speak Channel Users with the Wii Speak peripheral are able to access the Wii Speak Channel. Users can join one of four rooms (with no limit to the number of people in each room) to chat with others online. Each user is represented by their own Mii, which lip-syncs to their words. In addition, users can also leave audio messages for other users by sending a message to their Wii Message Board. Users can also photo slideshows and comment on them. The Wii Speak Channel became available in North America and Europe on December 5, 2008, and was discontinued on May 20, 2014. The Wii Speak Channel is succeeded by Wii U Chat, which is standardized for the Wii U console.
Other channels:
Rabbids Channel This is a channel created by Rabbids Go Home. When the game is started up for the first time or when the player goes to the player profile screen, the player may install the Rabbids Channel, which will appear on the Wii Menu once it is downloaded. Players can use the channel to view other people's Rabbids and enter contests.
Downloadable channels:
Downloadable Channels are Channels that can be bought from the Wii Shop Channel.
Downloadable channels:
Virtual Console Channels Virtual Console channels were channels that allowed users to play their downloaded Virtual Console games obtained from the Wii Shop Channel. The Virtual Console portion of the Wii Shop Channel specialized in older software originally designed and released for home entertainment platforms that are now defunct. These games were played on the Wii through the emulation of the older hardware. The prices were generally the same in almost every region and were determined primarily by the software's original platform. There was initially planned to be a Virtual Console channel where users could launch their Virtual Console games sorted by console, but this idea was dropped.
Downloadable channels:
WiiWare Channels Functioning similarly to the Virtual Console channels, WiiWare channels allowed users to use their WiiWare games obtained from the Wii Shop Channel. The WiiWare section specialized in downloadable software specifically designed for the Wii. The first WiiWare games were made available on March 25, 2008 in Japan. WiiWare games launched in North America on May 12, 2008, and launched in Europe and Australia on May 20, 2008.The WiiWare section was being touted as a forum to provide developers with small budgets to release smaller-scale games without the investment and risk of creating a title to be sold at retail (somewhat similar to the Xbox Live Arcade and the PlayStation Store). While actual games have been planned to appear in this section since its inception, there had been no official word on when any would be appearing until June 27, 2007, when Nintendo made an official confirmation in a press release which revealed the first titles would surface sometime in 2008. According to Nintendo, "The remarkable motion controls will give birth to fresh takes on established genres, as well as original ideas that currently exist only in developers' minds." Like Virtual Console games, WiiWare games were purchased using Wii Points. Nintendo handled all pricing options for the downloadable games.
Downloadable channels:
Television Friend Channel (Japan only) The Television Friend Channel allowed Wii users to check what programs are on the television. Content was provided by Guide Plus. It was developed by HAL Laboratory. The channel had been said to be "very fun and Nintendo-esque". A "stamp" feature allowed users to mark programs of interest with a Mii-themed stamp. If an e-mail address or mobile phone number would have been registered in the address book, the channel could send out an alert 30 minutes prior to the start of the selected program. The channel tracked the stamps of all Wii users and allowed users to rate programs on a five-star scale. Additionally, when the channel was active the Wii Remote could be used to change the TV's volume and channel so that users can tune into their shows by way of the channel. The Television Friend Channel launched in Japan on March 4, 2008, and was discontinued on July 24, 2011, due to the shutdown of analog television broadcasts in Japan. It was never launched outside Japan, as most countries, unlike Japan, have a guide built into set-top boxes and/or TVs. The Television Friend Channel was succeeded by the now-defunct Nintendo TVii, which was standardized for the Wii U console. It also had the Kirby 1-UP sound, since it was made by HAL Laboratory. This was later removed before the release of the channel.
Downloadable channels:
Digicam Print Channel (Japan only) The Digicam Print Channel was a channel developed in collaboration with Fujifilm that allowed users to import their digital photos from an SD card and place them into templates for printable photo books and business cards through a software wizard. The user was also able to place their Mii on a business card. The completed design would then be sent online to Fujifilm who printed and delivered the completed product to the user. The processing of individual photos was also available.
Downloadable channels:
The Digicam Print Channel became available from July 23, 2008 in Japan, and ceased operation on June 26, 2013.
Downloadable channels:
Today and Tomorrow Channel The Today and Tomorrow Channel became available in Japan on December 2, 2008, and in Europe, Australia, and South Korea on September 9, 2009. The channel was developed in collaboration with Media Kobo and allows users to view fortunes for up to six Miis across five categories: love, work, study, communications, and money. The channel also features a compatibility test that compares two Miis, and also gives out "lucky words" that must be interpreted by the user. The channel uses Mii birthdate data, but users must input a birth year when they are loaded onto the channel. This channel was never released in North America, and although it was discontinued on January 30, 2019 with the Wii Shop Channel discontinuation, it can still be redownloaded if obtained before the Wii Shop Channel's closure.
Downloadable channels:
Wii no Ma (Japan only) A video on-demand service channel was released in Japan on May 1, 2009. The channel was a joint venture between Nintendo and Japanese advertising agency Dentsu. The channel's interface was built around a virtual living room, where up to 8 Miis can be registered and interact with each other. The virtual living room contained a TV which took the viewer to the video list. Celebrity "concierge" Miis occasionally introduced special programming. Nintendo ceased operations of Wii no Ma on April 30, 2012.
Downloadable channels:
Demae Channel (Japan only) A food delivery service channel was released in Japan on May 26, 2009. The channel was a joint venture between Nintendo and the Japanese on-line food delivery portal service Demae-can, and was developed by Denyu-sha. The channel offered a wide range of foods provided by different food delivery companies which can be ordered directly through the Wii channel. A note was posted to the Wii Message Board containing what had been ordered and the total price. The food was then delivered to the address the Wii user has registered on the channel. On February 22, 2017, Demae Channel was delisted from the Wii Shop Channel, it was later discontinued alongside the Wii U version on March 31, 2017.
Downloadable channels:
BBC iPlayer Channel (UK only) Wii access to the BBC iPlayer was interrupted on April 9, 2008, when an update to the Opera Browser turned out to be incompatible with the BBC iPlayer. The BBC chose not to make the BBC iPlayer compatible with the upgrade. This was resolved on November 18, 2009 when they released the BBC iPlayer Channel, allowing easier access to the BBC iPlayer.
Downloadable channels:
The BBC had since offered a free, dedicated Wii channel version of their BBC iPlayer application which was only available in the UK. By February 10, 2015, however, the channel was retired and consequently removed from Wii Shop Channel since newer versions are not compatible, and as per BBC's policy to retire older versions as a resource management. The channel had since been succeeded by the BBC iPlayer app on the UK edition of the Wii U eShop, which was released in May 2015.
Downloadable channels:
Netflix Channel The Netflix channel was released in the United States and Canada on October 18, 2010 and in the UK and Ireland on January 9, 2012. This channel allowed Netflix subscribers to use that service's "Watch Instantly" movie streaming service over the Wii with their regular Netflix subscription fee, and replaced the previous Wii "streaming disc" mailed to Netflix customers with Wii consoles from March 27 to October 17, 2010 due to contractual limitations involving Xbox 360 exclusivity. The channel was free to download in the Wii Channels section of the Wii Shop Channel. The channel displayed roughly 12 unique categories of videos with exactly 75 video titles in each category. The TV category had many seasons of videos (i.e. 15–100 episodes) associated with each title. There were also categories for videos just watched, new releases, and videos recommended (based on the user's Netflix subscription history). On July 31, 2018, the channel was delisted from the Wii Shop Channel; Netflix would drop support for the Wii on January 30, 2019.
Downloadable channels:
LoveFilm Channel (UK and Germany only) On 4 December 2012, the LoveFilm channel was available to download on Wii consoles in the UK and Germany; the channel was discontinued on 31 October 2017, along with the closure of LoveFilm itself.
Downloadable channels:
Kirby TV Channel (PAL regions only) The Kirby TV Channel launched on June 23, 2011 in Europe, Australia and New Zealand, and has since been discontinued. The channel allowed users to view episodes of the animated series Kirby: Right Back at Ya! for free. This channel was succeeded by the Nintendo Anime Channel, a Nintendo 3DS video-on-demand app, available in Japan and Europe, which streamed curated anime or anime-inspired shows, such as Kirby: Right Back at Ya! Hulu Plus Channel (USA only) Hulu Plus Channel was a channel for Wii, also as announced in Nintendo Updates on Nintendo Channel. Hulu Plus Channel included classic shows and other Hulu included shows. The channel launched in 2012, and was only available in the United States. On January 30, 2019, Hulu dropped support for the Wii.
Downloadable channels:
The Legend of Zelda: Skyward Sword Save Data Update Channel The Legend of Zelda: Skyward Sword Save Data Update Channel fixed an issue in the game The Legend of Zelda: Skyward Sword. This title was the only Wii game to ever receive a downloadable, self-patching service, wherein previous titles with technical issues, such as Metroid: Other M, required the game's owners experiencing said issues to send their Wii consoles to customer service where Nintendo had to manually fix such issues.
Downloadable channels:
YouTube Channel The YouTube channel allowed the user to view YouTube videos on the television screen and had the ability to sign into an existing YouTube account. The YouTube channel, which became available without warning, was only available in the North American, UK, Japanese, and Australian versions of the Wii system, with the North American release on November 15, 2012, only three days before the Wii U was released in North America. Google planned to gradually make the channel available on Wii in other countries besides the aforementioned regions. The YouTube channel was initially categorized on the Wii Shop Channel as a WiiWare title by mistake, but this was later fixed when the Wii U Transfer Tool channel became available. On June 26, 2017, YouTube terminated legacy support for all devices that continue using the Flash-based YouTube app (typically found in most TV devices released before 2012), which includes the Wii.
Downloadable channels:
Wii U Transfer Tool Channel This application became available on the Wii Shop Channel the day the Wii U was released per respective region. The only purpose of this channel is to assist transferring all eligible content out from a Wii console to a Wii U console, where the said content would be available via Wii Mode on the target Wii U. The application can transfer all available listed WiiWare titles (initially with the sole exemption of LostWinds for unknown reasons, but the game had since become available for both transfer to and purchase on Wii U since May 2014), all available listed Virtual Console titles, game save data, DLC data, Mii Channel data, Wii Shop Channel data (including Wii Points, conditional that accumulated total does not exceed 10,000 Wii Points on target Wii U), and Nintendo Wi-Fi Connection ID data to a target Wii U (albeit now moot since the service was discontinued in May 2014), but it cannot transfer Wii settings data, pre-installed WiiWare/Virtual Console titles (such as Donkey Kong: Original Edition that came pre-installed in the PAL version of the Super Mario Bros. 25th Anniversary Wii bundle), any game or application software that had been since delisted from the Wii Shop Channel prior to the release of Wii U (such as the Donkey Kong Country trilogy), software that is already available on the target Wii U's Wii Mode, WiiConnect24-supported software and save data (which includes the 16-digit Wii console Friend Code), and GameCube save data since the Wii U does not support the latter two. It is possible to move content from multiple Wii consoles to a single target Wii U console, as well as multiple transfers from a single Wii console if required, albeit the last Wii console's content will overwrite any similar Wii data transferred to target Wii U earlier. Due to technical limitations, the channel cannot directly transfer any eligible background data which has been saved on the console's SD card.
Downloadable channels:
The Wii U Transfer Tool Channel features an animation based on the Pikmin series, wherein a visual transfer display of various Pikmin drones would automatically carry the eligible data and software to a Hocotate-based space ship bound for the Wii U. While context dynamic, this animation is not interactive, and only exists for entertainment purposes.
The ability to transfer content from the Wii to the Wii U is still available for the foreseeable future after the Wii Shop Channel's shutdown on January 30, 2019.
Amazon Instant Video (USA only) Amazon Instant Video, a video on demand service provided by Amazon, was released as a downloadable Wii channel in the United States on January 17, 2013; the service was discontinued on January 30, 2019.
Downloadable channels:
Crunchyroll In late 2014, Crunchyroll released their video app for the Wii's successor, Wii U, in North America. However, believing there are still many actively connected Wii consoles in its twilight years, Crunchyroll had surprised users with a Crunchyroll channel for Wii as well, launching the app categorized under WiiWare on October 15, 2015 in North America and the PAL regions. The Crunchyroll Wii channel only permitted access to Premium account holders to the majority of the prime content. On May 5, 2017, less than 20 months after its launch, Crunchyroll ceased support for the Wii due to technical limitations after the service updated with new technology.
Wii Message Board:
The Message Board allows users to leave messages for friends, family members, or other users on a calendar-based message board. Users could also use WiiConnect24 to trade messages and pictures with other Wii owners, conventional email accounts (email pictures to console, but not pictures to email), and mobile phones (through text messages). Each Wii has an individual wii.com email account containing the Wii Number. Prior to trading messages it is necessary to add and approve contacts in the address book, although the person added will not get an automatic notification of the request, and must be notified by other means. The service also alerts all users of incoming game-related information.
Wii Message Board:
Message Board was available for users to post messages that are available to other Wii users by usage of Wii Numbers with WiiConnect24. In addition to writing text, players can also include images from an SD card in the body of messages, as well as attaching a Mii to the message. Announcements of software updates and video game news are posted by Nintendo. The Message Board can be used for posting memos for oneself or for family members without going online. These messages could then be put on any day of the calendar. The Wii Message Board could also be updated automatically by a real-time game like Animal Crossing.
Wii Message Board:
Wii Sports, Wii Play, Mario Kart Wii, Wii Speak Channel, Wii Sports Resort, Super Mario Galaxy & Super Mario Galaxy 2 use the Message Board to update the player on any new high scores or gameplay advancements, such as medal placements in the former two titles, completions of races including a photo, audio messages, and letters from the Mailtoad via the Wii Message Board. Metroid Prime 3: Corruption, Super Mario Galaxy, Super Smash Bros Brawl, Elebits, Animal Crossing: City Folk, Dewy's Adventure and the Virtual Console game Pokémon Snap allow players to take screenshots and post them to the Message Board to edit later or send to friends via messages. Except for GameCube games, the Message Board also records the play history in the form of "Today's Accomplishments". This feature automatically records details of what games or applications were played and for how long. It cannot be deleted or hidden without formatting the console itself. Prior to its closure, the Nintendo Channel was able to automatically tally all Wii game play data from the Message Board and display them in an ordered list within the channel.
Wii Message Board:
Subsequent system updates added a number of minor features to the Message Board, including minor aesthetic changes, USB keyboard support and the ability to receive Internet links from friends, which can be launched in the Internet Channel.
An exploit in the Wii Message Board can be used to homebrew a Wii via a tool called LetterBomb.
Discontinuation The WiiConnect24 service has been terminated as of June 27, 2013, completely ceasing the data exchange functionality of the Wii Message Board for all Wii consoles, whether as messages or game data. However, Nintendo is still able to continue sending some notification messages after that date to any continuously connected Wii consoles.
SD Card Menu:
The SD Card Menu is a feature made available with the release of Wii Menu version 4.0. This menu allows the user to run Virtual Console games, WiiWare games, and Wii Channels directly from the SD card, which makes it possible to free up the Wii's internal memory. Applications can be downloaded to the SD card directly from the Wii Shop Channel as well.
SD Card Menu:
When running an application from the SD Card Menu, it is temporarily copied to the internal memory of the Wii, meaning the internal memory still must contain an amount of free blocks equal to the application's size. If the internal memory does not have enough space, the Channel will run an "Automanager" program, which clears up space for the user in one of many ways (selectable by the user).
SD Card Menu:
The manager can place the largest channels on the user's Wii in the SD card, put smaller channels on the SD card until enough space remains to run the channel, clear channels from the left side of the Wii menu to the right side, or from the right side to the left until there are enough blocks to run the channel.
System updates and Parental Controls:
The Wii is capable of downloading updates to its core operating software. These updates may include additional features, patches/fixes, or support for newly released channels. When an update becomes available, Nintendo notifies users by sending a message to their console. Updates are included with certain Wii games, both requiring one to be fully updated in order to play and providing the update should one lack the necessary internet connection.
System updates and Parental Controls:
The Wii Menu also featured Parental Controls to restrict access to certain operations. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Potassium hypomanganate**
Potassium hypomanganate:
Potassium hypomanganate is the inorganic compound with the formula K3MnO4. Also known as potassium manganate(V), this bright blue solid is a rare example of a salt with the hypomanganate or manganate(V) anion, where the manganese atom is in the +5 oxidation state. It is an intermediate in the production of potassium permanganate and the industrially most important Mn(V) compound.
Properties:
Potassium hypomanganate is oxidized in water to potassium manganate: 2 K3MnO4 + H2O + 0.5 O2 → 2 KOH + 2 K2MnO4However, it undergoes disproportionation in acidic solutions producing manganese dioxide and potassium permanganate.In the absence of moisture, it is stable up to 900 °C. Above that temperature, it decomposes to potassium oxide, manganese(II,III) oxide, and oxygen.
Preparative routes:
The solid salt can be produced by the reaction of potassium carbonate and manganese carbonate in the presence of oxygen at 800 °C. However, in the industrial process of producing potassium permanganate, it is produced by fusing manganese dioxide and potassium hydroxide. The resulting hypomanganate further reacts with water to produce manganate.A solution of potassium hypomanganate is produced: by two-electron reduction of potassium permanganate with excess potassium sulfite;MnO−4 + SO2−3 + H2O → MnO3−4 + SO2−4 + 2 H+by the single-electron reduction of potassium manganate with hydrogen peroxide in 10 M potassium hydroxide solution;2 MnO2−4 + H2O2 + 2 OH− → 2 MnO3−4 + O2 + 2 H2Oby the single-electron reduction of potassium manganate with mandelate in 3–10 M potassium hydroxide solution;2 MnO2−4 + C8H7O−3 + 2 OH− → 2 MnO3−4 + C8H5O−3 + 2 H2Oby disproportionation when manganese dioxide is dissolved in a concentrated solution of potassium hydroxide;2 MnO2 + 3 OH− → MnO3−4 + MnOOH + H2OThe compound is unstable due to the tendency of the hypomanganate anion to disproportionate in all but the most alkaline solutions. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Extended-wear hearing aid**
Extended-wear hearing aid:
An extended-wear hearing aid is a type of hearing aid that is placed deep in the ear canal and can be worn for several months at a time without removal. This type of hearing aid is primarily suited for people who have mild to moderately severe hearing loss. This new hearing aid concept was invented by Adnan Shennib, founder of InSound Medical, Inc. The location of these aids directly in the ear canal can provide reduced distortion, wind noise, occlusion and feedback as well as better sound directionality and quality compared to other hearing aids.
Use and operation:
Extended wear hearing aids are made of a soft material designed to contour to each user’s ear canal, with a range of canal width sizes to accommodate ear dimensions. An ENT physician, audiologist or hearing aid specialist non-surgically inserts the device into the ear, placing it in the bony portion of the ear canal ~4 mm from the tympanic membrane, or eardrum. The specific placement in the ear canal is said to provide an overall increase in gain and output, greater headroom, reduced occlusion effect, reduced feedback and improved directionality. Once inserted, users can change the volume and settings using a magnetic adjustment tool.
Use and operation:
It is recommended that a hearing specialist remove an extended wear hearing aid when the battery dies and the device needs to be replaced, but most hearing professionals provide patients with a removal loop tool to allow for self-removal should it be necessary.
Suitability:
As with other hearing devices, compatibility is based on an individual’s hearing loss, ear size and shape, medical conditions, and lifestyle. This can be determined by visiting a hearing aid specialist.
Durability:
Extended-wear hearing aids are built to withstand moisture and cerumen (ear wax) and can be worn while exercising, showering, etc. The longevity of extended wear hearing aids is affected by usage patterns, environmental differences, and the lifestyle of each user. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Boundary (topology)**
Boundary (topology):
In topology and mathematics in general, the boundary of a subset S of a topological space X is the set of points in the closure of S not belonging to the interior of S. An element of the boundary of S is called a boundary point of S. The term boundary operation refers to finding or taking the boundary of a set. Notations used for boundary of a set S include bd fr (S), and ∂S . Some authors (for example Willard, in General Topology) use the term frontier instead of boundary in an attempt to avoid confusion with a different definition used in algebraic topology and the theory of manifolds. Despite widespread acceptance of the meaning of the terms boundary and frontier, they have sometimes been used to refer to other sets. For example, Metric Spaces by E. T. Copson uses the term boundary to refer to Hausdorff's border, which is defined as the intersection of a set with its boundary. Hausdorff also introduced the term residue, which is defined as the intersection of a set with the closure of the border of its complement.A connected component of the boundary of S is called a boundary component of S.
Common definitions:
There are several equivalent definitions for the boundary of a subset S⊆X of a topological space X, which will be denoted by ∂XS, Bd XS, or simply ∂S if X is understood: It is the closure of S minus the interior of S in X : where cl XS denotes the closure of S in X and int XS denotes the topological interior of S in X.
Common definitions:
It is the intersection of the closure of S with the closure of its complement: It is the set of points p∈X such that every neighborhood of p contains at least one point of S and at least one point not of S : A boundary point of a set refers to any element of that set's boundary. The boundary ∂XS defined above is sometimes called the set's topological boundary to distinguish it from other similarly named notions such as the boundary of a manifold with boundary or the boundary of a manifold with corners, to name just a few examples.
Properties:
The closure of a set S equals the union of the set with its boundary: where cl XS denotes the closure of S in X.
A set is closed if and only if it contains its boundary, and open if and only if it is disjoint from its boundary. The boundary of a set is closed; this follows from the formula := S¯∩(X∖S)¯, which expresses ∂XS as the intersection of two closed subsets of X.
("Trichotomy") Given any subset S⊆X, each point of X lies in exactly one of the three sets int XS,∂XS, and int X(X∖S).
Said differently, and these three sets are pairwise disjoint. Consequently, if these set are not empty then they form a partition of X.
Properties:
A point p∈X is a boundary point of a set if and only if every neighborhood of p contains at least one point in the set and at least one point not in the set. The boundary of the interior of a set as well as the boundary of the closure of a set are both contained in the boundary of the set.
Examples:
Characterizations and general examples A set and its complement have the same boundary: A set U is a dense open subset of X if and only if ∂XU=X∖U.
Examples:
The interior of the boundary of a closed set is empty. Consequently, the interior of the boundary of the closure of a set is empty. The interior of the boundary of an open set is also empty. Consequently, the interior of the boundary of the interior of a set is empty. In particular, if S⊆X is a closed or open subset of X then there does not exist any nonempty subset U⊆∂XS such that U is open in X.
Examples:
This fact is important for the definition and use of nowhere dense subsets, meager subsets, and Baire spaces. A set is the boundary of some open set if and only if it is closed and nowhere dense. The boundary of a set is empty if and only if the set is both closed and open (that is, a clopen set).
Examples:
Concrete examples Consider the real line R with the usual topology (that is, the topology whose basis sets are open intervals) and Q, the subset of rational numbers (whose topological interior in R is empty). Then ∂(0,5)=∂[0,5)=∂(0,5]=∂[0,5]={0,5} ∂∅=∅ ∂Q=R ∂(Q∩[0,1])=[0,1] These last two examples illustrate the fact that the boundary of a dense set with empty interior is its closure. They also show that it is possible for the boundary ∂S of a subset S to contain a non-empty open subset of := R ; that is, for the interior of ∂S in X to be non-empty. However, a closed subset's boundary always has an empty interior. In the space of rational numbers with the usual topology (the subspace topology of R ), the boundary of (−∞,a), where a is irrational, is empty.
Examples:
The boundary of a set is a topological notion and may change if one changes the topology. For example, given the usual topology on R2, the boundary of a closed disk Ω={(x,y):x2+y2≤1} is the disk's surrounding circle: ∂Ω={(x,y):x2+y2=1}.
If the disk is viewed as a set in R3 with its own usual topology, that is, Ω={(x,y,0):x2+y2≤1}, then the boundary of the disk is the disk itself: ∂Ω=Ω.
If the disk is viewed as its own topological space (with the subspace topology of R2 ), then the boundary of the disk is empty.
Examples:
Boundary of an open ball vs. its surrounding sphere This example demonstrates that the topological boundary of an open ball of radius r>0 is not necessarily equal to the corresponding sphere of radius r (centered at the same point); it also shows that the closure of an open ball of radius r>0 is not necessarily equal to the closed ball of radius r (again centered at the same point). Denote the usual Euclidean metric on R2 by which induces on R2 the usual Euclidean topology. Let X⊆R2 denote the union of the y -axis := {0}×R with the unit circle centered at the origin := (0,0)∈R2 ; that is, := Y∪S1, which is a topological subspace of R2 whose topology is equal to that induced by the (restriction of) the metric d.
Examples:
In particular, the sets Y,S1,Y∩S1={(0,±1)}, and {0}×[−1,1] are all closed subsets of R2 and thus also closed subsets of its subspace X.
Examples:
Henceforth, unless it clearly indicated otherwise, every open ball, closed ball, and sphere should be assumed to be centered at the origin 0=(0,0) and moreover, only the metric space (X,d) will be considered (and not its superspace (R2,d) ); this being a path-connected and locally path-connected complete metric space. Denote the open ball of radius r>0 in (X,d) by := {p∈X:d(p,0)<r} so that when r=1 then is the open sub-interval of the y -axis strictly between y=−1 and 1.
Examples:
The unit sphere in (X,d) ("unit" meaning that its radius is r=1 ) is while the closed unit ball in (X,d) is the union of the open unit ball and the unit sphere centered at this same point: However, the topological boundary ∂XB1 and topological closure cl XB1 in X of the open unit ball B1 are: In particular, the open unit ball's topological boundary ∂XB1={(0,1),(0,−1)} is a proper subset of the unit sphere {p∈X:d(p,0)=1}=S1 in (X,d).
Examples:
And the open unit ball's topological closure cl XB1=B1∪{(0,1),(0,−1)} is a proper subset of the closed unit ball {p∈X:d(p,0)≤1}=S1∪({0}×[−1,1]) in (X,d).
The point (1,0)∈X, for instance, cannot belong to cl XB1 because there does not exist a sequence in B1={0}×(−1,1) that converges to it; the same reasoning generalizes to also explain why no point in X outside of the closed sub-interval {0}×[−1,1] belongs to cl XB1.
Because the topological boundary of the set B1 is always a subset of B1 's closure, it follows that ∂XB1 must also be a subset of {0}×[−1,1].
In any metric space (M,ρ), the topological boundary in M of an open ball of radius r>0 centered at a point c∈M is always a subset of the sphere of radius r centered at that same point c ; that is, always holds. Moreover, the unit sphere in (X,d) contains X∖Y=S1∖{(0,±1)}, which is an open subset of X.
This shows, in particular, that the unit sphere {p∈X:d(p,0)=1} in (X,d) contains a non-empty open subset of X.
Boundary of a boundary:
For any set S,∂S⊇∂∂S, where ⊇ denotes the superset with equality holding if and only if the boundary of S has no interior points, which will be the case for example if S is either closed or open. Since the boundary of a set is closed, ∂∂S=∂∂∂S for any set S.
The boundary operator thus satisfies a weakened kind of idempotence.
Boundary of a boundary:
In discussing boundaries of manifolds or simplexes and their simplicial complexes, one often meets the assertion that the boundary of the boundary is always empty. Indeed, the construction of the singular homology rests critically on this fact. The explanation for the apparent incongruity is that the topological boundary (the subject of this article) is a slightly different concept from the boundary of a manifold or of a simplicial complex. For example, the boundary of an open disk viewed as a manifold is empty, as is its topological boundary viewed as a subset of itself, while its topological boundary viewed as a subset of the real plane is the circle surrounding the disk. Conversely, the boundary of a closed disk viewed as a manifold is the bounding circle, as is its topological boundary viewed as a subset of the real plane, while its topological boundary viewed as a subset of itself is empty. In particular, the topological boundary depends on the ambient space, while the boundary of a manifold is invariant. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**2017 QP1**
2017 QP1:
2017 QP1 is a micro-asteroid on an eccentric orbit, classified as near-Earth object of the Apollo group that made a close approach of 0.17 lunar distances from Earth on 14 August 2017 at 21:23 UTC. It was first observed by ATLAS at Haleakala Observatory, Hawaii, on 16 August 2017, two days after its closest approach. The asteroid is estimated to measure between 37 and 83 meters in diameter. It flew past Earth at a speed of 23.97 km/s under the south pole of the Earth.The orbit of 2017 QP1 is extremely eccentric, going from the orbit of planet Mercury out into the asteroid belt, located between Mars and Jupiter. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Second stage manufacturer**
Second stage manufacturer:
A second stage manufacturer, known in the industry as "bodybuilder," builds such products as bus and truck bodies, ambulances, motor homes, and other specialized vehicles. Neither their product, nor the first stage portion, called an incomplete motor vehicle, are fully compliant with all of the requirements for a complete motor vehicle without the other. Cutaway van chassis are one of the more popular incomplete motor vehicles for second stage manufacturers to use as a platform for their products. A large portion of small school buses, minibuses, and recreational vehicles are based upon cutaway van chassis. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**(332446) 2008 AF4**
(332446) 2008 AF4:
(332446) 2008 AF4 is a sub-kilometer asteroid, classified as near-Earth object and potentially hazardous asteroid of the Apollo group, which was listed on the Sentry Risk Table in January 2008 with a Torino Scale rating of 1. The asteroid showed a 1 in 71,000 chance of impact on 9 January 2089. It was briefly downgraded to Torino Scale 0 in February 2008, but still showed a cumulative 1 in 53,000 chance of an impact. In March it was back at Torino Scale 1 with a 1 in 28,000 chance of impact on 9 January 2089. By mid April 2008, it was back to Torino Scale 0. It was removed from the Sentry Risk Table on 19 December 2009.
2183 passage:
2008 AF4 may pass as close as 0.002 AU (300,000 km; 190,000 mi) from Earth on 12 January 2183. But the nominal solution shows the asteroid passing 0.009 AU (1,300,000 km; 840,000 mi) from Earth. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Ruth Cameron (scientist)**
Ruth Cameron (scientist):
Ruth Cameron FInstP FIOM3 is a British materials scientist and professor at the University of Cambridge. She is co-director of the Cambridge Centre for Medical Materials. She studies materials that interact therapeutically with the body.
Early life and education:
Cameron completed her PhD in physics at the University of Cambridge.
Research and career:
Cameron's research considers materials which interact therapeutically with the body. She is interested in musculoskeletal repair. Her research considers bioactive biodegradable composites, biodegradable polymers, tissue engineered scaffold and surface patterning. Cameron works with Serena Best on collagen scaffolds for the spin-out company Orthomimetics.In 1993 she joined the Department of Materials Science and Metallurgy, University of Cambridge. Since 2006 she has co-led the Cambridge Centre for Medical Materials with Serena Best. The co-management makes Cameron and Best the first Engineering and Physical Sciences Research Council fellowship to job share. She was a founder member of the Pfizer Institute for Pharmaceutical Materials Science. She is a Fellow of Lucy Cavendish College, Cambridge.
Research and career:
Honours and awards 2017 - United Kingdom Society for Biomaterials President's Prize 2017 - Institute of Materials, Minerals and Mining Griffith Medal & Prize 2019 - Institute of Physics Rosalind Franklin Medal and Prize, for "innovative application of physics to regenerative medicine and pharmaceutical delivery" 2021 - Engineering and Physical Sciences Suffrage Science award | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**PA Server Monitor**
PA Server Monitor:
PA Server Monitor is a server and network monitoring software from Power Admin LLC. PA Server Monitor focuses primarily on server and network health through numerous resource checks, reports, and alerting options. The agentless, on-premises software can monitor thousands of devices from a single installation. The monitored devices can be desktop computers, servers, routers and other devices.
The main function of the software is to monitor performance of servers and network devices in Windows and Linux environments. Data is kept on customers servers, not stored in the cloud.
An agentless monitoring software to watch ping, CPU, memory, disk, SNMP + traps, events, with available historical reports. Apps are available for iOS and Android.
History:
Power Admin LLC is a privately held company founded by IT professionals, located in Shawnee, Kansas, outside of downtown Kansas City, Missouri area. Power Admin has been providing professional grade system monitoring products since 1992 for all types of business from SMBs to Fortune 500 companies.
Power Admin also developed two other popular utilities that are used all over the world.
History:
PAExec allows a user to launch Windows programs on remote Windows computers without needing to install software on the remote computer first. This was written as an alternative to Microsoft's PsExec tool (originally by SysInternals's Mark Russinovich), because it could not be redistributed, and sensitive command-line options like username and passwords were sent as clear text. Source code is readily available on GitHub.Power Admin also developed SpeedFanHttpAgent. The SpeedFan HTTP Agent exports and allows you to access SpeedFan's (utility by Alfredo Milani Comparetti) temperature data from across the network via a simple HTTP request.
What it Does:
PA Server Monitor monitors event logs, disk space, running services, web page content, SNMP object values, log files, processes, ping response time, directory quotas, changed files and directories. Equipped to monitor thousands of servers/devices from a single installation, and more via satellite monitoring services.
It has extensive reporting to get status reports for servers/devices, group summaries, uptime and historic stats, providing actions and alerts by customizable email, SMS and other types of notifications, and suppression and escalation of certain notifications. It can also automatically restart services and run custom scripts.
Other capabilities include satellite monitoring of remote offices/locations across firewalls and/or across the internet without a VPN, agentless server monitoring and a bulk config feature to speed changes across many servers/devices.
Alerts in PA Server Monitor can use event suppression to cut down on false alerts, event deduplication system to further remove noise, and event escalation to give alerts increasing visibility as a problem persists for longer. Alert Reminders can also be used to make sure problems don't get forgotten about.
Device Support:
PA Server Monitor is Windows-based, and many monitors use standard Microsoft Windows APIs (mostly based on Microsoft RPC). Standard protocols such as SNMP (including Traps), Syslog, IPMI, HTTPS, FTP, various mail protocols, SSH, etc. allows for monitoring non-Windows devices.
Architecture:
PA Server Monitor is made of three main components: the Central Service, the Console and optional Satellite Monitoring Services. Because the product is agentless, nothing gets installed on monitored devices. In addition, since the software is installed on-premises, all data remains on-premises.
Central Service The Central Service is the hub of the software. This is where the database is stored for historical reporting and trend analysis, alerts are sent from, and where all configuration is kept. The Central Service contains a web server from which the web interface and reports are viewed.
Console The Console application is a native Windows application, and the "single pane of glass" from which all configuration, monitoring and reporting is done. The Console can be installed on multiple workstations, and they all connect to the Central Service through an HTTPS-based API.
Architecture:
Satellite Monitoring Service The Satellite Monitoring Service enables remote and distributed monitoring. It is an optional monitoring engine (only available with the Ultra license) that can do all the same monitoring the Central Service can do. This can be installed in the same network as the Central Service to distribute monitoring load, or it can be installed at remote sites for monitoring devices that the Central Service cannot access. Even in the remote site case, all configuration continues to be done through the Console application. The Satellite Monitoring Service also connects to the Central Service through the HTTPS-based API.
Architecture:
Automatic Failover An optional second Central Monitoring Server can be installed which will keep track of the status of the main Central Monitoring Server and should it fail, the Failover will automatically take over monitoring duties. Satellite Monitoring Services can automatically switch to the newly active Failover server during this period.
Monitors Monitors are the basic function that contains a reference to a resource to be monitored, as well as thresholds to compare against, and a list of actions (alerts) to fire if there are problems. Monitors have several attributes to make them easier to conform to various environments.
Version History:
v.9.2 (2023) v.9.1 (2023) v.9.0 (2022) v.8.5 (2022) v.8.4 (2022) v.8.3 (2021) v.8.2 (2020) v.8.0 (2019) v.7.2 (2018) v.7.0 (2017) v.6.3 (2016) v.6.0 (2015) v.5.6 (2014) v.5.2 (2012) v.4.0 (2011) v.3.7 (2009) v.3.6 (2008) v.3.4 (2007) v.3.3 (2006) v.2.2 (2005) v.2.0 (2004) v.1.0 (First Beta Release (2004)) | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Feminine essence concept of transsexuality**
Feminine essence concept of transsexuality:
In the study of Gender incongruence, the essentialist idea of a feminine essence refers to the proposal that trans women are females trapped in male bodies. This idea has been interpreted in many senses, as a female mind, spirit, soul, personality, etc., as well as in more literal senses such as having a female brain structure; it is also a psychological narrative, that is, a self-description of how some transsexuals see themselves, or of how they may portray themselves to qualify for certain medical treatments.
Feminine essence concept of transsexuality:
According to sexologist J. Michael Bailey and Kiira Triea, "the predominant cultural understanding of male-to-female transsexualism is that all male-to-female (MtF) transsexuals are, essentially, women trapped in men's bodies." They reject the idea, claiming that "The persistence of the predominant cultural understanding, while explicable, is damaging to science and to many transsexuals." According to sexologist Ray Blanchard, "Transsexuals seized upon this phrase as the only language available for explaining their predicament to themselves and for communicating their feelings to others. The great majority of patients understand full well that this is a façon de parler, not a literal statement of fact, and are not delusional in any normal sense of the word."The feminine essence idea has been described under several names, and there is no authoritative, widely accepted definition. It was called the feminine essence narrative by Alice Dreger in 2008, and the feminine essence theory by Ray Blanchard, who formulated the concept into a set of logical propositions. Other names include Harry Benjamin syndrome, after one of the early sexologists whose early writings about the nature of transsexualism, along with those of psychiatrist David O. Cauldwell, are favorably cited by proponents in support of this idea.This idea is associated with, but separate from the brainsex theory of transsexualism, which is a belief about a neurodevelopmental cause of transsexualism. Proponents of the brainsex theory of transsexualism draw a distinction between "brain sex" and "anatomical sex". Some proponents reject the term transsexual, as the trans- prefix implies that their true sex is changing, instead of being affirmed, with treatments like sex reassignment surgery. Some proponents consider themselves to be intersex instead of transgender. A figurative interpretation, involving neurologically mediated gender identity, was supported historically by pioneering sexologists such as Harry Benjamin.
Description:
The "feminine essence" idea predates modern psychological studies, and was supported by some early sexologists such as Harry Benjamin ("the father of transsexualism"), who revived the idea of Karl-Heinrich Ulrichs that a person might have a "female soul trapped in a male body."Modern researchers classify the common story told by transsexual women about themselves as a psychological narrative, and therefore refer to this idea as the "feminine essence narrative". In his book The Man Who Would Be Queen, sexologist J. Michael Bailey gives these statements as a prototypical example of the feminine essence narrative: "Since I can remember, I have always felt as if I were a member of the other sex. I have felt like a freak with this body and detest my penis. I must get sex reassignment surgery (a "sex change operation") in order to match my external body with my internal mind."
Blanchard's deconstruction:
In 2008, Ray Blanchard presented the idea in the form of a theory in a commentary entitled "Deconstructing the Feminine Essence Narrative" in which he lists what he considers to be "the central tenets of the feminine essence theory", and then refutes each of these tenets: Male-to-female transsexuals are, in some literal sense and not just in a figurative sense, women inside men's bodies.
Blanchard's deconstruction:
There is only one type of woman, therefore there can be only one type of (true) male-to-female transsexual.
Apparent differences among male-to-female transsexuals are relatively superficial and irrelevant to the basic unity of the transsexual syndrome.
Male-to-female transsexuals have no unique, behavioral or psychological characteristics that are absent in typical men and women.
Neuroanatomic research:
According to Bailey and Triea, one of the predictions based on the feminine essence theory is that male-to-female transsexuals would possess female rather than male brain anatomy. A widely cited research study of this topic examined the brain anatomy of six deceased male-to-female transsexuals, who had undergone during their lives hormonal treatment and surgical sex reassignment. The study reported that a brain structure called the "central subdivision of the bed nucleus of the stria terminalis" (BSTc), which is larger in typical males than in typical females, was in the female range in the transsexual subjects. The interpretation and the methods of that study have been criticized, and the finding continues to be a matter of debate.
Neuroanatomic research:
Neurological research has found that the brains of transsexuals differ in a number of ways. For example, a study done on the brains of non-homosexual transsexuals using MRI and pheromones as stimuli found that transsexuals process smelling androgen and estrogen in the same way that women do. Previous research by the same team found that homosexual males also process smelling the pheromones of the sexes in a way that is similar to that of women. Work done by Simon LeVay had previously found that the hypothalamus of homosexual males has a region which is similar in size to that of heterosexual females. This is not so in non-homosexual males. A study done by Hilleke E Hulshoff Pol reached the conclusion that the brain changes in overall volume and the volume of its parts with the use of cross-sex hormone supplements. In the case of male-to-female transsexuals, the brain assumes the proportions of a female brain.
Other findings:
The main support for the feminine essence narrative is that many male-to-female transsexuals say they feel it to be true; many autobiographical and clinical accounts by or about transsexual individuals contain variations of the statement of having a female soul or needing to make the external body resemble the inner or true self.Critics of this narrative consider it to be inconsistent with their research findings. Blanchard has reported finding that there are two, and not one, types of male-to-female transsexual and that they differ with regard to their sexual interests, whether they were overtly gender atypical in childhood, how easily they pass as female, the ages at which they decide to transition to female, birth order, and their physical height and weight. There have also been findings that the groups differ in how well they respond to sex reassignment and how likely they are to regret having transitioned. These sexologists have therefore posited that more than one motivator can lead a biological male to desire to live life as female, but that there is no evidence for a core essence of femininity.
Role of medical community:
Since the medical community has guidelines for what types of individuals qualify for sex reassignment surgery, transsexual persons sometimes adopt and tell the story that they believe will best help them qualify – the "feminine essence narrative" – and representing themselves as "essentially female", which may explain at least part of the prevalence of the feminine essence narrative.
Terminology:
The phrase "feminine soul enclosed in a male body" (anima muliebris in corpore virili inclusa) was introduced in 1868 by Karl-Heinrich Ulrichs, not to describe male-to-female transsexuals, but to describe a type of gay men who self-identified as feminine. Major sexologists in the 19th century picked up the idea that a homosexual was "a female soul in a male body, a condition deriving from an error in embryonic differentiation." Those homosexuals who felt themselves to be female were categorized, "in the interest of scientific precision," as "Urnings" (English uranians). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Akka (toolkit)**
Akka (toolkit):
Akka is a source-available toolkit and runtime simplifying the construction of concurrent and distributed applications on the JVM. Akka supports multiple programming models for concurrency, but it emphasizes actor-based concurrency, with inspiration drawn from Erlang.Language bindings exist for both Java and Scala. Akka is written in Scala and, as of Scala 2.10, the actors in the Scala standard library are deprecated in favor of Akka.
History:
An actor implementation, written by Philipp Haller, was released in July 2006 as part of Scala 2.1.7. By 2008 Scala was attracting attention for use in complex server applications, but concurrency was still typically achieved by creating threads that shared memory and synchronized when necessary using locks. Aware of the difficulties with that approach and inspired by the Erlang programming language's library support for writing highly concurrent, event-driven applications, the Swedish programmer Jonas Bonér created Akka to bring similar capabilities to Scala and Java. Bonér began working on Akka in early 2009 and wrote up his vision for it in June of that year. The first public release was Akka 0.5, announced in January 2010. Akka is now part of the Lightbend Platform together with the Play framework and the Scala programming language.
History:
In September 2022, Lightbend announced that Akka would change its license from the free software license Apache License 2.0 to a proprietary source-available license, known as the Business Source License (BSL). Any new code under the BSL would become available under the Apache License after three years.
Distinguishing features:
The key points distinguishing applications based on Akka actors are: Concurrency is message-based and asynchronous: typically no mutable data are shared and no synchronization primitives are used; Akka implements the actor model.
Distinguishing features:
The way actors interact is the same whether they are on the same host or separate hosts, communicating directly or through routing facilities, running on a few threads or many threads, etc. Such details may be altered at deployment time through a configuration mechanism, allowing a program to be scaled up (to make use of more powerful servers) and out (to make use of more servers) without modification.
Distinguishing features:
Actors are arranged hierarchically with regard to program failures, which are treated as events to be handled by an actor's supervisor (regardless of which actor sent the message triggering the failure). In contrast to Erlang, Akka enforces parental supervision, which means that each actor is created and supervised by its parent actor.Akka has a modular structure, with a core module providing actors. Other modules are available to add features such as network distribution of actors, cluster support, Command and Event Sourcing, integration with various third-party systems (e.g. Apache Camel, ZeroMQ), and even support for other concurrency models such as Futures and Agents.
Project structure:
Viktor Klang became the technical lead for the Akka project in September 2011. When Viktor became Director of Engineering at Lightbend in December 2012, Roland Kuhn became the technical lead for Akka. The main part of the development is done by a core team employed at Lightbend, supported by an active community. The current emphasis is on extending cluster support.
Relation to other libraries:
Other frameworks and toolkits have emerged to form an ecosystem around Akka: The Spray toolkit is implemented using Akka and features a HTTP server as well as related facilities, such as a domain-specific language (DSL) for creating RESTful APIs The Play framework for developing web applications offers integration with Akka Up until version 1.6, Apache Spark used Akka for communication between nodes The Socko Web Server library supports the implementation of REST APIs for Akka applications The eventsourced library provides event-driven architecture (see also domain-driven design) support for Akka actors The Gatling stress test tool for load-testing web servers is built upon Akka The Scalatra web framework offers integration with Akka.
Relation to other libraries:
The Vaadin web app development framework can integrate with Akka The Apache Flink (platform for distributed stream and batch data processing) RPC system is built using Akka but isolated since v1.14.
The Lagom framework for building reactive microservices is implemented on top of Akka.There are more than 250 public projects registered on GitHub which use Akka.
Publications about Akka:
There are several books about Akka: Akka Essentials Akka Code Examples Akka Concurrency Akka in Action Effective Akka Composable Futures with Akka 2.0, Featuring Java, Scala and Akka Code ExamplesAkka also features in: P. Haller's "Actors in Scala" N. Raychaudhuri's "Scala in Action" D. Wampler's "Functional Programming for Java Developers" A. Alexander's "Scala Cookbook" V. Subramaniam's "Programming Concurrency on the JVM" M. Bernhardt's "Reactive Web Applications"Besides many web articles that describe the commercial use of Akka, there are also overview articles about it. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Pleiotrophin**
Pleiotrophin:
Pleiotrophin (PTN) also known as heparin-binding brain mitogen (HBBM) or heparin-binding growth factor 8 (HBGF-8) or neurite growth-promoting factor 1 (NEGF1) or heparin affinity regulatory peptide (HARP) or heparin binding growth associated molecule (HB-GAM) is a protein that in humans is encoded by the PTN gene. Pleiotrophin is an 18-kDa growth factor that has a high affinity for heparin. It is structurally related to midkine and retinoic acid induced heparin-binding protein.
Function:
Pleiotrophin was initially recognized as a neurite outgrowth-promoting factor present in rat brain around birth and as a mitogen toward fibroblasts isolated from bovine uterus tissue. Together with midkine these growth-factors constitute a family of (developmentally regulated) secreted heparin-binding proteins now known as the neurite growth-promoting factor (NEGF) family. During embryonic and early postnatal development, pleiotrophin is expressed in the central and peripheral nervous system and also in several non-neural tissues, notably lung, kidney, gut and bone. Pleiotrophin is also expressed by several tumor cells and is thought to be involved in tumor angiogenesis. In the adult central nervous system, pleiotrophin is expressed in an activity-dependent manner in the hippocampus where it can suppress long term potentiation induction. Pleiotrophin expression is low in other areas of the adult brain, but it can be induced by ischemic insults. or targeted neuronal damaged in the entorhinal cortex or in the substantia nigra pars compacta.
Clinical significance:
Pleiotrophin binds to cell-surface nucleolin as a low affinity receptor. This binding can inhibit HIV infection. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Analytic**
Analytic:
Analytic or analytical may refer to:
Chemistry:
Analytical chemistry, the analysis of material samples to learn their chemical composition and structure Analytical technique, a method that is used to determine the concentration of a chemical compound or chemical element Analytical concentration
Mathematics:
Abstract analytic number theory, the application of ideas and techniques from analytic number theory to other mathematical fields Analytic combinatorics, a branch of combinatorics that describes combinatorial classes using generating functions Analytic element method, a numerical method used to solve partial differential equations Analytic expression or analytic solution, a mathematical expression using well-known operations that lend themselves readily to calculation Analytic geometry, the study of geometry based on numerical coordinates rather than axioms Analytic number theory, a branch of number theory that uses methods from mathematical analysis Mathematical analysis Analytic function, a function that is locally given by a convergent power series Analytic capacity, a number that denotes how big a certain bounded analytic function can become Analytic continuation, a technique to extend the domain of definition of a given analytic function Analytic manifold, a topological manifold with analytic transition maps Analytic variety, the set of common solutions of several equations involving analytic functions Set theory Analytical hierarchy, an extension of the arithmetical hierarchy Analytic set, the continuous image of a Polish space Proof theory Analytic proof, in structural proof theory, a proof whose structure is simple in a special way Analytic tableau, a tree structure used to analyze logical formulas
Computer science:
Analytic or reductive grammar, a kind of formal grammar that works by successively reducing input strings to simpler forms Analytics, to find meaningful patterns in data
Other science and technology:
Analytic signal, a particular representation of a signal Analytical mechanics, a refined, highly mathematical form of classical mechanics Analytical balance, a very high precision (0.1 mg or better) weighing scale
Philosophy:
Analytic philosophy, a style of philosophy that came to dominate English-speaking countries in the 20th century Analytic proposition, a statement whose truth can be determined solely through analysis of its meaning Analytical Thomism, the movement to present the thought of Thomas Aquinas in the style of modern analytic philosophy Postanalytic philosophy, describes a detachment from the mainstream philosophical movement of analytic philosophy, which is the predominant school of thought in English-speaking countries
Social sciences:
Psychology Analytical psychology, part of the Jungian psychology movement Cognitive analytic therapy, a form of psychological therapy initially developed in the UK by Anthony Ryle Psychoanalysis, a set of psychological and psychotherapeutic theories and associated techniques Sociology Analytic induction, the systematic examination of similarities between various social phenomena to develop concepts or ideas Analytic frame, a detailed sketch or outline of some social phenomenon, representing initial idea of a scientist analyzing this phenomenon Politics Analytical Marxism, an interpretation of Marxism Linguistics Analytic language, a natural language in which most morphemes are free (separate), instead of fused together
Other areas:
Analytical jurisprudence, the use of analytical reasoning to study legal theory Analytic journalism, seeks to make sense of a complex reality in order to create public understanding Analytic cubism, one of two major branches of the cubism artistic movement Analytical skills | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Vaginal delivery**
Vaginal delivery:
A vaginal delivery is the birth of offspring in mammals (babies in humans) through the vagina (also called the "birth canal"). It is the most common method of childbirth worldwide. It is considered the preferred method of delivery, with lower morbidity and mortality than Caesarean sections (C-sections).
Epidemiology:
United States 70% of births in the United States in 2019 were vaginal deliveries.
Global 80% of births globally in 2021 were vaginal deliveries, with rates varying from 95% in sub-Saharan Africa to 45% in the Caribbean.
Benefits of vaginal delivery:
Mother Benefits for the mother include Avoiding surgery and resulting quicker recovery time and shorter hospital admission Quicker onset of lactation Decreased complications in future pregnancies, including placenta previa Infant Benefits for the infant include: Develop microbiota from exposure to the bacteria from the mother's vagina, while the microbiota of babies born by caesarean section have more bacteria associated with hospital environments.
Benefits of vaginal delivery:
Decreased infant respiratory conditions, including infant respiratory distress syndrome, transient tachypnea of the newborn, and respiratory-related NICU admissions Improved immune function, possibly due to the infant's exposure to normal vaginal and gut bacteria during vaginal birth
Types of vaginal delivery:
Different types of vaginal deliveries have different terms: A spontaneous vaginal delivery (SVD) occurs when a pregnant woman goes into labor without the use of drugs or techniques to induce labor and delivers their baby without forceps, vacuum extraction, or a cesarean section.
An induced vaginal delivery is a delivery involving labor induction, where drugs or manual techniques are used to initiate labor. Vaginal delivery can be either spontaneous or induced.
Types of vaginal delivery:
An assisted vaginal delivery (AVD) or instrumental vaginal delivery occurs when a pregnant woman requires the use of special instruments such as forceps or a vacuum extractor to deliver her baby vaginally. It is usually performed when the pregnancy does not progress during the second stage of labor. If the goal is to avoid the adverse effects of pushing that a cardiac patient may experience, it may also be performed in this case. Both spontaneous and induced vaginal delivery can be assisted. Examples of instruments to assist delivery include obstretical forcepts and vacuum extraction with a vacuum cup device.A normal vaginal delivery (NVD) is defined as any vaginal delivery, assisted or unassisted.
Stages of labor:
Labor is characterized by uterine contractions which push the fetus through the birth canal and results in delivery. Labor is divided into three stages.
First stage of labor starts with the onset of contractions and finishes when the cervix is fully dilated at 10 cm. This stage can further be divided into latent and active labor. The latent phase is defined by cervical dilation of 0 to 6 cm. The active phase is defined by cervical dilation of 6 cm to 10 cm.
Second stage of labor starts when the cervix is dilated to 10 cm and finishes with the birth of the fetus. This is stage is characterized by strong contractions and active pushing by the mother. It can last from 20 minutes to 2 hours.
Third stage of labor starts after the birth of the fetus and is finished when the placenta is delivered. It can last from 5 to 30 minutes.
Risks and complications of vaginal delivery:
Complications of vaginal delivery can be grouped into the following criteria; failure to progress, abnormal fetal heart rate tracing, intrapartum hemorrhage, and post-partum hemorrhage.
Risks and complications of vaginal delivery:
Failure to progress occurs when the labor process slows or stops entirely, indicated by slowed cervical dilation. Factors that place a woman's pregnancy at higher risk include advanced maternal age, Premature Rupture of Membranes (PROM) and induction of labor. Oxytocin, a uterotonic agent, can be administered to augment labor. Cesarean section is also commonly considered when the pregnancy fails to progress. With a cesarean section, there is a higher chance that the uterus will become infected or that thromboembolic complications will occur. There is also a higher chance of death.Abnormal fetal heart tracing suggests that the fetus's heart rate has slowed during labor due to head compression, cord compression, hypoxemia or anemia. Uterine tachysystole, the most common adverse effect of oxytocin (usually as a result of a problematic dosage), can result in nonreassuring fetal heart tracing. It can usually be reversed when oxytocin infusion is decreased or stopped. If the abnormal fetal heart rate persists, and uterine tachysystole continues, tocolytic remedies, such as terbutaline, may be used. Afterward, if beneficial and uterine tone has returned to baseline and fetal status is stable, oxytocin as a labor augmenting agent may be resumed. The persistence of an abnormal fetal heart rate may also indicate that a cesarean section is necessary.Intrapartum hemorrhage is characterized by the presence of copious blood during labor. The bleeding may be due to placental abruption, uterine rupture, placenta accrete, undiagnosed placenta previa, or vasa previa. Cesarean section is indicated.
Risks and complications of vaginal delivery:
Post-partum hemorrhage is defined by the loss of at least 1,000 mL of blood accompanied with symptoms of hypovolemia within 24 hours after delivery. Typically, the first symptom is excessive bleeding accompanied by tachycardia. Significant loss of blood may also result in hypotension, nausea, dyspnea, and chest pain. It is estimated that between 3% and 5% of women giving birth vaginally will experience post-partum hemorrhage. Risk factors include fetal macrosomia, pre-eclampsia, and prolonged labor. Prevention consists of administering oxytocin (Pitocin) at delivery and early umbilical cord clamping. Post-partum hemorrhage is usually attributed to uterus atony, when the uterus fails to contract after delivering the baby.As a result of discrepancies in diagnostic criteria and human variability, there is wide variation in data on maternal and fetal death associated with poor progress.More than 1 in 10 women with assisted vaginal births develop an infection. Preventive antibiotics are recommended to women who have had an assisted vaginal birth by the World Health Organization. An analysis has showed that preventive antibiotics reduce the risk of infection after an assisted vaginal birth, irrespective of whether a woman has had a perineal tear, an episiotomy, or both. Delays in receiving antibiotics also increases the risk of infection.
Contraindications to vaginal delivery:
Spontaneous vaginal delivery at term is the preferred outcome of pregnancy, and according to the International Federation of Gynecology and Obstetrics, will be recommended if there are no evidence-based clinical indications for cesarean section. However, there are some contraindications for vaginal delivery that would result in conversion to cesarean delivery. The decision to switch to cesarean delivery is made by the health care provider and mother, and is sometimes delayed until the mother is in labor.
Contraindications to vaginal delivery:
Breech birth presentations occur when the fetus' buttocks or lower extremities are poised to deliver before the fetus' upper extremities or head. The three types of breech positions are footling breech, frank breech, and complete breech. These births occur in 3% to 4% of all term pregnancies. They usually result in cesarean sections because it is more difficult to deliver the baby through the birth canal and there is a lack of expertise in vaginal breech delivery and therefore fewer vaginal breech deliveries performed. It is also associated with cord prolapse and an elevated risk for birth defects of breech babies. Controversy and debate surround the topic due to different views on the preferred route of delivery when breech presentation occurs. Some health professionals believe that vaginal breech delivery can be a safe alternative to planned cesarean in certain instances.Complete placenta previa occurs when the placenta covers the opening of the cervix. If placenta previa is present at the time of delivery, vaginal delivery is contraindicated because the placenta is blocking the fetus’ passageway to the vaginal canal.
Contraindications to vaginal delivery:
Herpes simplex virus with active genital lesions or prodromal symptoms is a contraindication for vaginal delivery so as to avoid mother-fetal transfer of HSV lesions.
Untreated human immunodeficiency virus (HIV) infection is a contraindication for vaginal delivery to avoid mother-fetal transfer of human immunodeficiency virus. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Hydrometallurgy**
Hydrometallurgy:
Hydrometallurgy is a technique within the field of extractive metallurgy, the obtaining of metals from their ores. Hydrometallurgy involve the use of aqueous solutions for the recovery of metals from ores, concentrates, and recycled or residual materials. Processing techniques that complement hydrometallurgy are pyrometallurgy, vapour metallurgy, and molten salt electrometallurgy. Hydrometallurgy is typically divided into three general areas:
Solution concentration and purification:
Metal or metal compound recovery Leaching Leaching involves the use of aqueous solutions to extract metal from metal-bearing materials which are brought into contact with them. In China in the 11th and 12th centuries, this technique was used to extract copper; this was used for much of the total copper production. In the 17th century it was used for the same purposes in Germany and Spain.The lixiviant solution conditions vary in terms of pH, oxidation-reduction potential, presence of chelating agents and temperature, to optimize the rate, extent and selectivity of dissolution of the desired metal component into the aqueous phase. By using chelating agents, one can selectively extract certain metals. These agents are typically amines of Schiff bases.The five basic leaching reactor configurations are in-situ, heap, vat, tank and autoclave.
Solution concentration and purification:
In-situ leaching In-situ leaching is also called "solution mining". This process initially involves drilling of holes into the ore deposit. Explosives or hydraulic fracturing are used to create open pathways within the deposit for solution to penetrate into. Leaching solution is pumped into the deposit where it makes contact with the ore. The solution is then collected and processed. The Beverley uranium deposit is an example of in-situ leaching.
Solution concentration and purification:
Heap leaching In heap leaching processes, crushed (and sometimes agglomerated) ore is piled in a heap which is lined with an impervious layer. Leach solution is sprayed over the top of the heap, and allowed to percolate downward through the heap. The heap design usually incorporates collection sumps, which allow the "pregnant" leach solution (i.e. solution with dissolved valuable metals) to be pumped for further processing. An example is gold cyanidation, where pulverized ores are extracted with a solution of sodium cyanide, which, in the presence of air, dissolves the gold, leaving behind the nonprecious residue.
Solution concentration and purification:
Vat leaching Vat leaching involves contacting material, which has usually undergone size reduction and classification, with leach solution in large vats.
Tank leaching Stirred tank, also called agitation leaching, involves contacting material, which has usually undergone size reduction and classification, with leach solution in agitated tanks. The agitation can enhance reaction kinetics by enhancing mass transfer. Tanks are often configured as reactors in series.
Autoclave leaching Autoclave reactors are used for reactions at higher temperatures, which can enhance the rate of the reaction. Similarly, autoclaves enable the use of gaseous reagents in the system.
Solution concentration and purification After leaching, the leach liquor must normally undergo concentration of the metal ions that are to be recovered. Additionally, undesirable metal ions sometimes require removal.
Precipitation is the selective removal of a compound of the targeted metal or removal of a major impurity by precipitation of one of its compounds. Copper is precipitated as its sulfide as a means to purify nickel leachates.
Cementation is the conversion of the metal ion to the metal by a redox reaction. A typical application involves addition of scrap iron to a solution of copper ions. Iron dissolves and copper metal is deposited.
Solvent Extraction Ion exchange Gas reduction. Treating a solution of nickel and ammonia with hydrogen affords nickel metal as its powder.
Electrowinning is a particularly selective if expensive electrolysis process applied to the isolation of precious metals. Gold can be electroplated from its solutions.
Solvent extraction In the solvent extraction a mixture of an extractant in a diluent is used to extract a metal from one phase to another. In solvent extraction this mixture is often referred to as the "organic" because the main constituent (diluent) is some type of oil.
Solution concentration and purification:
The PLS (pregnant leach solution) is mixed to emulsification with the stripped organic and allowed to separate. The metal will be exchanged from the PLS to the organic they are modified. The resulting streams will be a loaded organic and a raffinate. When dealing with electrowinning, the loaded organic is then mixed to emulsification with a lean electrolyte and allowed to separate. The metal will be exchanged from the organic to the electrolyte. The resulting streams will be a stripped organic and a rich electrolyte. The organic stream is recycled through the solvent extraction process while the aqueous streams cycle through leaching and electrowinning processes respectively.
Solution concentration and purification:
Ion exchange Chelating agents, natural zeolite, activated carbon, resins, and liquid organics impregnated with chelating agents are all used to exchange cations or anions with the solution. Selectivity and recovery are a function of the reagents used and the contaminants present.
Metal recovery:
Metal recovery is the final step in a hydrometallurgical process, in which metals suitable for sale as raw materials are produced. Sometimes, however, further refining is needed to produce ultra-high purity metals. The main types of metal recovery processes are electrolysis, gaseous reduction, and precipitation. For example, a major target of hydrometallurgy is copper, which is conveniently obtained by electrolysis. Cu2+ ions are reduced to Cu metal at low potentials, leaving behind contaminating metal ions such as Fe2+ and Zn2+.
Metal recovery:
Electrolysis Electrowinning and electrorefining respectively involve the recovery and purification of metals using electrodeposition of metals at the cathode, and either metal dissolution or a competing oxidation reaction at the anode.
Precipitation Precipitation in hydrometallurgy involves the chemical precipitation from aqueous solutions, either of metals and their compounds or of the contaminants. Precipitation will proceed when, through reagent addition, evaporation, pH change or temperature manipulation, the amount of a species present in the solution exceeds the maximum determined by its solubility. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Polonium tetranitrate**
Polonium tetranitrate:
Polonium tetranitrate is an inorganic compound, a salt of polonium and nitric acid with the chemical formula Po(NO3)4. The compound is radioactive, forms white crystals.
Synthesis:
Dissolution of metallic polonium in concentrated nitric acid: Po+8HNO3→Po(NO3)4+4NO2↑+4H2O
Physical properties:
Polonium(IV) nitrate forms white or colorless crystals. It dissolves in water with hydrolysis.
Chemical properties:
It disproportionates in aqueous weakly acidic nitric acid solutions: 2Po(NO3)4+2H2O→PoO2(NO3)2↓+Po2++2NO3−+4HNO3 The polonium(II) ion (Po2+) is then oxidized by nitric acid to polonium(IV). | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**FANCB**
FANCB:
Fanconi anemia group B protein is a protein that in humans is encoded by the FANCB gene.
Function:
The Fanconi anemia complementation group (FANC) currently includes FANCA, FANCB, FANCC, FANCD1 (also called BRCA2), FANCD2, FANCE, FANCF, FANCG, and FANCL. Fanconi anemia is a genetically heterogeneous recessive disorder characterized by cytogenetic instability, hypersensitivity to DNA crosslinking agents, increased chromosomal breakage, and defective DNA repair. The members of the Fanconi anemia complementation group do not share sequence similarity; they are related by their assembly into a common nuclear protein complex. This gene encodes the protein for complementation group B. Alternative splicing results in two transcript variants encoding the same protein.
Gene:
FANCB is the only gene known to cause X-linked Fanconi Anemia. In female carriers of FANCB mutations (one wild-type FANCB allele and one mutant FANCB allele) there is strong selection through X-inactivation for expression of only the wild-type allele. In contrast, males have only one FANCB allele. Only male patients with Fanconi anemia have ever been linked to FANCB mutations, and they make up about 4% of cases.Mutation in the FANCB are highly associated with the development of the VACTERL-H constilation of birth defects. In a cohort study of 19 children with FANCB variants, those with deletion of FANCB gene or truncation of FANCB protein demonstrate earlier-than-average onset of bone marrow failure and more severe congenital abnormalities compared with a large series of Fanconi Anemia individuals in published reports. This reflects the indispensable role of FANCB gene in cells. For FANCB missense variants, more variable severity is associated with the extent of residual activity.
Protein:
The FANCB gene product is FANCB protein. FANCB is a component of a "core complex" of nine Fanconi Anemia proteins: FANCA, FANCB, FANCC, FANCE, FANCF, FANCG, FANCL, FAAP100 and FAAP20. The core complex localises to DNA damage sites during DNA replication where it catalyzes transfer of ubiquitin to FANCD2 and FANCI. In particular, this reaction is necessary for the repair of DNA interstrand crosslinks, such as those formed by chemotherapy drugs cisplatin, mitomycin c and melphalan.Within the Fanconi anemia core complex, FANCB has an obligate interaction with FAAP100 and FANCL, to form a catalytic E3 RING ligase enzyme. FANCB creates a dimer interface within this subcomplex that is required for simultaneous ubiquitination of FANCD2 and FANCI. Electron microscopy imaging of the FANCB-FANCL-FAAP100 complex revealed a symmetry that is centred on FANCB, and biochemical investigation confirmed that the entire complex is a dimer containing two of each subunit. Further imaging reveals the overall architecture of the Fanconi Anemia core complex centres on FANCB protein.
Meiosis:
FANCB mutant mice are infertile and exhibit primordial germ cell defects during embryogenesis. The germ cells and testicular size are severely compromised in FANCB mutant mice. FANCB protein is essential for spermatogenesis and likely has a role in the activation of the Fanconi anemia DNA repair pathway during meiosis. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Draglade**
Draglade:
Draglade (カスタムビートバトル ドラグレイド, Kasutamu Bīto Batoru Doragureido, Custom Beat Battle Draglade) is a fighting video game with music video game and role-playing game elements for the Nintendo DS developed by Dimps and published in Japan by Banpresto and Bandai Namco Games. It was then later published in the US by Atlus.
The fighting system is different from other fighting games in that there are not a lot of directional inputs needed for moves. Instead, special moves are set by collecting "Bullets" and then activating them with the DS's touch screen.
Story:
The story of Draglade takes place in a post-modern setting where the world's primary source of power is a form of energy called "Matter." A piece of technology called a G-Con is capable of absorbing Matter and transforming it into a physical object. A weapon conjured by this means is called a Glade, which can emit a distinct sound when colliding with other objects. During the era that the events of Draglade take place, fighting using Glades is the world's most popular sport, called "Grapping." The story follows four characters on their own individual quests become professional Grappers. Each character has a personal colour, element, and type of glade.
Characters:
Player characters Hibito - Hibito is a fiery youth who has idolized Grappers ever since he was saved by one as a young child from a wild variant. Against his grandfather's wishes, he travels around the continent to take the Grap Exams and become a Master Grapper.
Characters:
Guy - Once known as the "Shadow Fist", Guy used to belong to a corrupt Grapper gang called the "Black Fang". Like the others, he abused the power of Dark Glades, but he eventually abandoned the dark power, severely hampering himself. He is now taking the Grap Exams in order to train himself up to be able to fight and defeat the Black Fang.
Characters:
Kyle - Kyle is a pirate, son of the pirate Orca, who owns a large vessel known as the "Blue Whale". Orca has been tricked into working up a large debt, and Kyle ventures to become a Major Grapper so he can enter a Majors-only tournament with a cash-reward big enough to pay it off.
Characters:
Daichi - A kind young boy from Dolittle village, a place where the residents possess the unique ability to speak with animals, Daichi is one of two young people selected to take an important journey to help animals the world over, but only one can be selected. In order to prepare himself for the decisive match, he decides to train by taking the grap exam.
Characters:
Yuki - A young man that Hibito meets on his journey, Yuki at first is kind and helpful, but eventually it is revealed that he is not confident in his own abilities. He is led astray by the temptation of Dark Matter. However, after his second battle against Hibito, he realizes the truth and destroys the dark G-con.
Characters:
Gyamon - Gyamon is a well-known member of the "Black Fang" organization. He and Guy were considered two of the strongest grappers in the gang, and were rarely apart. He is commanded to find Guy and eliminate him for leaving, but instead he makes several attempts to persuade Guy back into the organization, claiming he misses "the good old days".
Characters:
Shelly - Shelly is a girl who seeks revenge for her brother, who wished to be a Major Grapper, but had his dreams destroyed when the "Black Fang" hurt him so badly he could never Grap again. She finds Guy and wishes to battle him to avenge her brother against the "Black Fang". She soon realizes that Guy has changed his ways.
Characters:
Asuka - Asuka is from the same village as Daichi and can thus also talk to animals. She was the second name chosen to represent her village, and aims to become a Major Grapper so she can prove she is the most worthy to represent her village; she does not believe Daichi can handle the responsibility because he is too slow and kind.
Characters:
Zeke - Zeke is a mysterious dark warrior that all the heroes encounter, and has great power and skill. He works for Mad Company, but is not truly interested in their goals. Once he has done what he was paid to do, he simply leaves.
Non player characters Cross - Cross was a legendary grapper that Hibito idolized, and he seemed like he was important when he met Hibito. It was said that the Hero of Light wields the blade to repel evil and summon clones of him. Not much was known about him since, but he appears in the sequel.
Characters:
President D. - The CEO of the Mad Company and the game's main villain, President D. started Mad Company to study and work with Dark Matter, in hopes of creating the ultimate glade, the Dark Draglade. When the glade was completed, he activated its power, going insane in the process. After the player beats him once, he tries to get more power from the Dark Matter and became a giant monster, though he is returned to normal after the player character beats him a second time. Ultimately, he dies after his defeat by the effect of the Dark Matter.
Characters:
Pudding - A young girl and boss of the DoraDora Dan. She appears in everyone's story but plays a much bigger role in Kyle's. When meeting her for the first time, she sends her servants to take out the playing character. Her company has made gun-type G- Cons which shoot out a golem type glade. Apart from in Kyle's story she cannot be fought because she has forgotten her G-Con. She hates being called a child or baby and claims she is mature.
Sequel:
A sequel was released in Japan called Custom Beat Battle: Draglade 2 in 2008. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**BRCC3**
BRCC3:
Lys-63-specific deubiquitinase BRCC36 is an enzyme that in humans is encoded by the BRCC3 gene.
Function:
This gene encodes a subunit of the BRCA1-BRCA2-containing complex (BRCC), which is an E3 ubiquitin ligase. This protein is also thought to be involved in the cellular response to ionizing radiation and progression through the G2/M checkpoint. Alternative splicing results in multiple transcript variants.
Function:
Repair of DNA damage BRCC36, the protein product of the BRCC3 gene, is a deubiquitinating enzyme and a core component of the deubiquitin complex BRCA1-A. BRCA1, as distinct from BRCA1-A, is employed in the repair of chromosomal damage with an important role in the error-free homologous recombinational (HR) repair of DNA double-strand breaks. Sequestration of BRCA1 away from the DNA damage site suppresses homologous recombination and redirects the cell in the direction of repair by the process of non-homologous end joining (NHEJ). The role of BRCA1-A appears to be to bind BRCA1 with high affinity and withdraw it away from the site of DNA damage to the periphery where it remains sequestered, thus promoting DNA repair by NHEJ in preference to HR.
Interactions:
BRCC3 has been shown to interact with BRE, BRCA2, RAD51, BRCA1, P53 and BARD1. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**TTEthernet**
TTEthernet:
The Time-Triggered Ethernet (SAE AS6802) (also known as TTEthernet or TTE) standard defines a fault-tolerant synchronization strategy for building and maintaining synchronized time in Ethernet networks, and outlines mechanisms required for synchronous time-triggered packet switching for critical integrated applications and integrated modular avionics (IMA) architectures. SAE International has released SAE AS6802 in November 2011.
TTEthernet:
Time-Triggered Ethernet network devices are Ethernet devices which at least implement: SAE AS6802 synchronization services for advanced integrated architectures, fail-operational and safety-critical systems time-triggered traffic flow control with traffic scheduling per-flow policing of packet timing for time-triggered traffic robust internal architecture with traffic partitioningTTEthernet network devices are standard Ethernet devices with additional capability to configure and establish robust synchronization, synchronous packet switching, traffic scheduling and bandwidth partitioning, as described in SAE AS6802. If no time-triggered traffic capability is configured or used, it operates as full duplex switched Ethernet devices compliant with IEEE802.3 and IEEE802.1 standards.
TTEthernet:
In addition, such network devices implement other deterministic traffic classes to enable mixed-criticality Ethernet networking. Therefore, TTEthernet networks are designed to host different Ethernet traffic classes without interference.
TTEthernet device implementation expands standard Ethernet with services to meet time-critical, deterministic or safety-relevant requirements in double- and triple-redundant configurations for advanced integrated systems. TTEthernet switching devices are used for integrated systems and safety-related applications primarily in the aerospace, industrial controls and automotive applications.
TTEthernet:
TTEthernet has been selected by NASA and ESA as the technology for communications between the Orion MPCV and the European Service Module, and is described by the ESA as being "prime choice for future launchers allowing them to deploy distributed modular avionics concepts". It has also been selected as the backbone network for NASA's Lunar Gateway to which ESA is a key stakeholder.
TTEthernet:
As an increasingly used network architecture in the space industry, European Cooperation for Space Standardization published ECSS-E-ST-50-16C on September 30, 2021.
Description:
TTEthernet network devices implement OSI Layer 2 services, and therefore it claims to be compatible with IEEE 802.3 standards and coexist with other Ethernet networks and services or traffic classes, such as IEEE 802.1Q, on the same device.
Three traffic classes and message types are provided in current TTEthernet switch implementations: Synchronization Traffic (Protocol Control Frames - PCF): Time-Triggered Ethernet network uses protocol control frames (PCFs) to establish and maintain synchronization. The PCFs traffic has the highest priority and it is similar to rate-constrained traffic. PCF traffic establishes a well-defined interface for fault-tolerant clock synchronization algorithms.
Time-triggered traffic: Ethernet packets are sent over the network at predefined (scheduled) times and take precedence over all other traffic types. The occurrence, temporal delay and precision of time-triggered messages are predefined and guaranteed. Also, "synchronized local clocks are the fundamental prerequisite for time-triggered communication".
Rate-constrained traffic: Ethernet packets are configured so that they can keep maximum latency and jitter in a closed system. They are used for applications with less stringent determinism and real-time requirements. This traffic class guarantees that bandwidth is predefined for each application and delays and temporal deviations have defined upper bounds.
Best-effort traffic (incl. VLAN traffic): Packets are sent via FIFO queues to egress ports. There is no absolute guarantee whether and when these messages can be transmitted, what delays occur and if messages arrive at the recipient. Best-effort messages use the remaining bandwidth of the network and have lower priority than the other two types.
Description:
Three traffic classes cover different types of determinism - from soft-time best-effort traffic to "more deterministic" to "very deterministic" (max.latency defined per VL) to "strictly deterministic" (fixed latency, µs-jitter), thus creating a deterministic unified Ethernet networking technology. While standard full duplex switched Ethernet is typically best effort or more deterministic, time-triggered traffic is bound only to the system time progression and traffic scheduling, and not to priorities. It can be considered the highest priority traffic, above the highest priority 802.1Q VLAN traffic.
Fault-tolerance:
TTEthernet (i.e. Ethernet switch with SAE AS6802) integrates a model of fault-tolerance and failure management. TTEthernet switch can implement a reliable redundancy management and dataflow (datastream) integration to assure message transmission even in case of a switch failure. The SAE AS6802 implemented on an Ethernet switch supports the design of synchronous system architectures with defined fault-hypothesis.
The single-failure hypothesis, dual-failure hypothesis, and tolerance against arbitrary synchronization disturbances define the basic fault-tolerance concept in a Time-Triggered Ethernet (SAE AS6802-based) network.
Fault-tolerance:
Under the single-failure hypothesis, Time-Triggered Ethernet (SAE AS6802) is intended to tolerate either the fail-arbitrary failure of an end system or the fail-inconsistent-omission failure of a switch. The switches in Time-Triggered Ethernet network can be configured to execute a central bus guardian function. The central bus guardian function ensures that even if a set of end systems becomes arbitrarily faulty, it masks the system-wide impact of these faulty end systems by transforming the fail-arbitrary failure mode into an inconsistent-omission failure mode. The arbitrarily faulty failure mode also includes so called "babbling-idiot" behavior. Time-Triggered Ethernet switches therefore establish fault-containment boundaries.
Fault-tolerance:
Under the dual-failure hypothesis, Time-Triggered Ethernet networks are intended to tolerate two fail-inconsistent-omission faulty devices. These devices may be two end systems, two switches, or an end system and a switch. The last failure scenario (i.e., end system and switch failure) means that Time-Triggered Ethernet network tolerates an inconsistent communication path between end systems. This failure mode is one of the most difficult to overcome.
Fault-tolerance:
Time-Triggered Ethernet networks are intended to tolerate transient synchronization disturbances, even in the presence of permanent failures. Under both single- and dual-failure hypothesis, Time-Triggered Ethernet provides self-stabilization properties. Self-stabilization means that synchronization can reestablish itself, even after a transient upset in a multitude of devices in the distributed computer network.
Performance:
Time-Triggered Traffic Time-triggered traffic is scheduled periodically, and depending on the architecture, line speed (e.g. 1GbE), topology and computing model with control loops operating at 0.1-5(+) kHz, using a time-triggered architecture (TTA) model of computation and communication. Hard real-time is possible at application level due to strict determinism, jitter control and alignment/synchronization between tasks and scheduled network messaging.
Performance:
In L-TTA (Loosely TTA) architectures with synchronous TTEthernet network, but with local computer clocks decoupled from system/network time the performance of control loops may be limited. In this case, time-triggered transmissions are necessarily cyclically scheduled and thus delays between processes in the application layer can be large, e.g. with plesiochronous processes operating on their own local clock and execution cycle, as is observed in systems using cyclic MIL-STD-1553B buses, up to twice the transmission interval due to released packets waiting for scheduled transmission at the source and for the receiving process to run at the destination.
Performance:
Rate-Constrained Traffic Rate constrained traffic is another periodic time-sensitive traffic class, and it shall be modeled to align with time-triggered traffic (and vice versa) in order to fulfill maximum latency and jitter requirements. However, even where the sum of the allocated bandwidths is less than the capacity provided at every point in the network, delivery is still not guaranteed due, e.g., to potential buffer overflows at switch queues, etc., which simple limitation of bandwidths does not guarantee are avoided.
Performance:
Best Effort Traffic Best effort traffic will utilize network bandwidth not used by rate-constrained and time-triggered traffic.
Performance:
In TTEthernet devices, this traffic class cannot interfere with deterministic traffic, as it resides in its own separate buffer memory. Moreover, it implements internal architecture which isolates best effort traffic on partitioned ports, from the traffic assigned to other ports. This mechanism can be associated with fine-grained IP traffic policing, to enable traffic control which is much more robust than VLANs with FIFO buffering.
History:
In 2008, it was announced Honeywell would apply the technology to applications in the aerospace and automation industry.
In 2010 a switch-based implementation was shown to perform better than shared bus systems such as FlexRay for use in automobiles. Since then, Time-Triggered Ethernet has been implemented in different industrial, space and automotive programs and components. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**LW1 (classification)**
LW1 (classification):
LW1 is a para-Alpine standing skiing classification for people with severe lower extreme disabilities in both extremities. It includes both skiers with amputations and cerebral palsy. International classification is done through International Paralympic Committee Alpine Skiing, and national classification through local national sport federations. LW1 classified skiers use outriggers, and two skis or one ski with a prosthesis. Other equipment is used during training such as ski-tips, ski-bras, and short skis.
LW1 (classification):
As this classification includes skiers with cerebral palsy and amputations, there are different skiing techniques used specific to these disability types. For skiers with amputations falling is an important skill to learn, while addressing balance is an important thing for skiers with cerebral palsy to master.
LW1 (classification):
A factoring system is used to allow LW1 competitors to fairly compete against skiers in other standing classifications. At events such as the 1990 Disabled Alpine World Championships, this class had its own medal events. In later events such as the 2002 Winter Paralympics, it was grouped with other classes for a single medal event. Skiers in this class include New Zealanders Adam Hall and Kevin O'Sullivan.
Definition:
LW1 is a standing classification used in para-Alpine skiing but not para-Nordic skiing. LW stands for Locomotor Winter, and the classification is for people with severe lower extreme disabilities in both extremities. They may have cerebral palsy and be classified as CP5 or CP6, or have spina bifida. The International Paralympic Committee explicitly defined this class as "Competitors with severe disabilities in both lower limbs ... The typical disability profile of the class is double above-knee amputation." In 2002, Australian Paralympic Committee defined this classification as a standing skiing classification with "Two skis, two poles, disability in both legs above the knees."For international competitions, classification is done through International Paralympic Committee Alpine Skiing. A national federation such as Alpine Canada handles classification for domestic competitions. When being assessed into this classification, a number of things are considered including reviewing the skiers medical history and medical information on the skier's disability, having a physical and an in person assessment of the skier training or competing.
Equipment:
LW1 classified skiers use outriggers, and two skis or one ski with a prosthesis. International Ski Federation rules for ski boots and binding heights are modified for this class and are not the same rules used for able-bodied skiers. Skiers in this class are allowed to use ski-tips in competition, using a setup sometimes called a Four Track. In training, they may use additional equipment. For example, skiers with cerebral palsy may use cants, wedges, ski-bras, outriggers or short skis depending on the nature of their disability. Skiers with an amputation may use a prosthesis. As skiers in this classification improve, they require less use of this equipment. Ski bras are devices clamped to the tips of skis, which result in the skis being attached to each other. Outriggers are forearm crutches with a miniature ski on a rocker at the base. Cants are wedges that sit under the binding that are intended to more evenly distribute weight, and are customised for the specific needs of the skier. In the Biathlon, athletes with amputations can use a rifle support while shooting.
Technique:
As this classification includes skiers with cerebral palsy and amputations, there are different skiing techniques used specific to these disability types. While skiing, competitors have a wider turning radius as a result of their disability.For skiers in this class with above the knee amputations, how to fall properly is an important skill. They are taught to try to prevent the stump of their leg from hitting the snow as it can cause more damage to that leg than the one that is not partially missing. When working on side stepping, the skier is supported to keep the stump of their leg on the uphill side. Elite skiers are taught to avoid using outriggers as crutches. They are taught to turn using their leg instead of their ski poles. In getting on ski lifts, skiers in this classification with amputations are taught to lift their outriggers off the ground and point them forward.
Technique:
Some skiers with cerebral palsy have better balance while using skis than they would otherwise. This presents challenges for coaches who are working with the skier. Compared to other skiers in the class, the skier with cerebral palsy may tire more quickly. In teaching skiers with cerebral palsy, instructors are encouraged to delay the introduction ski poles as skiers may overgrip them. Use of a ski bra is also encourage as it helps the skier learn correct knee and hip placement. Some skiers with cerebral palsy in this class have difficulty with the snowplough technique.The American Teaching System is one learning method for competitors with cerebral palsy in this classification. Skiers first learn about their equipment, and how to put it on, before learning how to position their body in a standing position on flat terrain. After this, the skier learns how to side step, and then how to fall down and get back up again. The skier then learns how to do a straight run, and then is taught how to get on and off the chair lift. This is followed by learning wedge turns and weight transfers, wedge turns, wide track parallel turns, how to use ski poles, and advanced parallel turns. Skiers with cerebral palsy in this classification have difficulty walking in ski boots, and sometimes require assistance when walking in them. To go up hill, skiers often point their weaker side upwards.In the Biathlon, all Paralympic athletes shoot from a prone position.
Sport:
In disability skiing events, this classification is grouped with standing classes who are seeded to start after visually impaired classes and before sitting classes in the Slalom and Giant slalom. In downhill, Super-G and Super Combined, this same group competes after the visually impaired classes and sitting classes. The skier is required to have their ski poles or equivalent equipment planted in the snow in front of the starting position before the start of the race.A factoring system is used in the sport to allow different classes to compete against each other when there are too few individual competitors in one class in a competition. The factoring system works by having a number for each class based on their functional mobility or vision levels, where the results are calculated by multiplying the finish time by the factored number. The resulting number is the one used to determine the winner in events where the factor system is used. In 2005, the men's Slalom alpine factor was 0.7999898. The LW1 factoring during the 2011/2012 skiing season was 0.838 for Slalom, 0.8233 for Giant Slalom, 0.8203 for Super-G and 0.8462 for downhill.
Events:
This class competed at its own medal events at competitions in the 1990s, before being grouped with other classes. LW1 was not grouped with other classes at the 1990 Disabled Alpine World Championships for disciplines that included the downhill. At the 1992 Winter Paralympics and 1994 Winter Paralympics, it was grouped with LW2 for men's para-Alpine events. For the 1996 Disabled Alpine World Championships, in Lech, Austria, it was grouped with LW3 and LW5 for medal events. At the 1998 Winter Paralympics, the women's LW1, LW3, LW4, LW5 and LW6 classes competed in one group, with LW1, LW3 and LW5 grouped for men's medal events. At the 2002 Winter Paralympics, the LW1, LW4, LW5 and LW6 classes were combined for the women's downhill, giant slalom, and slalom events, while on the men's side, LW1, LW3, LW5 and LW9 were combined for the downhill and giant slalom events. There were no competitors from this class competing at the para-Alpine 2009 World Championships on either the men's side or the women's side.
Competitors:
Skiers in this class include: Austria: Helmut Falch Canada: Wayne Burton, Stephen Ellefson Japan: Tsutomu Mino New Zealand: Adam Hall, Kevin O'Sullivan and Devin Shanks Switzerland: Edwin Zurbriggen United States: Dan Ashbaugh, Andy Fasth, Rod Hernley, Mark Godfrey | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Stress position**
Stress position:
A stress position, also known as a submission position, places the human body in such a way that a great amount of weight is placed on just one or two muscles. For example, a subject may be forced to stand on the balls of their feet, then squat so that their thighs are parallel to the ground. This creates an intense amount of pressure on the legs, leading first to pain and then muscle failure.
Stress position:
Forcing prisoners to adopt such positions is a torture technique that proponents claim leads to extracting information from the person being tortured.
Types of stress position:
Murga punishment Murga (also spelled Murgha) is a stress position used as a corporal punishment mainly in parts of the Indian subcontinent (specifically Northern India, Pakistan and Bangladesh) where the punished person must squat, loop their arms behind their knees and hold their earlobes. The word murga means "chicken" or "rooster", and the name reflects how the adopted pose resembles that of a chicken laying an egg.It is used primarily in educational institutions, domestically, and occasionally by the police as a summary, informal punishment for petty crime. The punishment is usually administered in public view, the purpose being to halt the offense by inflicting pain, deter recurrence of the offense by shaming the offender and providing a salutary example to others.
Types of stress position:
Hands up punishment The Hands up punishment is a stress position given out as punishment in schools of the United States as well as the Indian subcontinent (India, Bangladesh, Nepal, Sri Lanka, Pakistan). In this punishment, one is made to raise his or her hands above their head for a period of time. The recipient of the punishment is not permitted to join their hands above their head, and if they do so punishment time may be increased. The hands up position becomes painful within ten or fifteen minutes. The punishment is usually given for 30 minutes or more at a time. Sometimes one may be required to keep one leg up along with hands. The student is not allowed to change legs. The hands up punishment can also be done two other ways. It can be done with the hands in front of the recipient or out the sides and they cannot raise or lower the arms, only hold them out for a long time. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Wahlquist fluid**
Wahlquist fluid:
In general relativity, the Wahlquist fluid is an exact rotating perfect fluid solution to Einstein's equation with equation of state corresponding to constant gravitational mass density.
Introduction:
The Wahlquist fluid was first discovered by Hugo D. Wahlquist in 1968. It is one of few known exact rotating perfect fluid solutions in general relativity. The solution reduces to the static Whittaker metric in the limit of zero rotation.
Metric:
The metric of a Wahlquist fluid is given by ds2=f(dt−A~dφ)2−r02(ζ2+ξ2)[dζ2(1−k~2ζ2)h~1+dξ2(1+k~2ξ2)h~2+h~1h~2h~1−h~2dφ2] where f=h~1−h~2ζ2+ξ2 A~=r0(ξ2h~1+ζ2h~2h~1−h~2−ξA2) arcsin (k~ζ)] sinh −1(k~ξ)] and ξA is defined by h~2(ξA)=0 . It is a solution with equation of state μ+3p=μ0 where μ0 is a constant.
Properties:
The pressure and density of the Wahlquist fluid are given by p=12μ0(1−κ2f) μ=12μ0(3κ2f−1) The vanishing pressure surface of the fluid is prolate, in contrast to physical rotating stars, which are oblate. It has been shown that the Wahlquist fluid can not be matched to an asymptotically flat region of spacetime. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Random neural network**
Random neural network:
The random neural network (RNN) is a mathematical representation of an interconnected network of neurons or cells which exchange spiking signals. It was invented by Erol Gelenbe and is linked to the G-network model of queueing networks as well as to Gene Regulatory Network models. Each cell state is represented by an integer whose value rises when the cell receives an excitatory spike and drops when it receives an inhibitory spike. The spikes can originate outside the network itself, or they can come from other cells in the networks. Cells whose internal excitatory state has a positive value are allowed to send out spikes of either kind to other cells in the network according to specific cell-dependent spiking rates. The model has a mathematical solution in steady-state which provides the joint probability distribution of the network in terms of the individual probabilities that each cell is excited and able to send out spikes. Computing this solution is based on solving a set of non-linear algebraic equations whose parameters are related to the spiking rates of individual cells and their connectivity to other cells, as well as the arrival rates of spikes from outside the network. The RNN is a recurrent model, i.e. a neural network that is allowed to have complex feedback loops.
Random neural network:
A highly energy-efficient implementation of random neural networks was demonstrated by Krishna Palem et al. using the Probabilistic CMOS or PCMOS technology and was shown to be c. 226–300 times more efficient in terms of Energy-Performance-Product.RNNs are also related to artificial neural networks, which (like the random neural network) have gradient-based learning algorithms. The learning algorithm for an n-node random neural network that includes feedback loops (it is also a recurrent neural network) is of computational complexity O(n^3) (the number of computations is proportional to the cube of n, the number of neurons). The random neural network can also be used with other learning algorithms such as reinforcement learning. The RNN has been shown to be a universal approximator for bounded and continuous functions.
References and sources:
References SourcesE. Gelenbe, Random neural networks with negative and positive signals and product form solution, Neural Computation, vol. 1, no. 4, pp. 502–511, 1989.
E. Gelenbe, Stability of the random neural network model, Neural Computation, vol. 2, no. 2, pp. 239–247, 1990.
E. Gelenbe, A. Stafylopatis, and A. Likas, Associative memory operation of the random network model, in Proc. Int. Conf. Artificial Neural Networks, Helsinki, pp. 307–312, 1991.
E. Gelenbe, F. Batty, Minimum cost graph covering with the random neural network, Computer Science and Operations Research, O. Balci (ed.), New York, Pergamon, pp. 139–147, 1992.
E. Gelenbe, Learning in the recurrent random neural network, Neural Computation, vol. 5, no. 1, pp. 154–164, 1993.
E. Gelenbe, V. Koubi, F. Pekergin, Dynamical random neural network approach to the traveling salesman problem, Proc. IEEE Symp. Syst., Man, Cybern., pp. 630–635, 1993.
E. Gelenbe, C. Cramer, M. Sungur, P. Gelenbe "Traffic and video quality in adaptive neural compression", Multimedia Systems, 4, 357–369, 1996.
C. Cramer, E. Gelenbe, H. Bakircioglu Low bit rate video compression with neural networks and temporal sub-sampling, Proceedings of the IEEE, Vol. 84, No. 10, pp. 1529–1543, October 1996.
E. Gelenbe, T. Feng, K.R.R. Krishnan Neural network methods for volumetric magnetic resonance imaging of the human brain, Proceedings of the IEEE, Vol. 84, No. 10, pp. 1488–1496, October 1996.
E. Gelenbe, A. Ghanwani, V. Srinivasan, "Improved neural heuristics for multicast routing", IEEE J. Selected Areas in Communications, 15, (2), 147–155, 1997.
E. Gelenbe, Z. H. Mao, and Y. D. Li, "Function approximation with the random neural network", IEEE Trans. Neural Networks, 10, (1), January 1999.
E. Gelenbe, J.M. Fourneau '"Random neural networks with multiple classes of signals", Neural Computation, 11, 721–731, 1999.
Ugur Halici "Reinforcement learning with internal expectation for the random neural network", European Journal of Operational Research 126 (2): 288–307, 2000.
Aristidis Likas, Andreas Stafylopatis "Training the random neural network using quasi-Newton methods", European Journal of Operational Research 126 (2): 331–339, 2000.
Samir Mohamed, Gerardo Rubino, Martín Varela "Performance evaluation of real-time speech through a packet network: a random neural networks-based approach", Perform. Eval. 57 (2): 141–161, 2004.
E. Gelenbe, Z.-H. Mao and Y-D. Li "Function approximation by random neural networks with a bounded number of layers", 'Differential Equations and Dynamical Systems', 12 (1&2), 143–170, Jan. April 2004.
Gerardo Rubino, Pierre Tirilly, Martín Varela "Evaluating Users' Satisfaction in Packet Networks Using Random Neural Networks", ICANN (1) 2006: 303–312, 2006.
Gülay Öke and Georgios Loukas. A denial of service detector based on maximum likelihood detection and the random neural network. Computer Journal, 50(6):717–727, November 2007.
S. Timotheou. Nonnegative least squares learning for the random neural network. In Proceedings of the 18th International Conference on Artificial Neural Networks, Prague, Czech Republic, pages 195–204, 2008.
S. Timotheou. A novel weight initialization method for the random neural network. In Fifth International Symposium on Neural Networks (ISNN), Beijing, China, 2008.
Stelios Timotheou. "The Random Neural Network: A Survey", Comput. J. 53 (3): 251–267, 2010.
Pedro Casas, Sandrine Vaton. "On the use of random neural networks for traffic matrix estimation in large-scale IP networks", IWCMC 2010: 326–330, 2010.
S. Basterrech, G. Rubino, "Random Neural Network as Supervised Learning Tool," Neural Network World, 25(5), 457-499, doi:10.14311/NNW.2015.25.024, 2015.
S. Basterrech, S. Mohamed, G. Rubino, M. Soliman. "Levenberg-Marquardt Training Algorithms for Random Neural Networks," Computer Journal, 54 (1), 125–135, 2011.
Michael Georgiopoulos, Cong Li and Taskin Kocak. "Learning in the feed-forward random neural network: A critical review", Performance Evaluation, 68 (4): 361–384, 2011. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**VxInsight**
VxInsight:
VxInsight is a knowledge mining tool developed by Sandia National Laboratories with the Institute for Scientific Information. It allows the user to visualize the relationship between groups of objects in large databases as a 3D landscape.
VxInsight:
In what Hillier et al. call a "pioneering study," VxInsight has been used to analyze gene expression (i.e. microarray) data across a number of conditions in C. elegans. Using VxInsight, Kim et al. were able to cluster genes into "mounts" with coherent functions, and were also able to make novel observations, such as the finding that distinct classes of transposons (such as Tc3 and Mariner transposons) appear to be differentially regulated during development. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Microsoft Commerce Server**
Microsoft Commerce Server:
Microsoft Commerce Server is a Microsoft product for building e-commerce systems using Microsoft .NET technology.
History:
In 1996, Microsoft purchased the core software that formed the basis for the Commerce Server product line from eShop. eShop was co-founded by Pierre Omidyar, one of the founders of eBay.In 1997, the software was rebranded to Microsoft Merchant Server, then Microsoft Site Server, eventually being renamed to Microsoft Commerce Server in 2000.Initially released in 2000, Commerce Server replaced Microsoft Site Server, expanding on the functionality and establishing a focus on e-commerce functionality (rather than concerning itself with document management or content metadata). It helped to create an e-commerce solution or web site with high-performance, familiar tools designed to simplify setup, management, and administration tasks.The last version of the Microsoft-developed product is Microsoft Commerce Server 2009 R2. Microsoft continued to honor extended support of Commerce Server 2009 through 2019. Sitecore now takes responsibility for developing, selling, and supporting the Commerce Server product. The latest release is Sitecore Commerce Server 11, released in 2014.
History in the UK:
Used extensively by a number of middle to large UK retailers, Commerce Server gained considerable traction in the early 2000s. Primarily implemented by Microsoft Partners, the following were sites that at one point were running on a Commerce Server foundation:1990s: England Direct England Cricket Board Manchester United West Indies Cricket Board2000 - 2010 Alba Betterware Blackburn Rovers F.C.
History in the UK:
Blacks Blooming Marvellous Bravissomo Carl Lewis Cath Kidston Charles Tyrwhitt Shirts Choices Clarks Cross Dobbies Dreams Eyestorm French Connection GAME Graham and Green Great Plains Hawkin's Bazaar Hawkshead Lakeland Leicester FC Levi's Links of London Lipsy Liverpool FC LK Bennett Long Tall Sally MacCulloch & Wallis Maclaren Pushchairs Majestic MFI Millets New Look Newcastle FC Nicole Farhi Oddbins Ordnance Survey Oxfam Pearson Publishing Pets at Home Punch Taverns Racing Green Rangers FC Rohan Route One Scotts of Stow Soletraders St Andrews Suit Direct The White Company TM Lewin Toast Toys R Us2010 - onwards Best Buy (UK) Co-op Electrical Co-op Pharmacy Exp Workwear WHSmith UK Microsoft Commerce Server Implementors The following companies were responsible for the vast majority of Microsoft Commerce led ecommerce implementation.
History in the UK:
Conchango - Conchango was bought by EMC in 2008 and rebranded in 2009 to become EMC Consulting e-in-business - The team behind eibDIGITAL moved over to Welcome Digital in 2014.
Maginus Snowvalley - Snow Valley - now part of MICROS Screen Pages TCPL
Components:
System components Commerce Server 2009, which became available on Microsoft's price list on 1 April 2009, introduced multichannel awareness into the product, a new default site (running in Microsoft's SharePoint product), including 30 new web parts and controls, and WYSIWYG (what-you-see-is-what-you-get) editing experiences for business people and site designers.These features were introduced through the new Commerce Foundation - an abstraction layer that unifies calling patterns of the core systems (see below) and allows for different presentation and business logic to be easily added and represented as 'selling channels'; and SharePoint Commerce Services which includes integration with Microsoft SharePoint - a new default site with 30 new web parts and controls pre-assembled. The default site can be skinned through the new page templating technology, allowing for individual pages to be easily changed by selecting a different template.The product still retains its core systems of Catalog, Inventory, Orders, Profiles, and Marketing.
Components:
Other components The server comes bundled with Data Warehouse Analytics, which offer sophisticated reporting functionality, dependent on the availability of Microsoft SQL Server Analytics module, in addition to the Commerce Server Staging (CSS) system. The Staging functionality automates the deployment of both dynamic and active content across a network infrastructure and can accommodate a wide variety of network configurations. (Some have remarked that the speed of CSS deployments is perhaps the most note-worthy aspect of this component.) Commerce Server also comes with BizTalk adaptors, which allow for integration with Microsoft BizTalk for enterprise data manipulation.
Related technologies:
The product requires the presence of Microsoft SQL Server 2005 or later. Commerce Server also can leverage a number of other Microsoft server products, including BizTalk Server 2006, R2, or 2009 and Microsoft Office SharePoint Server (MOSS)..NET Framework 3.5 and Microsoft's Component Object Model (COM) are also required, as the other components used by this product are dependent on these technologies. Recommended deployments are confined to Windows Server 2003 or higher.
Microsoft release history:
2000 - Commerce Server 2000 2002 - Commerce Server 2002 Service Pack 2 (2003) Service Pack 3 (2004) 2004 - Commerce Server 2002 FP1 Service Pack 4 (2006) 2006 - Commerce Server 2007 Service Pack 1 (2007) Service Pack 2 (2008) 2009 - Commerce Server 2009 2011 - Commerce Server 2009 R2 2013 - Service Pack 1
post-Microsoft Release History:
July 2012 - Ascentium Commerce Server 2009 July 2012 - Ascentium Commerce Server 2009 R2 December 2012 - CommerceServer.net Commerce Server 10.0 May 2013 - CommerceServer.net Commerce Server 10.1 May 2013 - Ascentium Commerce Server 2009 R2 Service Pack 1 August 2014 - Sitecore Commerce Server 11.0 October 2014 - Sitecore Commerce Server 11.1
Future development:
The Microsoft Commerce Server business was outsourced to Cactus Commerce (Gatineau, Quebec, Canada) in 2007. After Ascentium purchased Cactus Commerce along with the Microsoft Commerce Server business in 2011, they rebranded the software to Ascentium Commerce Server.Ascentium later rebranded itself as SMITH and split off the Commerce Server product division into a subsidiary known as CommerceServer.net.In November 2013, Sitecore acquired CommerceServer.net.In August 2014, Sitecore released Sitecore Commerce Server 11. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**G3BP1**
G3BP1:
Ras GTPase-activating protein-binding protein 1 is an enzyme that in humans is encoded by the G3BP1 gene.This gene encodes one of the DNA-unwinding enzymes which prefers partially unwound 3'-tailed substrates and can also unwind partial RNA/DNA and RNA/RNA duplexes in an ATP-dependent fashion. This enzyme is a member of the heterogeneous nuclear RNA-binding proteins and is also an element of the Ras signal transduction pathway. It was originally reported to bind specifically to the Ras-GTPase-activating protein by associating with its SH3 domain, but this interaction has recently been challenged. Several alternatively spliced transcript variants of this gene have been described, but the full-length nature of some of these variants has not been determined.G3BP1 can initiate stress granule formation and labeled G3BP1 is commonly used as a marker for stress granules.
Interactions:
G3BP1 has been shown to interact with USP10.
It also interacts with SND1[5]. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Fractionated spacecraft**
Fractionated spacecraft:
A fractionated spacecraft is a satellite architecture where the functional capabilities of a conventional monolithic spacecraft are distributed across multiple modules which interact through wireless links. Unlike other aggregations of spacecraft, such as constellations and clusters, the modules of a fractionated spacecraft are largely heterogeneous and perform distinct functions corresponding, for instance, to the various subsystem elements of a traditional satellite.
History:
The term "fractionated spacecraft" appears to have been coined by Owen Brown and Paul Eremenko in a series of 2006 papers, which argue that a fractionated architecture offers more flexibility and robustness than traditional satellite design during mission operations, and during the design and procurement.
The idea dates back to at least a 1984 article by P. Molette.
History:
Molette's, and later analyses by Rooney, concluded that the benefits of fractionated spacecraft were outweighed by their higher mass and cost. By 2006, Brown and his collaborators claim that the option value of flexibility, the insurance value of improved robustness, and mass production effects will exceed any penalties, and make an analogy with distributed clusters of personal computers (PCs) which are overtaking supercomputers. A 2006 study by the Massachusetts Institute of Technology appears to have corroborated this latter view.
Development:
In 2007, DARPA, the Pentagon's advanced technology organization, issued an announcement soliciting proposals for a program entitled System F6, which aims to prove "the feasibility and benefits" of a fractionated satellite architecture through a space demonstration. The program appears to emphasize wireless networking as a critical technical enabler, along with econometric modeling to assess if and when the architecture is advantageous over conventional approaches DARPA called for open-source development of the networking and communications protocols and interfaces for the fractionated spacecraft modules. This unusual step was presumably in an effort to proliferate the concept and mirror in space the development of the terrestrial Internet.
Development:
In 2008, DARPA announced that contracts for the preliminary development phase of the System F6 program were issued to teams headed by Boeing, Lockheed Martin, Northrop Grumman, and Orbital Sciences.In December 2009 the second phase of the program was awarded to Orbital Sciences, along with IBM and JPL.In February 2010, the European Space Agency (ESA) completed a study on fractionated satellites under the GSTP program.
Development:
On May 16, 2013, DARPA confirmed that they cancelled the Formation-flying Satellite Demo, which means that they closed the project.ANDESITE is a fractionated spacecraft with 8 components, and was launched on June 13, 2020.
Miscellaneous:
Fractionating a communications satellite mission appears to be subject to U.S. Patent 6,633,745, "Satellite cluster comprising a plurality of modular satellites". | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Nasal cavity**
Nasal cavity:
The nasal cavity is a large, air-filled space above and behind the nose in the middle of the face. The nasal septum divides the cavity into two cavities, also known as fossae. Each cavity is the continuation of one of the two nostrils. The nasal cavity is the uppermost part of the respiratory system and provides the nasal passage for inhaled air from the nostrils to the nasopharynx and rest of the respiratory tract.
Nasal cavity:
The paranasal sinuses surround and drain into the nasal cavity.
Structure:
The term "nasal cavity" can refer to each of the two cavities of the nose, or to the two sides combined.
Structure:
The lateral wall of each nasal cavity mainly consists of the maxilla. However, there is a deficiency that is compensated for by the perpendicular plate of the palatine bone, the medial pterygoid plate, the labyrinth of ethmoid and the inferior concha. The paranasal sinuses are connected to the nasal cavity through small orifices called ostia. Most of these ostia communicate with the nose through the lateral nasal wall, via a semi-lunar depression in it known as the semilunar hiatus. The hiatus is bound laterally by a projection known as the uncinate process. This region is called the ostiomeatal complex.The roof of each nasal cavity is formed in its upper third to one half by the nasal bone and more inferiorly by the junctions of the upper lateral cartilage and nasal septum. Connective tissue and skin cover the bony and cartilaginous components of the nasal dorsum.
Structure:
The floor of the nasal cavities, which also form the roof of the mouth, is made up by the bones of the hard palate: the horizontal plate of the palatine bone posteriorly and the palatine process of the maxilla anteriorly. The most anterior part of the nasal cavity is the nasal vestibule. The vestibule is enclosed by the cartilages of the nose and lined by the same epithelium of the skin (stratified squamous, keratinized). Within the vestibule this changes into the typical respiratory epithelium that lines the rest of the nasal cavity and respiratory tract. Inside the nostrils of the vestibule are the nasal hair, which filter dust and other matter that are breathed in. The back of the cavity blends, via the choanae, into the nasopharynx.
Structure:
The nasal cavity is divided in two by the vertical nasal septum. On the side of each nasal cavity are three horizontal outgrowths called nasal conchae (singular "concha") or turbinates. These turbinates disrupt the airflow, directing air toward the olfactory epithelium on the surface of the turbinates and the septum. The vomeronasal organ is located at the back of the septum and has a role in pheromone detection.
Structure:
Segments The nasal cavity is divided into two segments: the respiratory segment and the olfactory segment.
Structure:
The respiratory segment comprises most of each nasal cavity, and is lined with ciliated pseudostratified columnar epithelium (also called respiratory epithelium). The conchae, or turbinates, are located in this region. The turbinates have a very vascularized lamina propria (erectile tissue) allowing the venous plexuses of their mucosa to engorge with blood, restricting airflow and causing air to be directed to the other side of the nose, which acts in concert by shunting blood out of its turbinates. This cycle occurs approximately every two and a half hours.
Structure:
The olfactory segment is lined with a specialized type of pseudostratified columnar epithelium, known as olfactory epithelium, which contains receptors for the sense of the smell. This segment is located in and beneath the mucosa of the roof of each nasal cavity and the medial side of each middle turbinate. Histological sections appear yellowish-brown due to the presence of lipofuscin pigments. Olfactory mucosal cell types include bipolar neurons, supporting (sustentacular) cells, basal cells, and Bowman's glands. The axons of the bipolar neurons form the olfactory nerve (cranial nerve I) which enters the brain through the cribriform plate. Bowman's glands are serous glands in the lamina propria, whose secretions trap and dissolve odoriferous substances.
Structure:
Blood supply There is a rich blood supply to the nasal cavity.
Blood supply comes from branches of both the internal and external carotid artery, including branches of the facial artery and maxillary artery. The named arteries of the nose are: Sphenopalatine artery and greater palatine artery, branches of the maxillary artery.
Anterior ethmoidal artery and posterior ethmoidal artery, branches of the ophthalmic artery Septal branches of the superior labial artery, a branch of the facial artery, which supplies the vestibule of the nasal cavity.
Nerve supply Innervation of the nasal cavity responsible for the sense of smell is via the olfactory nerve, which sends microscopic fibers from the olfactory bulb through the cribriform plate to reach the top of the nasal cavity.
Structure:
General sensory innervation is by branches of the trigeminal nerve (V1 & V2): Nasociliary nerve (V1) Anterior Ethmoidal nerve from the nasociliary nerve (V1) Posterior nasal branches of Maxillary nerve (V2)The nasal cavity is innervated by autonomic fibers. Sympathetic innervation to the blood vessels of the mucosa causes them to constrict, while the control of secretion by the mucous glands is carried on postganglionic parasympathetic nerve fibers originating from the facial nerve.
Function:
The two nasal cavities condition the air to be received by the other areas of the respiratory tract. Owing to the large surface area provided by the nasal conchae (also known as turbinates), the air passing through the nasal cavity is warmed or cooled to within 1 degree of body temperature. In addition, the air is humidified, and dust and other particulate matter is removed by nasal hair in the nostrils. The entire mucosa of the nasal cavity is covered by a blanket of mucus, which lies superficial to the microscopic cilia and also filters inspired air. The cilia of the respiratory epithelium move the secreted mucus and particulate matter posteriorly towards the pharynx where it passes into the esophagus and is digested in the stomach. The nasal cavity also houses the sense of smell and contributes greatly to taste sensation through its posterior communication with the mouth via the choanae.
Clinical significance:
Diseases of the nasal cavity include viral, bacterial and fungal infections, nasal cavity tumors, both benign and much more often malignant, as well as inflammations of the nasal mucosa.
Many problems can affect the nose, including: Deviated septum - a shifting of the wall that divides the nasal cavity into halves Nasal polyps - soft growths that develop on the lining of the nose or sinuses Nosebleeds Rhinitis - inflammation of the nose and sinuses sometimes caused by allergies. The main symptom is a runny nose.
Nasal fractures, also known as a broken nose Common cold Sinonasal tumors | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**SAPICA**
SAPICA:
SAPICA (サピカ, Sapika) is a rechargeable contactless smart card ticketing system for public transport in Sapporo, Japan. Sapporo City Transportation Bureau (SCTB) introduced the system from January 30, 2009. The name of the card means "Sapporo's IC card". Sa' (サッ) is also the sound symbolic word for quickly pulling a card out and pi' (ピッ) is the sound equivalent to "beep". The card is issued by Sapporo Information Network Company (札幌総合情報センター株式会社, Sapporo Sōgō Jōhō Sentā Kabushiki Gaisha), the third sector (half public) company of Sapporo City Government.
SAPICA:
The integrated service with Kitaca, a smart card system by JR Hokkaidō, was initially considered, but they decided to introduce the different systems because of the technical and financial difficulties. The two operators initially hoped to start an integrated service, but as of February 2020 Sapica still can not be used on JR services.While using the same FeliCa chip as Suica and Kitaca, SCTB intentionally uses a different system code and encryption key to break compatibility to avoid JR East licensing fees.From 2001 to 2004, Sapporo Municipal Subway experimented a different smart card called S.M.A.P. Card (S.M.A.P.カード, Sumappu Kādo).
Usable area:
As of its introduction on January 30, 2009, the card is usable on Sapporo Municipal Subway Lines, as well as on the Sapporo Streetcar, Hokkaido Chuo Bus, JR Hokkaido Bus and Jotetsu Buses. SAPICA can also be used as a payment card at participating stores and vending machines.
Types of cards:
Unregistered SAPICA: For adults only.
Registered SAPICA: For adults and children. A card can be reissued when a user lost it.
SAPICA commuter's pass: For adults and children, with registrations. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Pound for pound**
Pound for pound:
Pound for pound is a ranking used in combat sports, such as boxing, wrestling, or mixed martial arts, of who the better fighters are irrespective of their weight, i.e. adjusted to compensate for weight class. As these fighters do not compete directly, judging the best fighter pound for pound is subjective, and ratings vary.
Boxing:
In boxing, the term was historically associated with fighters such as Benny Leonard and Sugar Ray Robinson who were widely considered to be the most skilled fighters of their day, to distinguish them from the generally more popular (and better compensated) heavyweight champions. Since 1990, The Ring magazine has maintained a pound for pound ranking of fighters.
Mixed martial arts:
Some mixed martial arts promotions have pound-for-pound rankings, including Ultimate Fighting Championship since 2013, ONE Championship since 2020, and Bellator MMA since 2021. There are also multiple unofficial MMA pound-for-pound rankings, including by ESPN.com, Sherdog, Fight Matrix, MMA Fighting and Tapology.
Kickboxing / Muay Thai:
ONE Championship publishes pound-for-pound rankings for kickboxing and Muay Thai since 2020. Combat Press and Beyond Kick also publish pound-for-pound rankings for kickboxing. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Analytically irreducible ring**
Analytically irreducible ring:
In algebra, an analytically irreducible ring is a local ring whose completion has no zero divisors. Geometrically this corresponds to a variety with only one analytic branch at a point.
Analytically irreducible ring:
Zariski (1948) proved that if a local ring of an algebraic variety is a normal ring, then it is analytically irreducible. There are many examples of reduced and irreducible local rings that are analytically reducible, such as the local ring of a node of an irreducible curve, but it is hard to find examples that are also normal. Nagata (1958, 1962, Appendix A1, example 7) gave such an example of a normal Noetherian local ring that is analytically reducible.
Nagata's example:
Suppose that K is a field of characteristic not 2, and K [[x,y]] is the formal power series ring over K in 2 variables. Let R be the subring of K [[x,y]] generated by x, y, and the elements zn and localized at these elements, where w=∑m>0amxm is transcendental over K(x) z1=(y+w)2 zn+1=(z1−(y+∑0<m<namxm)2)/xn .Then R[X]/(X 2–z1) is a normal Noetherian local ring that is analytically reducible. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Hybrid computer**
Hybrid computer:
Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex problems.
History:
The first desktop hybrid computing system was the Hycomp 250, released by Packard Bell in 1961. Another early example was the HYDAC 2400, an integrated hybrid computer released by EAI in 1963. In the 1980s, Marconi Space and Defense Systems Limited (under Peggy Hodges) developed their "Starglow Hybrid Computer", which consisted of three EAI 8812 analog computers linked to an EAI 8100 digital computer, the latter also being linked to an SEL 3200 digital computer. Late in the 20th century, hybrids dwindled with the increasing capabilities of digital computers including digital signal processors.In general, analog computers are extraordinarily fast, since they are able to solve most mathematically complex equations at the rate at which a signal traverses the circuit, which is generally an appreciable fraction of the speed of light. On the other hand, the precision of analog computers is not good; they are limited to three, or at most, four digits of precision.
History:
Digital computers can be built to take the solution of equations to almost unlimited precision, but quite slowly compared to analog computers. Generally, complex mathematical equations are approximated using iterative methods which take huge numbers of iterations, depending on how good the initial "guess" at the final value is and how much precision is desired. (This initial guess is known as the numerical "seed".) For many real-time operations in the 20th century, such digital calculations were too slow to be of much use (e.g., for very high frequency phased array radars or for weather calculations), but the precision of an analog computer is insufficient.
History:
Hybrid computers can be used to obtain a very good but relatively imprecise 'seed' value, using an analog computer front-end, which is then fed into a digital computer iterative process to achieve the final desired degree of precision. With a three or four digit, highly accurate numerical seed, the total digital computation time to reach the desired precision is dramatically reduced, since many fewer iterations are required. One of the main technical problems to be overcome in hybrid computers is minimizing digital-computer noise in analog computing elements and grounding systems.
History:
Consider that the nervous system in animals is a form of hybrid computer. Signals pass across the synapses from one nerve cell to the next as discrete (digital) packets of chemicals, which are then summed within the nerve cell in an analog fashion by building an electro-chemical potential until its threshold is reached, whereupon it discharges and sends out a series of digital packets to the next nerve cell. The advantages are at least threefold: noise within the system is minimized (and tends not to be additive), no common grounding system is required, and there is minimal degradation of the signal even if there are substantial differences in activity of the cells along a path (only the signal delays tend to vary). The individual nerve cells are analogous to analog computers; the synapses are analogous to digital computers.
History:
Hybrid computers are distinct from hybrid systems. The latter may be no more than a digital computer equipped with an analog-to-digital converter at the input and/or a digital-to-analog converter at the output, to convert analog signals for ordinary digital signal processing, and conversely, e.g., for driving physical control systems, such as servomechanisms.
VLSI hybrid computer chip:
In 2015, researchers at Columbia University published a paper on a small scale hybrid computer in 65 nm CMOS technology. This 4th-order VLSI hybrid computer contains 4 integrator blocks, 8 multiplier/gain-setting blocks, 8 fanout blocks for distributing current-mode signals, 2 ADCs, 2 DACs and 2 SRAMs blocks. Digital controllers are also implemented on the chip for executing the external instructions. A robot experiment in the paper demonstrates the use of the hybrid computing chip in today's emerging low-power embedded applications. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Common iliac lymph nodes**
Common iliac lymph nodes:
The common iliac lymph nodes, four to six in number, are grouped behind and on the sides of the common iliac artery, one or two being placed below the bifurcation of the aorta, in front of the fifth lumbar vertebra.
They drain chiefly the hypogastric and external iliac glands, and their efferents pass to the lateral aortic glands. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Terizidone**
Terizidone:
Terizidone is a drug used in the treatment of tuberculosis. Terizidone is mainly used in multi-drug-resistant tuberculosis (MDR-TB) in conjunction with other second-line drugs. It is a derivate of cycloserine and it is bacteriostatic. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Phosphorylcholine**
Phosphorylcholine:
Phosphorylcholine (abbreviated ChoP) is the hydrophilic polar head group of some phospholipids, which is composed of a negatively charged phosphate bonded to a small, positively charged choline group. Phosphorylcholine is part of the platelet-activating factor; the phospholipid phosphatidylcholine and sphingomyelin, the only phospholipid of the membrane that is not built with a glycerol backbone. Treatment of cell membranes, like those of RBCs, by certain enzymes, like some phospholipase A2, renders the phosphorylcholine moiety exposed to the external aqueous phase, and thus accessible for recognition by the immune system. Antibodies against phosphorylcholine are naturally occurring autoantibodies that are created by CD5+/B-1 B cells and are referred to as non-pathogenic autoantibodies.
Thrombus-resistant stents:
In interventional cardiology, phosphorylcholine is used as a synthetic polymer-based coating, applied to drug-eluting stents, to prevent the occurrence of coronary artery restenosis. The first application of this approach for use of stents evolved from efforts by Hayward, Chapman et al., who showed that the phosphorylcholine component of the outer surface of the erythrocyte bilayer was non-thrombogenic. Until 2002, over 120,000 phosphorylcholine-coated stents have been implanted in patients with no apparent deleterious effect in the long term compared to bare metal stent technologies.
Thrombus-resistant stents:
Phosphorylcholine polymer-based drug-eluting stents Drug-eluting stents (DES) are used by interventional cardiologists, operating on patients with coronary artery disease. The stent is inserted into the artery via a balloon angioplasty. This will dilate the diameter of the coronary artery and keep it fixed in this phase so that more blood flows through the artery without the risk of blood clots (atherosclerosis).Phosphorylcholine is used as the polymer-based coating of a DES because its molecular design improves surface biocompatibility and lowers the risk of causing inflammation or thrombosis. Polymer coatings of stents that deliver the anti-proliferative drug Zotarolimus to the arterial vessel wall are components of these medical devices. For targeted local delivery of Zotarolimus to the artery, the drug is incorporated into a methacrylate-based copolymer that includes a synthetic form of phosphorylcholine. This use of biomimicry, or the practice of using polymers that occur naturally in biology, provides a coating with minimal thrombus deposition and no adverse clinical effect on late healing of the arterial vessel wall. Not only is the coating non-thrombogenic, but it also exhibits other features that should be present when applying such a material to a medical device for long-term implantation. These include durability, neutrality to the chemistry of the incorporated drug and ability for sterilization using standard methods which do not affect drug structure or efficiency | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Halo mass function**
Halo mass function:
In cosmology, the halo mass function is a mass distribution of dark matter halos. Specifically, it gives the number density of dark matter halos per mass interval. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**Retinal birefringence scanning**
Retinal birefringence scanning:
Retinal birefringence scanning (RBS) is a method for detection the central fixation of the eye. The method can be used in pediatric ophthalmology for screening purposes. By simultaneously measuring the central fixation of both eyes, small- and large-angle strabismus can be detected. The method is not invasive and requires little cooperation by the patient, so it can be used for detecting strabismus in young children. The method provides a reliable detection of strabismus and has also been used for detecting certain kinds of amblyopia. RBS uses the human eye's birefringent properties to identify the position of the fovea and the direction of gaze, and thereby to measure any binocular misalignment.
Principle:
Birefringent material has a refractive index that depends on the polarization state and propagation direction of light. The main contribution to the birefringence of the eye stems from the Henle fibers. These fibers (named after Friedrich Gustav Jakob Henle) are photoreceptor axons that are arranged in a radially symmetric pattern, extending outward from the fovea, which is the most sensitive part of the retina. When polarized light strikes the fovea, the layer of Henle fibers produces a characteristic pattern, and the strength and contrast of this pattern, as well as the orientation of its bright parts, depend on the polarization of the light that reaches the retina. An analysis of this pattern allows the position of the fovea and the direction of gaze to be determined.Binocular RBS has been used for diagnosing strabismus (including microstrabismus) in young children, and has also been proposed for diagnosing amblyopia by detecting strabismus and by detecting reduced fixation accuracy.
Limitations:
However, also birefringent properties of the cornea and the retinal nerve fiber layer are sources of birefringence. Corneal birefringence varies widely from one individual to another, as well as from one location to another for the same individual, thus can confound measurements. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
**CDAN1**
CDAN1:
The human CDAN1 gene encodes the protein Codanin 1.
This protein that appears to play a role in nuclear envelope integrity, possibly related to microtubule attachments. Mutations in this gene cause congenital dyserythropoietic anemia type I, a disease resulting in morphological and functional abnormalities of erythropoiesis. | kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.