source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/E-dense%20semigroup |
In abstract algebra, an E-dense semigroup (also called an E-inversive semigroup) is a semigroup in which every element a has at least one weak inverse x, meaning that xax = x. The notion of weak inverse is (as the name suggests) weaker than the notion of inverse used in a regular semigroup (which requires that axa=a).
The above definition of an E-inversive semigroup S is equivalent with any of the following:
for every element a ∈ S there exists another element b ∈ S such that ab is an idempotent.
for every element a ∈ S there exists another element c ∈ S such that ca is an idempotent.
This explains the name of the notion as the set of idempotents of a semigroup S is typically denoted by E(S).
The concept of E-inversive semigroup was introduced by Gabriel Thierrin in 1955. Some authors use E-dense to refer only to E-inversive semigroups in which the idempotents commute.
More generally, a subsemigroup T of S is said dense in S if, for all x ∈ S, there exists y ∈ S such that both xy ∈ T and yx ∈ T.
A semigroup with zero is said to be an E*-dense semigroup if every element other than the zero has at least one non-zero weak inverse. Semigroups in this class have also been called 0-inversive semigroups.
Examples
Any regular semigroup is E-dense (but not vice versa).
Any eventually regular semigroup is E-dense.
Any periodic semigroup (and in particular, any finite semigroup) is E-dense.
See also
Dense set
E-semigroup
References
Further reading
Mitsch, H. "Introduction to E-inversive semigroups." Semigroups : proceedings of the international conference ; Braga, Portugal, June 18–23, 1999. World Scientific, Singapore. 2000.
Semigroup theory
Algebraic structures |
https://en.wikipedia.org/wiki/E-semigroup | In the area of mathematics known as semigroup theory, an E-semigroup is a semigroup in which the idempotents form a subsemigroup.
Certain classes of E-semigroups have been studied long before the more general class, in particular, a regular semigroup that is also an E-semigroup is known as an orthodox semigroup.
Weipoltshammer proved that the notion of weak inverse (the existence of which is one way to define E-inversive semigroups) can also be used to define/characterize E-semigroups as follows: a semigroup S is an E-semigroup if and only if, for all a and b ∈ S, W(ab) = W(b)W(a), where W(a) ≝ {x ∈ S | xax = x} is the set of weak inverses of a.
References
Semigroup theory
Algebraic structures |
https://en.wikipedia.org/wiki/International%20Requirements%20Engineering%20Conference | The International Requirements Engineering Conference (RE), is one of the largest annual software engineering conferences. It has an 'A' rating from the Australian Ranking of ICT Conferences and an 'A1' rating from the Brazilian ministry of education.
The RE conference originally started as two alternating biennial conferences.
The first of these was the International Symposium on Requirements Engineering (RE), starting in 1993.
The second was the International Conference on Requirements Engineering (ICRE), starting in 1994. In 2002, these two conference series merged under the name Joint International Requirements Engineering Conference (RE'02).
Also starting in 2002, the conference venue began rotating between three general locations: Europe, North America, and a non-European, non-North American location. Since 2003, the conference series has been known as the International Requirements Engineering Conference.
List of Conferences
Past and future RE conferences include:
Most Influential Paper Award
Beginning with the 11th RE in 2003, an award was given for the paper deemed to be the most influential paper published from the conference held 10 years earlier. The judging for this award is done by the program committee for the current conference. If more than one award is given, the papers receiving the awards are categorized.
References
Software engineering conferences |
https://en.wikipedia.org/wiki/Seeblatt | (, German for 'lake leaf', plural ; ; ; East Frisian: Pupkeblad) is the term for the stylized leaf of a water lily, used as a charge in heraldry.
Background
This charge is used in the heraldry of Germany, the Netherlands and Scandinavia, but not so much in France and Britain. Seeblätter feature prominently on the coat of arms of Denmark as well as on Danish coins.
In West Frisian, the term pompeblêd is used. The name is used to indicate the seven red lily leaf-shaped blades on the Frisian flag. The seven red pompeblêden (leaves of the yellow water lily and the European white waterlily) refer to the medieval Frisian 'sea districts': more or less autonomous regions along the Southern North Sea coast from the city of Alkmaar to the Weser River. There never have been exactly seven of these administrative units, the number of seven bears the suggestion of 'a lot'. Late medieval sources identify seven Frisian districts, though with different names. The most important regions were West Friesland, Westergo, Oostergo, Hunsingo, Fivelingo, Reiderland, Emsingo, Brokmerland, Harlingerland and Rüstringen (Jeverland and Butjadingen).
Gallery
See also
Flag of Friesland (province)
Heart (symbol)
Cardioid, a geometrical curve resembling the outline of a seeblatt
SC Heerenveen, Dutch football club whose home kit features seven lily-shaped blades
References
Symbols
Heraldic charges
Visual motifs |
https://en.wikipedia.org/wiki/HistoryWorld | HistoryWorld is an interactive online history encyclopaedia that seeks to make world history more easily accessible through interactive narratives and timelines. It was established by Bamber Gascoigne who started developing it in 1994. It went online in June 2001 and in 2002 it won the New Statesman New Media award for the best educational website. In 2007 Gascoigne launched a related site, at TimeSearch , using timelines as a way of searching the internet.
HistoryWorld currently consists of about 300 narratives and some 10,000 events on searchable timelines. All the content (apart from "The Wellcome History of Medicine", by Dr Carole Reeves) has been written by Gascoigne.
The HistoryWorld website, which is free to use, also contains more than 5000 entries from Gascoigne's Encyclopedia of Britain, originally published by Macmillan in 1993, and a pilot project, Places in History for Richmond-upon-Thames, which uses placemarks in Google Maps to identify the exact position of a building, street or other feature, with a satellite view of the location. The maps then link to pages in HistoryWorld for historical details, images and timelines.
Harvey McGavin, writing in the TES, said that the history website "is remarkably easy to navigate" and "should help teachers and pupils find all the answers".
References
External links
Official website
2001 establishments in England
Encyclopedias of history
Online encyclopedias
Internet properties established in 2001
British online encyclopedias |
https://en.wikipedia.org/wiki/Walking%20excavator | A walking excavator or popularly spider excavator is a special type of all-terrain excavator. Like the regular excavator it consists of a boom, stick, bucket and cab on a rotating platform known as the "house". However, its house sits atop an undercarriage consisting of leg or arm-like extensions with or without wheels. All extensions can move in increments, hence the name walking excavator. This is different from an early 20th century dragline excavator where a set of feet plate are alternately lifted and lowered.
History
Most traditional excavators have tracks or wheels as undercarriage, limiting their usability on steep inclines, uneven terrain or inaccessible positions.
In 1966, Edwin Ernst Menzi (1897–1984) and Joseph Kaiser (1928–1993) together invented the walking excavator for work on mountain slopes. Subsequently, Kaiser AG, Schaanwald, Liechtenstein, and Menzi Muck AG, Kriessern, Switzerland, developed excavators separately.
Despite the advantages of the design, it failed to be widely used for a number of reasons, including the relatively small gain in mobility; the fact that most excavation is done in urban areas; and costliness, both of the electro-hydraulic controls and of maintenance.
The walking excavator is still not well known to the general public.
Today, only walking excavators and forest harvesters, such as the Ecolog forest harvester or the TimberPro tilt cab, are designed to move and work in mountains.
Economic success
In 2007, Kaiser AG, Schaanwald, Liechtenstein, realized a turnover of nearly 60 million Swiss francs.
In 2013, Menzi Muck AG had a turnover of 56.93 million Swiss francs.
In 2014, Kaiser AG had a turnover of 70 million Swiss francs.
Design
The walking excavator's main feature is the ability to move in a crab- or spider-like fashion and hence overcome any terrain obstacle. The undercarriage design varies widely from model to model and between specialized roles. The number of legs or wheels can also vary from three (Menzi Mu |
https://en.wikipedia.org/wiki/Epsilon%20photography | Epsilon photography is a form of computational photography wherein multiple images are captured with slightly varying camera parameters (each image varying the parameter by a small amount ε, hence the name) such as aperture, exposure, focus, film speed and viewpoint for the purpose of enhanced post-capture flexibility. The term was coined by Prof. Ramesh Raskar. The technique has been developed as an alternative to light field photography that requires no specialized equipment. Examples of epsilon photography include focal stack photography, High dynamic range (HDR) photography, lucky imaging, multi-image panorama stitching and confocal stereo. The common thread for all the aforementioned imaging techniques is that multiple images are captured in order to produce a composite image of higher quality, such as richer color information, wider-field of view, more accurate depth map, less noise/blur and greater resolution.
Since Epsilon photography at times may require the capture of hundreds of images, recently an alternative called Compressive Epsilon Photography was proposed where one captures only a select few images instead and generates the rest of the images of the stack by making use of prior information about the scene or relationship among the images in the stack. The reconstructed stack of images can be used as before for novel photography applications such as light field recovery, depth estimation, refocusing and synthetic aperture photography.
Sources
See also
Computational photography
Digital photography
Image processing |
https://en.wikipedia.org/wiki/Civet%20%28perfumery%29 | Civet (Zibeth; Zibet; Zibetum), also known as civet musk and civet oil, is the glandular secretion produced by both sexes of Viverridae species.
Production
A number of viverrid species secrete civet oil in their perineal glands, including the African civet (Civettictis civetta), large Indian civet (Viverra zibetha), and small Indian civet (Viverricula indica). Most civet is produced in African farms, where African civets are kept in cages for this purpose. African civets typically produce three to four grams of civet per week. In 2000, civet sold for about five hundred dollars per kilogram.
Civet is a soft, almost liquid material. It is pale yellow when fresh, darkening in the light and becoming salve-like in consistency. Its odor is strong, even putrid as a pure substance, but once diluted it is pleasantly and sweetly aromatic. It is prepared for use in perfumery by solvent extraction to yield either a tincture (10 or 20 percent), an absolute, or a resinoid.
Composition
The chemical in civet oil that gives it most of its distinctive odor is civetone, at a concentration of between 2.5 and 3.4%. The oil also includes various other ketones such as cyclopentadecanone, cyclohexadecanone, cycloheptadecanone, and 6-cis-cycloheptadecenone. The animal scent is reinforced by the presence of smaller amounts of indole and skatole, which in African civet are present at a concentration of about 1%.
Uses
Civet has a distinctly different odor from musk and was formerly a versatile ingredient of fine fragrances. It is being displaced by 5-cyclohexadecen-1-one (Ambretone) which is more easily synthesized.
Civet absolute (CAS# 68916-26-7) is used as a flavor and in perfumery.
Safety
The United States does not allow civets to be imported, as the species can transmit the SARS virus. The US does however permit the importation of civet oil, as long as it has been treated to ensure it is noninfectious.
Name
The name derives from the Arabic زباد zabād or سنور الزباد sinnawr al |
https://en.wikipedia.org/wiki/Wear%20coefficient | The wear coefficient is a physical coefficient used to measure, characterize and correlate the wear of materials.
Background
Traditionally, the wear of materials has been characterized by weight loss and wear rate. However, studies have found that wear coefficient is more suitable. The reason being that it takes the wear rate, the applied load, and the hardness of the wear pin into account. Although, measurement variations by an order of 10-1 have been observed, the variations can be minimized if suitable precautions are taken.
A wear volume versus distance curve can be divided into at least two regimes, the transient wear regime and the steady-state wear regime. The volume or weight loss is initially curvilinear. The wear rate per unit sliding distance in the transient wear regime decreases until it has reached a constant value in the steady-state wear regime. Hence the standard wear coefficient value obtained from a volume loss versus distance curve is a function of the sliding distance.
Measurement
The steady-state wear equation was proposed as:
where is the Brinell hardness, is the volumetric loss, is the normal load, and is the sliding distance.
is the dimensionless standard wear coefficient.
Therefore, the wear coefficient in the abrasive model is defined as:
As can be estimated from weight loss and the density , the wear coefficient can also be expressed as:
As the standard method uses the total volume loss and the total sliding distance, there is a need to define the net steady-state wear coefficient:
where is the steady-state sliding distance, and is the steady-state wear volume.
With regard to the sliding wear model K can be expressed as:
where is the plastically deformed zone.
If the coefficient of friction is defined as:
where is the tangential force.
Then K can be defined for abrasive wear as work done to create abrasive wear particles by cutting to external work done :
In an experimental situation the hardness of the upperm |
https://en.wikipedia.org/wiki/Tame%20abstract%20elementary%20class | In model theory, a discipline within the field of mathematical logic, a tame abstract elementary class is an abstract elementary class (AEC) which satisfies a locality property for types called tameness. Even though it appears implicitly in earlier work of Shelah, tameness as a property of AEC was first isolated by Grossberg and VanDieren, who observed that tame AECs were much easier to handle than general AECs.
Definition
Let K be an AEC with joint embedding, amalgamation, and no maximal models. Just like in first-order model theory, this implies K has a universal model-homogeneous monster model . Working inside , we can define a semantic notion of types by specifying that two elements a and b have the same type over some base model if there is an automorphism of the monster model sending a to b fixing pointwise (note that types can be defined in a similar manner without using a monster model). Such types are called Galois types.
One can ask for such types to be determined by their restriction on a small domain. This gives rise to the notion of tameness:
An AEC is tame if there exists a cardinal such that any two distinct Galois types are already distinct on a submodel of their domain of size . When we want to emphasize , we say is -tame.
Tame AECs are usually also assumed to satisfy amalgamation.
Discussion and motivation
While (without the existence of large cardinals) there are examples of non-tame AECs, most of the known natural examples are tame. In addition, the following sufficient conditions for a class to be tame are known:
Tameness is a large cardinal axiom: There are class-many almost strongly compact cardinals iff any abstract elementary class is tame.
Some tameness follows from categoricity: If an AEC with amalgamation is categorical in a cardinal of high-enough cofinality, then tameness holds for types over saturated models of size less than .
Conjecture 1.5 in : If K is categorical in some λ ≥ Hanf(K) then there exists χ < Hanf( |
https://en.wikipedia.org/wiki/Pseudo-intersection | In mathematical set theory, a pseudo-intersection of a family of sets is an infinite set S such that each element of the family contains all but a finite number of elements of S. The pseudo-intersection number, sometimes denoted by the fraktur letter 𝔭, is the smallest size of a family of infinite subsets of the natural numbers that has the strong finite intersection property but has no pseudo-intersection.
References
Set theory |
https://en.wikipedia.org/wiki/Sony%20ILCE-QX1 | The Sony ILCE-QX1 is a mobile device mountable, Wi-Fi-controlled, lens-style compact camera manufactured by Sony and was announced on 3 September 2014. Part of the Sony α family, it is one of Sony's "Smart Lens" cameras, alongside the QX10, QX30 and QX100, that are designed to be specifically used with a smartphone. It has a 20.1 megapixel APS-C-size sensor, uses an interchangeable E-mount lens as its highlight feature, supports power zoom but no in-body image stabilization, and has a pop-up flash unlike its other QX siblings.
Features
On the ILCE-QX1 itself, there are buttons for on/off, flash pop-up, lens release and shutter, which are enough for standalone shooting. But due to its lens-style design, the camera module requires an iOS or Android device, connected through the camera's Wi-Fi via the Imaging Edge (formerly PlayMemories) Mobile application, to utilize the device's screen as its viewfinder and camera controls, while also serving as additional storage medium via its integrated wireless file transfer feature.
The ILCE-QX1 allows capture in RAW format, but RAW files can only be directly wirelessly transferred to Android devices, not, as of September 2014, to iOS.Video capture is possible in Full HD at 30 fps, and battery life for still capture is rated at 440 shots.
See also
Olympus Air
Sony ILCE camera
Sony QX series
List of Sony E-mount cameras
List of lightest mirrorless cameras
References
External links
Products introduced in 2014
ILCE-QX1
QX1 |
https://en.wikipedia.org/wiki/Cloud%20mining | Cloud mining is the process of cryptocurrency mining utilizing a remote data center with shared processing power.
This type of cloud mining enables users to mine bitcoins or alternative cryptocurrencies without managing the hardware. The mining rigs are housed and maintained in a facility owned by mining company and the customer simply needs to register and purchase mining contracts or shares. Since cloud mining is provided as a service, there is generally some cost and this can result in lower returns for the miner.
Types of hosting
Users of hosted mining equipment can either lease a physical mining server or a virtual private server and install mining software on the machine. Instead of leasing a dedicated server, some services offer hashing power hosted in data centers for sale denominated in Gigahash/seconds (GH/s); users either select a desired amount of hashing power and a period for the contract or in some cases can trade their hashing power.
See also
Mining pool
References
External links
Bitcoin
Cryptocurrencies |
https://en.wikipedia.org/wiki/The%20Machine%20%28computer%20architecture%29 | The Machine is the name of an experimental computer made by Hewlett Packard Enterprise. It was created as part of a research project to develop a new type of computer architecture for servers. The design focused on a “memory centric computing” architecture, where NVRAM replaced traditional DRAM and disks in the memory hierarchy. The NVRAM was byte addressable and could be accessed from any CPU via a photonic interconnect. The aim of the project was to build and evaluate this new design.
Hardware overview
The Machine was a computer cluster with many individual nodes connected over a memory fabric. The fabric interconnect used VCSEL-based silicon photonics with a custom chip called the X1. Access to memory is non-uniform and may include multiple hops. The Machine was envisioned to be a rack-scale computer initially with 80 processors and 320 TB of fabric attached memory, with potential for scaling to more enclosures up to 32 ZB. The fabric attached memory is not cache coherent and requires software to be aware of this property. Since traditional locks need cache coherency, hardware was added to the bridges to do atomic operations at that level. Each node also has a limited amount of local private cache-coherent memory (256 GB). Storage and compute on each node had completely separate power domains.
The whole fabric attached memory of The Machine is too large to be mapped into a processor's virtual address space (which was 48-bits wide). A way is needed to map windows of the fabric attached memory into processor memory. Therefore, communication between each node SoC and the memory pool goes through an FPGA-based “Z-bridge” component that manages memory mapping of the local SoC to the fabric attached memory. The Z-bridge deals with two different kinds of addresses: 53-bit logical Z addresses and 75-bit Z addresses, which allows addressing 8PB and 32ZB respectively. Each Z-bridge also contained a firewall to enforce access control. The interconnect protocol was develo |
https://en.wikipedia.org/wiki/Open%20coopetition | In R&D management and systems development, open coopetition or open-coopetition is a neologism to describe cooperation among competitors in the open-source arena. The term was first coined by the scholars Jose Teixeira and Tingting Lin to describe how rival firms that, while competing with similar products in the same markets, cooperate which each other in the development of open-source projects (e.g., Apple, Samsung, Google, Nokia) in the co-development of Webkit).
Open-coopetition is a compound-word term bridging coopetition and open-source. Coopetition refers to a paradoxical relationship between two or more actors simultaneously involved in cooperative and competitive interactions; and open-source both as a development method that emphasizes transparency and collaboration, and as a "private-collective" innovation model with features both from the private investment and collective action — firms contribute towards the creation of public goods while giving up associated intellectual property rights such patents, copyright, licenses, or trade secrets.
By exploring coopetition in the particular context of open-source, Open-coopetition emphasizes transparency on the co-development of technological artifacts that become available to the public under an open-source license—allowing anyone to freely obtain, study, modify and redistribute them. Within open-coopetition, development transparency and sense of community are maximized; while the managerial control and IP enforcement are minimized. Open-coopetitive relationships are paradoxical as the core managerial concepts of property, contract and price play an outlier role.
The openness characteristic of open-source projects also distinguishes open-coopetition from other forms of cooperative arrangements by its inclusiveness: Everybody can contribute. Users or other contributors do not need to hold a supplier contract or sign a legal intellectual property arrangement to contribute. Moreover, neither to be a member |
https://en.wikipedia.org/wiki/Zone%20axis | Zone axis, a term sometimes used to refer to "high-symmetry" orientations in a crystal, most generally refers to any direction referenced to the direct lattice (as distinct from the reciprocal lattice) of a crystal in three dimensions. It is therefore indexed with direct lattice indices, instead of with Miller indices.
High-symmetry zone axes through a crystal lattice, in particular, often lie in the direction of tunnels through the crystal between planes of atoms. This is because, as we see below, such zone axis directions generally lie within more than one plane of atoms in the crystal.
Zone-axis indexing
The translational invariance of a crystal lattice is described by a set of unit cell, direct lattice basis vectors (contravariant or polar) called a, b, and c, or equivalently by the lattice parameters, i.e. the magnitudes of the vectors, called a, b and c, and the angles between them, called α (between b and c), β (between c and a), and γ (between a and b). Direct lattice vectors have components measured in distance units, like meters (m) or angstroms (Å).
A lattice vector is indexed by its coordinates in the direct lattice basis system and is generally placed between square brackets []. Thus a direct lattice vector , or , is defined as . Angle brackets 〈〉 are used to refer to a symmetrically equivalent class of lattice vectors (i.e. the set of vectors generated by an action of the lattice's symmetry group). In the case of a cubic lattice, for instance, 〈100〉 represents [100], [010], [001], [00], [00] and [00] because each of these vectors is symmetrically equivalent under a 90 degree rotation along an axis. A bar over a coordinate is equivalent to a negative sign (e.g., ).
The term "zone axis" more specifically refers to the direction of a direct-space lattice vector. For example, since the [120] and [240] lattice vectors are parallel, their orientations both correspond the 〈120〉 zone of the crystal. Just as a set of lattice planes in direct space corr |
https://en.wikipedia.org/wiki/Carta%20Worldwide | Carta Worldwide is a Canadian financial technology company that offers digital payments technology and modern card issuer processing for banks and financial technology "fintech" companies. In addition to their Canadian headquarters in Toronto, Carta has offices in London, Casablanca, and Charlottetown, PEI. Carta operates internationally, providing financial technology and digital payment software and cloud API issuer processing.
Carta's clients include Vodafone, PayPal, Banco Sabadell, Westpac NZ, and Novum Bank, nets, TransferWise, and Sodexo. The company also partners with Visa and MasterCard.
Carta was the world's first processor to complete integration to MasterCard MOTAPS, enabling rapid deployment for NFC programs. Their Charlottetown, PEI, data centre is the only secure third party issuer processing data host for financial services in Canada.
Carta was part of the development team that produced ApplePay and was the first processor in the world to perform an ApplePay transaction.
History
Carta was founded in 2006 in Canada by Frank Svatousek, Robert Elensky, and Rui Mendes. Company's headquarters were setup in Oakville, Ontario, Canada and relocated in to Switzerland with service company offices opened in Hong Kong and London, UK.
In 2009, Brian Semkiw was appointed as CEO. Brian Semkiw is the co-founder of Rand Worldwide which had 1500 employees and had secured revenues of approximately $500 million by the time it was privatized in 2007. Profit Magazine named Semkiw "Entrepreneur of the Year" in 1996.
On September 15, 2014, Carta Worldwide closed the first tranche of a $12 million Series D venture round. Led by Toronto-based merchant bank Difference Capital and DC Thomson (UK), the $7-million investment adds to the more than $50 million the company has invested in its digital transaction processing platform.
In 2015 Carta partnered with Visa Inc. and Vodafone to enable contactless bank card payments. The Vodafone wallet uses a hybrid of a hardware |
https://en.wikipedia.org/wiki/Equivalent%20input | Equivalent input (also input-referred, referred-to-input (RTI), or input-related), is a method of referring to the signal or noise level at the output of a system as if it were due to an input to the same system. This input's value is called the Equivalent input. This is accomplished by removing all signal changes (e.g. amplifier gain, transducer sensitivity, etc.) to get the units to match the input.
Examples
Equivalent input noise
A microphone converts acoustical energy to electrical energy. Microphones have some level of electrical noise at their output. This noise may have contributions from random diaphragm movement, thermal noise, or a dozen other sources, but those can all be thought of as an imaginary acoustic noise source injecting sound into the (now noiseless) microphone. The units on this noise are no longer volts, but units of sound pressure (pascals or dBSPL), which can be directly compared to the desired sound pressure inputs. This is called equivalent input noise (EIN), or input-referred noise (IRN), or referred-to-input (RTI) noise.
Input-related interference level
A device which uses a microphone may be susceptible to electromagnetic interference which causes sonic artifacts. The problem is not in the microphone, but the interference level can be related back to the input to compare to the level of typical inputs to see how audible the artifact is. This is called input-related interference level (IRIL).
References
Further reading
(67 pages)
Acoustics
Noise (electronics) |
https://en.wikipedia.org/wiki/IPhone%20OS%201 | iPhone OS 1 (officially iPhone Software) is the first major release of iOS, Apple's mobile operating system. No official name was given on its initial release; Apple marketing literature simply stated that the iPhone runs a version of Apple's desktop operating system, OS X (later known as macOS). On March 6, 2008, with the release of the iPhone software development kit (iPhone SDK), Apple named it iPhone OS. It was succeeded by iPhone OS 2 on July 11, 2008.
History
Development history
Development of iPhone OS 1 and the first generation of iPhone Hardware was a combined effort. Only employees from within Apple were allowed to be a part of the iPhone development team. It was a completely secret project and at the time when the team was selected, even they weren't told what they were going to be working on. There were two teams inside Apple that worked on creating the iPhone: one worked on converting the iPod into a phone and the other worked on compressing the Mac OS X to make it work on smaller devices like phones. A team led by Jon Rubinstein worked on developing a lightweight Linux-based version, commonly referred to as Acorn, while another team led by Scott Forstall worked on developing a more compressed and streamlined version of the Mac OS X, codenamed purple, to run on the ARM chipset. Tony Fadell, who then led the iPhone team said "It was a competing set of ideas, not teams, and we were all working on it" There were 16 to 17 different concepts. Many people on the team were still hung up on the idea that everyone would want to type on a hardware keyboard, not glass. The idea of introducing a complete touch screen was very novel to everyone. Many user interfaces were prototyped, including the multi-touch click-wheel. Although many thought it was a waste of time, Apple CEO Steve Jobs insisted on prototyping all concepts/ideas before the Mac OS-X-based version of the operating system was selected.
Introduction and initial release
iPhone OS 1 was introduced a |
https://en.wikipedia.org/wiki/IPhone%20OS%202 | iPhone OS 2 is the second major release of the iOS mobile operating system developed by Apple Inc., being the successor to iPhone OS 1. It was the first version of iOS to support third party applications via the App Store. iPhone OS 2.2.1 was the final version of iPhone OS 2. It was succeeded by iPhone OS 3 on June 17, 2009.
iPhone OS 2 became available on July 11, 2008 with the release of the iPhone 3G. iPhones and iPod Touches running iPhone OS 1 are upgradable to this version. This version of iOS introduces the App Store, making third-party applications available to the iPhone and iPod Touch. Prior to the public release of iPhone OS 2, Apple held a keynote event to announce the iPhone OS Software Development Kit ("SDK") to developers. Originally it was called 1.2.
Default apps
Text
YouTube
Clock
iTunes
Calendar
Stocks
Calculator
App Store
Photos
Maps
Notes
Videos (iPod Touch exclusive)
Camera
Weather
Settings
Dock
Phone
Mail
Safari
iPod
History
iPhone OS 2 was introduced at the Apple Worldwide Developers Conference keynote address on June 9, 2008.
iPhone OS 2 was released on July 11, 2008. It was released along with the iPhone 3G, and ran on the first-generation iPhone as well.
Features
App Store
The most notable feature of iPhone OS 2 was the App Store. Before this feature was introduced, the only way to install custom applications on the device was via jailbreaking, which is strongly discouraged and unsupported by Apple. There were 500 applications available for download at the launch of the App Store, though this amount has grown dramatically since then. Now, the App Store has more than 4 million apps and games as of 2021.
Mail
The Mail app had a makeover, having push-emails that provide an always-on capability. It also supports Microsoft Office attachments, as well as iWork attachments. Other new features including support for BCC, multiple email delete, and the ability to select an outgoing email.
Contacts
The Contact |
https://en.wikipedia.org/wiki/IPhone%20OS%203 | iPhone OS 3 is the third major release of the iOS mobile operating system developed by Apple Inc., succeeding iPhone OS 2. It was announced on March 17, 2009, and was released on June 17, 2009. It was succeeded by iOS 4 on June 21, 2010, dropping the "iPhone OS" naming convention.
iPhone OS 3 added a system-wide "cut, copy, and paste" feature, allowing users to more easily move content. It also introduced Spotlight, a search indexing feature designed to help users locate specific information on their device, such as contacts, email messages or apps. The home screen was expanded to let users add up to 11 pages, showcasing a total of 180 apps. The Messages app received support for MMS, while the Camera app received support for video recording on the iPhone 3GS, and a new "Voice Memos" app let users record their voice. In-app purchase capability was added to third-party applications as well.
iPhone OS 3 is the last version of iOS that supports the first-generation iPhone and first-generation iPod Touch as its successor, iOS 4, drops support for both models.
Default apps
iTunes
App Store
Text
Calendar
Photos
Camera
YouTube
Stocks
Maps
Weather
Clock
Calculator
Notes
Settings
Default dock
Phone
Mail
Safari
iPod/Music
System features
Cut, copy, or paste
iPhone OS 3 introduced a "cut, copy, and paste" bubble dialog when users press and hold text. The "paste" button would incorporate anything stored in the device's clipboard into the marked area.
Spotlight
Spotlight is a system-wide indexing and search feature, aiming to help users search their device for specific contacts, email messages, calendar appointments, multimedia files, apps and more. It is accessed by swiping to the right from the home screen.
Home screen
iPhone OS 3 expanded the maximum number of pages on the home screen to 11, for a total number of 180 apps.
Find My iPhone
Users with subscriptions to MobileMe were able to remotely track, lock, and erase their iPhones if lost.
Ap |
https://en.wikipedia.org/wiki/Indian%20Institute%20of%20Aeronautical%20Engineering%20%26%20Information%20Technology | Indian Institute for Aeronautical Engineering & Information Technology (IIAEIT) is an aerospace engineering college in Pune, India. It also offers mechanical engineering and other technology related courses. It is known for its full-time face to face B.Tech Aerospace Engineering course (BTAE) which is jointly launched by D.Y Patil University and Aeronautical Engineering and Research Organisation (AERO).
It is a frontline training institute in the engineering disciplines, especially in the field of aeronautics. With a first rated faculty, backed by fully furnished laboratories, the institute is considered as the one of the best in Pune, India.
IIAEIT has established itself into a chief forefront Institution with excellent infrastructure over the last twelve years. Apart from training students for the professional industries, the institution also prepares Aerospace students to master their engineering.
History
AERO
Aeronautical Engineering and Research Organisation (AERO) is a constituent part of Shastri Group of Institutes. It popularizes education, research and development by collaborating with several Industries and educational institutions in all fields of aviation in India as well as abroad. AERO offers B.Tech aerospace engineering course which is accomplished face-to-face.
Shastri campus
Shastri Group of Institutes was founded in Pune by Anshul Sharma in the year 2001. The group originated by preparing students for the examinations conducted by professional institutes. With its front head flagship named Indian Institute for Aeronautical Engineering and Information Technology
SGI is a part of PSD Shastri Educational Foundation which is engaged in several social services and objectives. It is mentored by an Advisory Board whose members are from Aviation, Services, Industries, Business and Educational fields.
Aerospace course
B.Tech Aerospace Engineering (BTAE) is run by IIAEIT as a Program Study Center of Indira Gandhi National Open University, in face-face |
https://en.wikipedia.org/wiki/Repetition%20method | In surveying, the repetition method is used to improve precision and accuracy of measurements of horizontal angles. The same angle is measured multiple times, with the survey instrument rotated so that systematic errors tend to cancel. The arithmetic mean of these observations gives true value of an angle. The precision of the measurement can exceed the least count of the instrument. used.
The repetition method is used when high accuracy is required. For rough or approximate survey work, the ordinary method of measuring horizontal angles is used as it is less time consuming.
See also
Survey camp
Adjustments of theodolite
Ranging rods
Prismatic compass (surveying)
References
Surveying
Civil engineering |
https://en.wikipedia.org/wiki/Iterative%20impedance | Iterative impedance is the input impedance of an infinite chain of identical networks. It is related to the image impedance used in filter design, but has a simpler, more straightforward definition.
Definition
Iterative impedance is the input impedance of one port of a two-port network when the other port is connected to an infinite chain of identical networks. Equivalently, iterative impedance is that impedance that when connected to port 2 of a two-port network is equal to the impedance measured at port 1. This can be seen to be equivalent by considering the infinite chain of identical networks connected to port 2 in the first definition. If the original network is removed then port 1 of the second network will present the same iterative impedance as before since port 2 of the second network still has an infinite chain of networks connected to it. Thus the whole infinite chain can be replaced with a single lumped impedance equal to the iterative impedance, which is the condition for the second definition.
In general, the iterative impedance of port 1 is not equal to the iterative impedance of port 2. They will be equal if the network is symmetrical, however physically symmetry is not a necessary condition for the impedances to be equal.
Examples
A simple generic L-circuit is shown in the diagram consisting of a series impedance Z and a shunt admittance Y. The iterative impedance of this network, ZIT, in terms of its output load (also ZIT) is given by,
and solving for ZIT,
Another example is an L-circuit with the components reversed, that is, with the shunt admittance coming first. The analysis of this circuit can be found immediately through duality considerations of the previous example. The iterative admittance, YIT, of this circuit is given by,
where,
The square root term in these expressions cause them to have two solutions. However, only solutions with a positive real part are physically meaningful since passive circuits cannot exhibit nega |
https://en.wikipedia.org/wiki/Sierpi%C5%84ski%20set | In mathematics, a Sierpiński set is an uncountable subset of a real vector space whose intersection with every measure-zero set is countable. The existence of Sierpiński sets is independent of the axioms of ZFC. showed that they exist if the continuum hypothesis is true. On the other hand, they do not exist if Martin's axiom for ℵ1 is true. Sierpiński sets are weakly Luzin sets but are not Luzin sets .
Example of a Sierpiński set
Choose a collection of 2ℵ0 measure-0 subsets of R such that every measure-0 subset is contained in one of them. By the continuum hypothesis, it is possible to enumerate them as Sα for countable ordinals α. For each countable ordinal β choose a real number xβ that is not in any of the sets Sα for α < β, which is possible as the union of these sets has measure 0 so is not the whole of R. Then the uncountable set X of all these real numbers xβ has only a countable number of elements in each set Sα, so is a Sierpiński set.
It is possible for a Sierpiński set to be a subgroup under addition. For this one modifies the construction above by choosing a real number xβ that is not in any of the countable number of sets of the form (Sα + X)/n for α < β, where n is a positive integer and X is an integral linear combination of the numbers xα for α < β. Then the group generated by these numbers is a Sierpiński set and a group under addition. More complicated variations of this construction produce examples of Sierpiński sets that are subfields or real-closed subfields of the real numbers.
References
Measure theory
Set theory |
https://en.wikipedia.org/wiki/Logic%20for%20Programming%2C%20Artificial%20Intelligence%20and%20Reasoning | The International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR) is an academic conference aiming at discussing cutting-edge results in the fields of automated reasoning, computational logic, programming languages and their applications.
It grew out of the Russian Conferences on Logic Programming 1990 and 1991; the idea to organize the conference was largely due to Robert Kowalski who proposed to create the Russian Association for Logic Programming. The conference was renamed in 1992 to "Logic Programming and Automated Reasoning" (LPAR) to reflect its extended scope, due to considerable interest in automated reasoning in the Former Soviet Union. After a break from 1995 to 1998, LPAR continued in 1999 under the name "Logic for Programming and Automated Reasoning", to indicate an extension of its logic part beyond logic programming. In 2001, the name changed to "Logic for Programming, Artificial Intelligence and Reasoning".
The LPAR steering committee consists of Matthias Baaz, Chris Fermüller, Geoff Sutcliffe, and Andrei Voronkov (chair).
Following its slogan "To boldly go where no reasonable conference has gone before", LPAR typically takes place in locations that are unusual or difficult to reach.
Overview of conference events
References
External links
— accounting for 1st to 15th conference (1990–1994, 1999–2008)
17th LPAR's home page (2010)
18th LPAR's home page (2012)
19th LPAR's home page (2013)
LPAR page at DBLP
Theoretical computer science conferences
Logic conferences |
https://en.wikipedia.org/wiki/Gene%20co-expression%20network | A gene co-expression network (GCN) is an undirected graph, where each node corresponds to a gene, and a pair of nodes is connected with an edge if there is a significant co-expression relationship between them. Having gene expression profiles of a number of genes for several samples or experimental conditions, a gene co-expression network can be constructed by looking for pairs of genes which show a similar expression pattern across samples, since the transcript levels of two co-expressed genes rise and fall together across samples. Gene co-expression networks are of biological interest since co-expressed genes are controlled by the same transcriptional regulatory program, functionally related, or members of the same pathway or protein complex.
The direction and type of co-expression relationships are not determined in gene co-expression networks; whereas in a gene regulatory network (GRN) a directed edge connects two genes, representing a biochemical process such as a reaction, transformation, interaction, activation or inhibition. Compared to a GRN, a GCN does not attempt to infer the causality relationships between genes and in a GCN the edges represent only a correlation or dependency relationship among genes. Modules or the highly connected subgraphs in gene co-expression networks correspond to clusters of genes that have a similar function or involve in a common biological process which causes many interactions among themselves.
Gene co-expression networks are usually constructed using datasets generated by high-throughput gene expression profiling technologies such as Microarray or RNA-Seq. Recently, co-expression networks are used to analyze single cell RNA-Seq data, in order to better characterize the gene to gene relations in a cohort of cells from a specific cell type.
History
The concept of gene co-expression networks was first introduced by Butte and Kohane in 1999 as relevance networks. They gathered the measurement data of medical laboratory tests |
https://en.wikipedia.org/wiki/DigitalCurriculum | DigitalCurriculum was the first educational video-on-demand system and remains the standard for interactive streaming multimedia libraries. An early SaaS model, DigitalCurriculum was conceived and designed in 1997 and produced and released in 1999, by AIMS Multimedia's David S. Sherman, Ph. D., co-president of AIMS MULTIMEDIA, and software architect Richard Williams. The service drew from and incorporated the AIMS Multimedia educational video library, executive producer Mike Wright and associate producer Pat Davies. Also heavily involved in the design team were Hillary Broadwater, Elizabeth von Schoff, and Aram Iskenderian.
The video component in DigitalCurriculum included over $300 million in educational productions — programs that received more than 1,000 awards worldwide — including the prestigious Emmy, Oscar, Peabody and Parents’ Choice awards. These premier titles came from hundreds of world-renowned producers and distributors including: Scholastic/Weston Woods, ABC, Paramount, TV Ontario, TEAMS Distance Learning, Channel One and the National Film Board of Canada.
DigitalCurriculum was a curriculum-on-demand teaching and learning system that fully integrated full-length educational videos, key concept video clips, still images, Encyclopædia Britannica content, teacher guides, lesson plans, and interactive online assessments and assignments into a comprehensive learning tool for teachers, students, and administrators with complete record-keeping and an internal messaging service. At the time of its acquisition in 2004 by Discovery Communications, DigitalCurriculum had over 100,000 educational multimedia components for every K-12 subject, state and national framework correlations, multiple bit-rate encoding for school and home use, simple incorporation of local content, and a paid subscriber base of more than 20 million teachers, librarians, administrators, and students.
DigitalCurriculum is of particular historical interest as it was a SaaS pioneer and on |
https://en.wikipedia.org/wiki/Mostowski%20model | In mathematical set theory, the Mostowski model is a model of set theory with atoms where the full axiom of choice fails, but every set can be linearly ordered. It was introduced by . The Mostowski model can be constructed as the permutation model corresponding to the group of all automorphisms of the ordered set of rational numbers and the ideal of finite subsets of the rational numbers.
References
Set theory |
https://en.wikipedia.org/wiki/Bs%20%28programming%20language%29 | bs is a programming language and a compiler/interpreter for modest-sized programs on UNIX systems. The bs command can be invoked either for interactive programming or with a file containing a program, optionally taking arguments, via a Unix shell, e.g., using a Shebang (Unix) #!/usr/bin/bs.
An early man page states, "[bs] is a remote descendant of Basic [sic] and SNOBOL4, with a little C thrown in."
History
The bs command appears in UNIX System III Release 3.0 (1980), first released outside of Bell Labs in 1982. It was written by Dick Haight (Richard C. Haight) circa 1978, who recounts it as follows:
The Release 3.0 manual mentions bs prominently on page 9 (emphasis added):
While not released outside prior to System III, the bs command was present internally in UNIX/TS 1.0 (November 1978), PWB/UNIX 2.0 (June 1979), and CB UNIX editions 2.1 (November 1979) and 2.3 (1981).
The bs command does not appear in some earlier internal releases, e.g., the UNIX Support Group’s March 1977 release, nor the PWB/UNIX manual dated May, 1977, suggesting its creation circa 1978. It does not appear in any version of Research Unix nor the Berkeley Software Distribution.
Subsequently and into the 1990s, bs was included in a variety of System III-derived or System V-derived commercial operating systems including, but not limited to: PC/IX; UNIX System V Releases 2 & 3: SVR2, SVR3, SVR3.2 (1986); HP-UX; AIX; and A/UX.
(The User's Manual for the AT&T UNIX PC (3B1) specifically mentions that the bs command is not available, but that it is available on SVR3.2.)
Occasionally, bs was touted as one of the primary programming languages for development under UNIX. However, bs is not included in the POSIX.1 commands and utilities (the standard List of Unix commands) nor in the Single UNIX Specification and is not provided with most contemporary operating systems. For example in Linux, similar syntax and functionality is provided by bc, Perl, and POSIX shell.
In the 21st century, bs is pre |
https://en.wikipedia.org/wiki/Active%20sound%20design | Active sound design is an acoustic technology concept used in automotive vehicles to alter or enhance the sound inside and outside of the vehicle. Active sound design (ASD) often uses active noise control and acoustic enhancement techniques to achieve a synthesized vehicle sound.
The typical implementations of ASD vary, from amplifying or reducing an existing sound to creating an entirely new sound. Each vehicle manufacturer may use different software or hardware techniques in ASD, as there is no one unified model. ASD exists under multiple names, like Acura’s Active Sound Control, Kia’s Active Sound System, Volkswagen’s Soundaktor, and QNX’s Acoustic Management System.
The first instance of in-vehicle active noise canceling (ANC) was developed by Lotus and featured in the 1992 Nissan Bluebird. In 2009, Lotus partnered with Harman International for an improved ANC system that eliminated noise from the road, tires, and vehicle chassis. With recent demand for economical and cleaner combustion engine vehicles, engine systems have become more efficient but less audibly appealing to consumers. Electric and fuel cell vehicles operate with high-pitched tones, lacking the recognizable sound of a typical combustion engine. With ASD, both combustion and electric vehicle manufacturers aim to improve the reception of these vehicles by increasing the quality of interior and exterior vehicle sound.
Components
Active noise cancelling (ANC) is a software process that uses existing in-vehicle infotainment hardware to eliminate undesirable noise within the interior of a vehicle. This elimination technique is known as harmonic order reduction, where unwanted audio signals are identified by sensors and filtered out of the overall interior vehicle sound. Manufacturers may use ANC within a vehicle to improve the effects of ASD.
Engine sound enhancement (ESE) is a technology that allows manufacturers to enhance engine sounds with synthetic noise composed from live engine data, inclu |
https://en.wikipedia.org/wiki/Magnetically%20controlled%20shunt%20reactor | A magnetically-controlled shunt reactor (MCSR, CSR) represents electrotechnical equipment purposed for compensation of reactive power and stabilization of voltage level in high voltage (HV) electric networks rated for voltage classes 36 – 750 kV. MCSR is shunt-type static device with smooth regulation by means of inductive reactance.
History
In 2002, The first Controlled Shunt Reactor (CSR) was developed by Bharat Heavy Electricals Limited. The first such device was commissioned at Power Grid's 400 kV Itarsi substation in Madhya Pradesh.
Purpose
Magnetically-controlled shunt reactors are intended for automatic control over reactive power and stabilization of voltage levels; these ensure the following:
Elimination of daily and seasonal voltage variations in the power network;
Improvement of electric power quality;
Optimization and automation of power network operating modes;
Reduction of electric power losses within its transmission and distribution;
Improvement of power system stability;
Enhancement of the conditions of operation in tens of times and prolongation of service life of the electric equipment by virtue of dynamic shortcut of switchings of uncontrolled devices for reactive power compensation as well as limitation of operation of less reliable devices – OLTC, transformers and autotransformers
Increasing of transmission line throughput performance and provision of reliable automatic control over voltage levels at power overflows close to limit values as referred to static stability;
Avoiding of voltage collapse effect at emergency situations in the power network (for example, emergency trip of load, generator, transmission line, etc.;
Assurance of operating conditions for power plant generators in such reaction power generation range which assist to the most favorable operating modes.
Field of application
On the assumption of tasks to be solved by MCSRs, as well as with consideration of existing experience of their operation, application field |
https://en.wikipedia.org/wiki/Permutation%20model | In mathematical set theory, a permutation model is a model of set theory with atoms (ZFA) constructed using a group of permutations of the atoms. A symmetric model is similar except that it is a model of ZF (without atoms) and is constructed using a group of permutations of a forcing poset. One application is to show the independence of the axiom of choice from the other axioms of ZFA or ZF.
Permutation models were introduced by and developed further by .
Symmetric models were introduced by Paul Cohen.
Construction of permutation models
Suppose that A is a set of atoms, and G is a group of permutations of A. A normal filter of G is a collection F of subgroups of G such that
G is in F
The intersection of two elements of F is in F
Any subgroup containing an element of F is in F
Any conjugate of an element of F is in F
The subgroup fixing any element of A is in F.
If V is a model of ZFA with A the set of atoms, then an element of V is called symmetric if the subgroup fixing it is in F, and is called hereditarily symmetric if it and all elements of its transitive closure are symmetric. The permutation model consists of all hereditarily symmetric elements, and is a model of ZFA.
Construction of filters on a group
A filter on a group can be constructed from an invariant ideal on of the Boolean algebra of subsets of A containing all elements of A. Here an ideal is a collection I of subsets of A closed under taking finite unions and subsets, and is called invariant if it is invariant under the action of the group G. For each element S of the ideal one can take the subgroup of G consisting of all elements fixing every element S. These subgroups generate a normal filter of G.
References
Set theory |
https://en.wikipedia.org/wiki/EBeam | eBeam is an interactive whiteboard system developed by Luidia, Inc. that transforms any standard whiteboard or other surface into an interactive display and writing surface.
Luidia's eBeam hardware and software products allow text, images, and video to be projected onto a variety of surfaces, where an interactive stylus or marker can be used to add notes, access control menus, manipulate images, and create diagrams and drawings. The presentations, notes, and images can be saved and emailed to class or meeting participants, as well as shared in real-time either on local networks or over the Internet.
eBeam technology has been incorporated into other manufacturers' interactive whiteboard systems, such as the 3M Wall Display " / Digital Board, Hitachi Starboard, Legamaster eBoard, and NEC's WT615 short-throw projection unit.
History
An eBeam demo was given at the Apple Expo 2002 in Paris, France.
Technology
eBeam technology uses infrared and ultrasound receivers to track the location of a transmitter-equipped pen, called a stylus, or a standard dry-erase marker in a transmitter-equipped sleeve. A separate receiver unit attaches to the edge of the whiteboard, wall or other writing surface, and determines the distance and direction of the transmitter pen using the known quantities and differences of the speed of light and the speed of sound.
Luidia's eBeam technology was originally developed and patented by engineers at Electronics for Imaging Inc. (Nasdaq: EFII), a Foster City, California, developer of digital print server technology. Luidia was spun off from EFI in July 2003 with venture funding from Globespan Capital Partners and Silicom Ventures.
Since then, Luidia has continued to update and expand its eBeam product line while adding numerous manufacturing partners, including Hitachi, NEC and Uchida.
Products
Luidia offers a variety of eBeam hardware and software products, including:
Interactive whiteboard systems
eBeam Edge and Edge Wireless: this hardwar |
https://en.wikipedia.org/wiki/Novabackup | NovaBACKUP, developed by NovaStor is data protection software that enables SMB users to backup and recover data across a hybrid of physical and virtual machines. NovaBACKUP is designed to work on Microsoft Windows operating systems, offering local and online file backups and disaster recovery image backups.
Overview
NovaBACKUP uses a proprietary file format which uses an NBD file extension and is backwards compatible, meaning backups from older versions of NovaBACKUP (after version 8) can be restored with the latest version of the software. For version 7 and 8, the backups can still be restored, but the file extensions need to be updated to .NBD to do so.
Multiple NovaBACKUP editions are available. Versions built for SMB users support backups for PCs, laptops and Servers, including support for Exchange/SQL and virtual machines.
History
Release change log for NovaBACKUP starting at version 13.0. Current NovaBACKUP release log:
References
External links
NovaStor Official Website
Data protection
Data recovery software
Backup software |
https://en.wikipedia.org/wiki/PacBSD | PacBSD (formerly known as Arch BSD) was an operating system based on Arch Linux, but uses the FreeBSD kernel instead of the Linux kernel and the GNU userland.
The PacBSD project began on an Arch Linux forum thread in April 2012. It aims to provide an Arch-like user environment, utilizing the OpenRC init system, the pacman package manager, and rolling-release.
See also
Arch Hurd: A similar project with GNU/Hurd as its base
Arch Linux
FreeBSD
References
Berkeley Software Distribution
Free software operating systems
Unix variants |
https://en.wikipedia.org/wiki/Multiuser%20DOS%20Federation | The Multiuser DOS Federation (MDOS) was an industry alliance to promote the growth and acceptance of multi-user DOS-based solutions on 286, 386 and 486 computers. It was formed in July 1990. Initially among them were Digital Research, Theos Software, SunRiver, DigiBoard, Alloy, Viewport International and others. The idea was to reduce costs by allowing workgroups to run DOS applications from a shared PC while working on terminals or workstations.
On 18 February 1991, several members of the Multiuser DOS Federation issued a press release regarding their intentions to support DPMI (mostly DPMI 1.0) in their products including Alloy Computer Products Inc. (PC-PLUS), Bluebird Systems, Inc. (SuperDOS), Concurrent Controls, Inc. (CCI Concurrent DOS 386, CCI Multiuser DOS), Digital Research, Inc. (DR Multiuser DOS), S&H Computer Systems, Inc. (TSX-32), StarPath Systems, Inc. (Vmos/3), The Software Link (PC-MOS/386), THEOS Software Corporation (THEOS), Intelligent Graphics Corporation (VM/386). Several of them had previously worked on the alternative XVCPI specification.
See also
AT Multiuser System
Virtual DOS machine
References
DOS on IBM PC compatibles |
https://en.wikipedia.org/wiki/Discrete%20global%20grid | A discrete global grid (DGG) is a mosaic that covers the entire Earth's surface.
Mathematically it is a space partitioning: it consists of a set of non-empty regions that form a partition of the Earth's surface. In a usual grid-modeling strategy, to simplify position calculations, each region is represented by a point, abstracting the grid as a set of region-points. Each region or region-point in the grid is called a cell.
When each cell of a grid is subject to a recursive partition, resulting in a "series of discrete global grids with progressively finer resolution", forming a hierarchical grid, it is called a hierarchical DGG (sometimes "global hierarchical tessellation"
or "DGG system").
Discrete global grids are used as the geometric basis for the building of geospatial data structures. Each cell is related with data objects or values, or (in the hierarchical case) may be associated with other cells. DGGs have been proposed for use in a wide range of geospatial applications, including vector and raster location representation, data fusion, and spatial databases.
The most usual grids are for horizontal position representation, using a standard datum, like WGS84. In this context, it is common also to use a specific DGG as foundation for geocoding standardization.
In the context of a spatial index, a DGG can assign unique identifiers to each grid cell, using it for spatial indexing purposes, in geodatabases or for geocoding.
Reference model of the globe
The "globe", in the DGG concept, has no strict semantics, but in geodesy a so-called "grid reference system" is a grid that divides space with precise positions relative to a datum, that is an approximated a "standard model of the Geoid". So, in the role of Geoid, the "globe" covered by a DGG can be any of the following objects:
The topographical surface of the Earth, when each cell of the grid has its surface-position coordinates and the elevation in relation to the standard Geoid. Example: grid |
https://en.wikipedia.org/wiki/Defect%20criticality | In the context of software quality, defect criticality is a measure of the impact of a software defect. It is defined as the product of severity, likelihood, and class.
Defects are different from user stories, and therefore the priority (severity) should be calculated as follows.
Severity/impact
0 - Affects critical data or functionality and leaves users with no workaround
1 - Affects critical data or functionality and forces users to employ a workaround
2 - Affects non-critical data or functionality and forces users to employ a workaround
3 - Affects non-critical data or functionality and does not force users to employ a workaround
4 - Affects aesthetics, professional look and feel, “quality” or “usability”
Likelihood/visibility
1 - Seen by all or almost all users who use the application (>=95% of users)
2 - Seen by more than 2/3 of the users who use the application (>67% and <95%)
3 - Seen by about half the users who use the application (>33% and <66%)
4 - Seen by about 1/3 or less of the users who use the application (>0% and <32%)
Class of defect
Class 0
Stability, Reliability and Availability
Security
Legal (Liability, ADA, Copyright)
Testability
Storage (data loss/corruption)
Class 1
Performance and Efficiency (use of resources: memory, disk, CPU)
Scalability
Class 2
Functionality
Logic or Calculation
Compatibility
Interoperability
Class 3
Usability
Learn ability
Readability
Documentation
Consistency
Workflow (“feel”)
Class 4
Typographic or grammatical
Aesthetics
Appearance or Cosmetic
Assessing the criticality score
0–2 = Critical
3–9 = Major
10–20 = Medium
21–64 = Low
References
Software bugs
Software articles needing attention
Software development
Quality assurance |
https://en.wikipedia.org/wiki/Differential%20refractometer | A differential refractometer (DRI), or refractive index detector (RI or RID) is a detector that measures the refractive index of an analyte relative to the solvent. They are often used as detectors for high-performance liquid chromatography and size exclusion chromatography. They are considered to be universal detectors because they can detect anything with a refractive index different from the solvent, but they have low sensitivity.
Principles of operation
When light leaves one material and enters another it bends, or refracts. The refractive index of a material is a measure of how much light bends when it enters. Differential refractometers contain a flow cell with two parts: one for the sample and one for the reference solvent. The detector measures the refractive index of both components. When only solvent is passing through the sample component the measured refractive index of both components is the same, but when an analyte passes through the flow cell the two measured refractive index are different. The difference appears as a peak in the chromatogram.
Applications
Differential refractometers are often used for the analysis of polymer samples in size exclusion chromatography.
References
Measuring instruments |
https://en.wikipedia.org/wiki/Norton%20Security | Norton Security is a cross-platform security suite that provides subscription-based real-time malware prevention and removal in addition to identity theft protection and performance tuning tools. Other features include a personal firewall, email spam filtering, and phishing protection. It was released on September 23, 2014. In April 2019 it has been replaced by the Norton 360 brand.
Version history
In 2014, in an effort to streamline its Norton product line, Symantec combined nine standalone Norton products into one all-purpose suite.
Norton Security superseded Norton Internet Security (and the pre-2019 versions of Norton 360), with an overlapping release cycle that saw version 22 as the initial release of the former and the final release of the latter. However, version 22 of Norton 360 and Norton Internet Security were updates as opposed to full releases.
In terms of similarities and differences with its predecessors, Norton Security retained all components of Norton Internet Security (including the antivirus, firewall and identity theft components) and added the optimization tools from Norton 360.
Norton Security is available in three editions: Norton Security Standard with one license (valid for a single device), Norton Security Deluxe with five licenses and Norton Security Premium which offers ten licenses, 25 GB of hosted online backup, and a premium subscription to Symantec's parental control system. All editions include protection for Windows, OS X, Android and iOS devices. However, features may vary based on the operating system.
In April 2019, the Norton 360 brand was reinstated as a replacement, maintaining a similar plan structure but with the addition of VPN and, on the premium tiers, LifeLock (which was acquired by Symantec in 2017).
System requirements
Operating Systems Supported (Norton Security 22.23.1.21 for Windows)
Microsoft Windows 7 (all versions) with Service Pack 1 (SP 1) or later
Microsoft Windows 8/8.1 (all versions). Some protection fe |
https://en.wikipedia.org/wiki/Changestat | Changestat is a continuous cultivation method that is used for acquiring quantitative data of a microorganism's metabolism at various environmental conditions within a single experiment. Every changestat always starts as a continuous cultivation experiment (chemostat, turbidostat), but after reaching steady state, smooth and slow change of an environmental parameter is applied. Two most common changestat techniques are accelerostat (A-stat) and dilution rate stat (D-stat).
In case of A-stat the changing environmental parameter is dilution rate (D, h−1) that causes the increase of specific growth rate (μ, h−1). When the acceleration of dilution (a) is chosen correctly then D = μ as in chemostat. The problem of choosing the correct acceleration of dilution has been studied with Escherichia coli and Lactococcus lactis resulting recommended range of 0.01-0.005 h−2.
In D-stat dilution rate is always constant as in chemostat, but after reaching steady state environmental parameter other than dilution rate is changed. For instance temperature, pH or acetate concentration has been smoothly changed in bioreactor.
Turbidostat type changestats are called Z-auxoaccelerostats (pH-auxoaccelerostat, CO2-auxoaccelerostat). In similar to D-stat after reaching steady state a selected environmental parameter is changed.
References
Microbiology |
https://en.wikipedia.org/wiki/Numbuster | NumBuster! is a phone community that users can access via a mobile phone client and a Web application. Developed by NumBuster Ltd, it allows users to find contact details of any phone number, exchange information about numbers with other users and block calls and messages. The client is available for Android and Apple iOS.
History
NumBuster! was developed by NumBuster Ltd, a privately held company founded by Evgeny Gnutikov, Ilya Osipov and some others. The project was launched on Android in May 2013 and as a Web site in February 2014. As of September 2014, it has more than 100 000 users in Russia and the CIS, where it was first launched. In July–August 2014, NumBuster! was accelerated in the biggest startup accelerator in France, NUMA Paris.
Features and functionality
The service is a global telephone directory that has social and call + SMS blocking functionality. It allows its users not only to find out the name of an unfamiliar caller or SMS sender, whether it's a person or a business, but also to rate and comment, thus adding more value to the service and helping other users in the community to get more information. Apart from that, users can block any phone number. Application is available on Android from May 2013 and on Apple iPhone from September 2014.
Languages and localization
NumBuster! is available in 12 languages: English, Russian, Turkish, Arabic, French, Chinese, Italian, Portuguese, Hindi, Spanish, Ukrainian and Korean.
Reception
Upon its release, NumBuster! gathered positive feedback from Russian bloggers and media, including a publication in a leading news web-site.
See also
List of most downloaded Android applications
Truecaller
Truth in Caller ID Act of 2009
References
External links
NumBuster! on Apple AppStore
Android (operating system) software
Cross-platform software
Communication software
2014 software
Mobile software
IOS software
Social networking services
Windows Phone software
Caller ID |
https://en.wikipedia.org/wiki/Langley%27s%20Adventitious%20Angles | Langley's Adventitious Angles is a puzzle in which one must infer an angle in a geometric diagram from other given angles. It was posed by Edward Mann Langley in The Mathematical Gazette in 1922.
The problem
In its original form the problem was as follows:
is an isosceles triangle with
at to cuts in
at to cuts in
Prove
Solution
The problem of calculating angle is a standard application of Hansen's resection.
Such calculations can establish that is within any desired precision of , but being
of only finite precision, always leave doubt about the exact value.
A direct proof using classical geometry was developed by James Mercer in 1923. This solution involves drawing one additional line, and then making repeated use of the fact that the internal angles of a triangle add up to 180° to prove that several triangles drawn within the large triangle are all isosceles.
Draw at to intersecting at and draw (See figure on the lower right.)
Since and then and triangle is isosceles with
Since and then and triangle is isosceles with
Since and then triangle is equilateral.
Since and then and triangle is isosceles with
Therefore all the red lines in the figure are equal.
Since triangle is isosceles with
Therefore
Many other solutions are possible. Cut the Knot list twelve different solutions and several alternative problems with the same 80-80-20 triangle but different internal angles.
Generalization
A quadrilateral such as BCEF is called an adventitious quadrangle when the angles between its diagonals and sides are all rational angles, angles that give rational numbers when measured in degrees or other units for which the whole circle is a rational number. Numerous adventitious quadrangles beyond the one appearing in Langley's puzzle have been constructed. They form several infinite families and an additional set of sporadic examples.
Classifying the adventitious quadrangles (which need not be convex) turns out to be e |
https://en.wikipedia.org/wiki/Bytemark | Bytemark is a UK-based server hosting and datacentre provider, headquartered in York, United Kingdom. It was founded in 2002, and was the first provider of virtual machines and cloud hosting through User-mode Linux in 2003.
In 2012, the company launched BigV, a public cloud platform designed in-house using open source software. In 2013, it moved into a £1.2 million datacentre and headquarters in York. In 2017, their BigV platform was renamed Bytemark Cloud. In September 2018, the company was acquired by iomart Group plc.
On 2 February 2023 Bytemark announced that it would cease to support BigV on 30 April 2023.
Environmental and ethical policies
Bytemark's datacentre uses fresh-air cooling, not common in the UK, and was shortlisted for Innovation in Medium Data Center at the DatacenterDynamics Awards EMEA 2013. Each of its servers is built using efficient power supplies as certified by the 80 Plus scheme, which requires power supplies to be at least 80% efficient at up to 100% rated load. To reduce the bias found in traditional recruitment processes, the company developed their own anonymous recruitment process in 2015.
Awards
In 2014, Bytemark was named one of the Top 50 Fastest Grown Tech Companies in the North at the Northern Tech Awards with revenue growth of 44%. Financially, the company turned over £2.5 million in 2013. In 2014, this grew to £3 million. In 2015, the company was awarded the Fair Tax Mark.
Support of open-source projects
Bytemark has a history of contributing to and supporting free software.
They support LibreOffice through provision of a build server. In 2009, the company became a supporter of XBMC with the same. In 2012, they started supporting Cyanogenmod with build servers.
In 2013, the company contributed hosting services worth £150,000 to the Debian project, having used Debian since the company was founded. The company also supported OpenStreetMap with DNS services and servers to support version control, mailing lists and help |
https://en.wikipedia.org/wiki/Action%20model%20learning | Action model learning (sometimes abbreviated action learning) is an area of machine learning concerned with creation and modification of software agent's knowledge about effects and preconditions of the actions that can be executed within its environment. This knowledge is usually represented in logic-based action description language and used as the input for automated planners.
Learning action models is important when goals change. When an agent acted for a while, it can use its accumulated knowledge about actions in the domain to make better decisions. Thus, learning action models differs from reinforcement learning. It enables reasoning about actions instead of expensive trials in the world. Action model learning is a form of inductive reasoning, where new knowledge is generated based on agent's observations. It differs from standard supervised learning in that correct input/output pairs are never presented, nor imprecise action models explicitly corrected.
Usual motivation for action model learning is the fact that manual specification of action models for planners is often a difficult, time consuming, and error-prone task (especially in complex environments).
Action models
Given a training set consisting of examples , where are observations of a world state from two consecutive time steps and is an action instance observed in time step , the goal of action model learning in general is to construct an action model , where is a description of domain dynamics in action description formalism like STRIPS, ADL or PDDL and is a probability function defined over the elements of .
However, many state of the art action learning methods assume determinism and do not induce . In addition to determinism, individual methods differ in how they deal with other attributes of domain (e.g. partial observability or sensoric noise).
Action learning methods
State of the art
Recent action learning methods take various approaches and employ a wide variety of tools from |
https://en.wikipedia.org/wiki/Multiclet | MultiClet is an ongoing innovation project for a microprocessor that became the first post von Neumann, multicellular microprocessor, breaking the paradigm for computing technology that has been in place for more than 60 years. There have been attempts in the past to shift away from the von Neumann architecture. Under MultiClet a 4-cellular dynamically reconfigurable microprocessor is implemented.
History
In April 2013, the Russian company Sputnix signed an agreement for joint development of the MultiClet microprocessor.
In January 2014, an announcement is made that the FreeRTOS operating system has been ported to the MultiClet microprocessor, this demonstrates that the microprocessor potentially can perform tasks that makes it suitable for real products.
In April 2014, the Kickstarter project Key_P1 MultiClet: Your Powerful Digital Guardian, failed to raise sufficient funding.
Since June 2014, the MultiClet microprocessor is reportedly under test in real space conditions onboard Sputnix’s microsatellite TabletSat-Aurora.
In March 2014, Multiclet present first multicellular dynamically reconfigurable microprocessor in Inatronics 2014.
Financing
Since 2004 more than 300 million roubles has been provided for the project by the Danish venture fund Symbion Capital and the Bortnik Fund. In 2009 there was an unsuccessful request for co-financing by Rusnano. In 2010 it was reported that more than 1 billion roubles would be needed in total before any actual production could take place. In 2011 the MultiClet company, currently responsible for the development of the microprocessor was founded with a capital of 323 million roubles.
In August 2014, a financial request for 80 million US dollars from the Russian-Chinese Investment Fund (RKIF) was made in order to develop a MultiClet based computer.
Technical concept
As opposed to the traditional multi-core processor architecture each individual cell in the microprocessor can communicate with each other, without the ne |
https://en.wikipedia.org/wiki/Floral%20zone | A floral zone is an area with similar distributions of plant species, usually a horizontal belt determined by elevation. In a historic report on plant distribution in the United States, The Death Valley Expedition: A Biological Survey of Parts of California, Nevada, Arizona, and Utah, naturalist Clinton Hart Merriam describes “Most of the desert shrubs are social plants and are distributed in well-marked belts or zones, the vertical limits of which are fixed by the temperature during the period of growth and reproduction.”
See also
Altitudinal zonation
Life zone
References
Botany |
https://en.wikipedia.org/wiki/IFRS%204 | IFRS 4 is an International Financial Reporting Standard (IFRS) issued by the International Accounting Standards Board (IASB) providing guidance for the accounting of insurance contracts. The standard was issued in March 2004, and was amended in 2005 to clarify that the standard covers most financial guarantee contracts. Paragraph 35 of IFRS also applies the standard to financial instruments with discretionary participation features.
IFRS 4 was intended to provide limited improvements to accounting for insurance contracts until the IASB completed the second, more comprehensive phase of its insurance accounting project. The replacement standard, IFRS 17 was issued in May 2017 and will become effective on January 1, 2023, supplanting IFRS 4 at that time.
Provisions
Generally, IFRS 4 permitted companies to continue previous accounting practices for insurance contracts, but did enhance the disclosure requirements. IFRS 4 defines an insurance contract as a "contract under which one party (the insurer) accepts significant insurance risk from another party (the policyholder) by agreeing to compensate the policyholder if a specified uncertain future event (the insured event) adversely affects the policyholder." The standard provides definitions to distinguish "insurance risk" from "financial risk." IFRS 4 exempts insurance companies from certain other IFRS standards, including IAS 8 on changes in accounting policies, until phase II is complete, but IFRS 4 does introduce its own requirements for changes in accounting policies.
Among the accounting requirements IFRS 4 introduced are a requirement to test that insurance liabilities are adequate and that reinsurance assets are not impaired. It also prohibits setting up a liability for insurance claims that have not been incurred. Although insurance contracts are subject to the requirements of IFRS 9 that embedded derivatives within other contracts be measured separately at fair value, IFRS 4 makes a limited exception |
https://en.wikipedia.org/wiki/Interceptor%20ditch | In geotechnical engineering, an interceptor ditch is a small ditch or channel constructed to intercept and drain water to an area where it can be safely discharged. These are used for excavation purposes of limited depth made in a coarse-grained soils. These are constructed around an area to be dewatered. Sump pits are also placed at suitable intervals for installation of centrifugal pumps to remove the water collected in an efficient manner. In fine sands and silts, there may be sloughing, erosion or quick conditions. For such type of soils the method is confined to a depth of 1 to 2 m. Interceptor ditches are most economical for carrying away water which emerge on the slopes and near the bottom of the foundation pit. Its size depends on the original ground slope, runoff area, type of soil and vegetation, and other factors related to runoff volume.
Construction guidelines
The interceptor ditch commonly consists of a ditch and may have an associated dike.
Sediment control measures may be required to filter or trap sediments before the runoff leaves the construction area.
The construction of the interceptor ditch at the crown of a slope is normally accomplished prior to the excavation of the cut section.
Maintenance
Inspection and maintenance is necessary after completion of construction of any structure. Here some steps followed in the maintenance of interceptor ditches are summarized below:
Periodic inspection and maintenance will be required based on post-construction site conditions.
Make any repairs necessary to ensure that it is operating properly.
Locate any damaged areas and repair as necessary.
Remove any channel obstructions (particularly waste materials) which would otherwise obstruct dewatering.
See also
Earthworks (engineering)
Digging
References
Soil mechanics
Geotechnical engineering
Civil engineering |
https://en.wikipedia.org/wiki/Amoeba | An amoeba (; less commonly spelled ameba or amœba; : am(o)ebas or am(o)ebae ), often called an amoeboid, is a type of cell or unicellular organism with the ability to alter its shape, primarily by extending and retracting pseudopods. Amoebae do not form a single taxonomic group; instead, they are found in every major lineage of eukaryotic organisms. Amoeboid cells occur not only among the protozoa, but also in fungi, algae, and animals.
Microbiologists often use the terms "amoeboid" and "amoeba" interchangeably for any organism that exhibits amoeboid movement.
In older classification systems, most amoebae were placed in the class or subphylum Sarcodina, a grouping of single-celled organisms that possess pseudopods or move by protoplasmic flow. However, molecular phylogenetic studies have shown that Sarcodina is not a monophyletic group whose members share common descent. Consequently, amoeboid organisms are no longer classified together in one group.
The best known amoeboid protists are Chaos carolinense and Amoeba proteus, both of which have been widely cultivated and studied in classrooms and laboratories. Other well known species include the so-called "brain-eating amoeba" Naegleria fowleri, the intestinal parasite Entamoeba histolytica, which causes amoebic dysentery, and the multicellular "social amoeba" or slime mould Dictyostelium discoideum.
Shape, movement and nutrition
Amoeba do not have cell walls, which allows for free movement. Amoeba move and feed by using pseudopods, which are bulges of cytoplasm formed by the coordinated action of actin microfilaments pushing out the plasma membrane that surrounds the cell. The appearance and internal structure of pseudopods are used to distinguish groups of amoebae from one another. Amoebozoan species, such as those in the genus Amoeba, typically have bulbous (lobose) pseudopods, rounded at the ends and roughly tubular in cross-section. Cercozoan amoeboids, such as Euglypha and Gromia, have slender, thread-like |
https://en.wikipedia.org/wiki/Fruticose%20lichen | A fruticose lichen is a form of lichen fungi that is characterized by a coral-like shrubby or bushy growth structure. It is formed from a symbiotic relationship of a photobiont such as green algae or less commonly cyanobacteria and one, two or more mycobionts. Fruticose lichens are not a monophyletic and holophyletic lineage, but is a form encountered in many classes. Fruticose lichens have a complex vegetation structure, and are characterized by an ascending, bushy or pendulous appearance. As with other lichens, many fruticose lichens can endure high degrees of desiccation. They grow slowly and often occur in habitats such as on tree barks, on rock surfaces and on soils in the Arctic and mountain regions.
Characteristics
Fruticose lichens are lichens composed of a shrubby or bushy thallus and a holdfast. The thallus is the vegetative body of a lichen that does not have true leaves, stems, or roots. The thallus colour is affected by the algae in the lichen, compounds created by the lichen, the character of the fungal hyphae, and the amounts of light and water in its environment. A light thallus color is associated with lower light conditions within the growing environment.
Lichens may survive extreme desiccation by an ability to quench excess light energy. Characteristic of fruticose lichen is the shape of the thallus. Like crustose lichen, fruticose lichen is composed of a holdfast which will act as an anchor for the lichen to grow in rock fissures, over loose sand or soil.
Growth and structure
Fruticose or ‘shrubby’ lichens differ from other forms of lichen because their bushy form is attached to the substrate only at the base of the lichen. A continuous algal layer grows around the circumference of the branches of the lichen. Many fruticose lichens have fine, round, hair-like structures and are loosely attached to rocks and trees. Although fruticose lichens are defined as being bushy, some can exhibit a flattened and strap-like appearances. Highly branche |
https://en.wikipedia.org/wiki/Crustose%20lichen | Crustose lichens are lichens that form a crust which strongly adheres to the substrate (soil, rock, tree bark, etc.), making separation from the substrate impossible without destruction. The basic structure of crustose lichens consists of a cortex layer, an algal layer, and a medulla. The upper cortex layer is differentiated and is usually pigmented. The algal layer lies beneath the cortex. The medulla fastens the lichen to the substrate and is made up of fungal hyphae. The surface of crustose lichens is characterized by branching cracks that periodically close in response to climatic variations such as alternate wetting and drying regimes.
Subtypes
Powdery – considered as the simplest subtype due to the absence of an organized thallus.
The thallus appears powdery.
E.g. Genera Lepraria, Vezdaea
Endolithic – grows inside the rock, usually in interstitial spaces between mineral grains. The
upper cortex is usually developed.
E.g. Genus Lecidea
Epilithic – grows on top of the rock without penetrating the rock substrate.
E.g. Acarospora fuscata
Epiphloeodal – grows only on the surface of plants.
E.g. Lecania naegelii
Endophloeodic – grows underneath the cuticle of leaves or stems.
E.g. Amandinea punctata
Squamulose – has a scale-like appearance resulting from partial separation from substrate.
It is an intermediate form between crustose and foliose.
E.g. Genus Psora, Catapyrenium, Coriscium
Peltate – similar to squamulose, but thallus remains attached near the central area.
E.g. Peltula euploca
Bullate – has an extremely inflated appearance.
E.g. Genus Mobergia
Effigurate - has radially arranged marginal lobes that are prolonged.
E.g. Genera Acarospora, Pleopsidium
Lobate – characterized by a thallus that radially arranged with lobes that are partially raised.
E.g. Genera Caloplaca, Lecanora
Suffruticose – clusters of coralloid cushions.
E.g. Peltula clavata
Structure
Crustose lichen forms a thin crust adhering closely to the substratum. In |
https://en.wikipedia.org/wiki/Foliose%20lichen | A foliose lichen is a lichen with flat, leaf-like , which are generally not firmly bonded to the substrate on which it grows. It is one of the three most common growth forms of lichens. It typically has distinct upper and lower surfaces, each of which is usually covered with a cortex; some, however, lack a lower cortex. The photobiont layer lies just below the upper cortex. Where present, the lower cortex is usually dark (sometimes even black), but occasionally white. Foliose lichens are attached to their substrate either by hyphae extending from the cortex or , or by root-like structures called . The latter, which are found only in foliose lichens, come in a variety of shapes, the specifics of which can aid in species identification. Some foliose lichens attach only at a single stout peg called a , typically located near the lichen's centre. Lichens with this structure are called "umbilicate". In general, medium to large epiphytic foliose lichens are moderately sensitive to air pollution, while smaller or ground-dwelling foliose lichens are more tolerant. The term "foliose" derives from the Latin word foliosus, meaning "leafy".
Lichens play an important role environmentally. They provide a food source for many animals such as deer, goats, and caribou, and are used as building material for bird nests. Some species can even be used in antibiotics. They are also a useful indicator of atmospheric pollution level.
Pollution
There is a direct correlation between pollution and the abundance and distribution of lichen. Foliose lichens are extremely sensitive to sulphur dioxide, which is a by-product of atmospheric pollution. Sulphur dioxide reacts with the chlorophyll in lichen, which produces phaeophytin and magnesium ions. When this reaction occurs in plants the lichen will then have less chlorophyll causing a decrease in respiration which eventually kills the lichen.
Weathering of rocks
Minerals in rocks can be weathered by the growth of lichens on exposed rock surfa |
https://en.wikipedia.org/wiki/Squamulose%20lichen | A squamulose lichen is a lichen that is composed of small, often overlapping "scales" called squamules. If they are raised from the substrate and appear leafy, the lichen may appear to be a foliose lichen, but the underside does not have a "skin" (cortex), as foliose lichens do.
Squamulose lichens are composed of flattish units that are usually tightly clustered. They are like an intermediate between crustose and foliose lichens.
Examples of squamulose lichen include Vahliella leucophaea, Cladonia subcervicornis and Lichenomphalia hudsoniana.
References
Lichenology |
https://en.wikipedia.org/wiki/PrivatOS | PrivatOS was an operating system used in the Blackphone from June 1, 2014, to June 30, 2016. It was targeted at users who sought improved privacy and security. It provided encryption for phone calls, emails, texts, and internet browsing. PrivatOS was a modified version of Android, forked from Android 4.4.2, that came with a bundle of security-minded tools. However, in contrast to Android, PrivatOS was not open source. The company that shipped PrivatOS, SGP Technologies is a joint venture between the makers of GeeksPhone, and Silent Circle.
Background
The concept of an encrypted phone had long been an interest of Silent Circle founder and PGP creator, Phil Zimmerman. In a video on Blackphone's website, Zimmerman said,
Features
The company stated its operating system was able to “close all backdoors” which were usually found on major mobile operating systems. Some major features of PrivatOS were anonymous search, privacy-enabled bundled apps, smart disabling of Wi-Fi except trusted hotspots, more control in app permissions, private communication (calling, texting, video chat, browsing, file sharing and conference calls). Geeksphone also claimed the phone would receive frequent secure updates from Blackphone directly.
Reception
Ars Technica praised that the Blackphone's Security Center in PrivatOS gave control over app permissions and liked that PrivatOS came bundled with the Silent Phone, Silent Text, Disconnect VPN and Disconnect Search services. Ars did not like that the phone’s performance was mediocre, using a custom OS meant no Google Play or any of the other benefits of the Google ecosystem, spotty support for sideloaded apps, and reliance on Amazon or other third-party app stores. After a month of using the device, Joshua Drake from Accuvant concluded that Blackphone's security claims were overstated, criticizing the closed-source nature of the OS and a lack of OS or kernel hardening features, but praising its fast patching and added features.
References
|
https://en.wikipedia.org/wiki/Self-interference%20cancellation | Self-interference cancellation (SIC) is a signal processing technique that enables a radio transceiver to simultaneously transmit and receive on a single channel, a pair of partially-overlapping channels, or any pair of channels in the same frequency band. When used to allow simultaneous transmission and reception on the same frequency, sometimes referred to as “in-band full-duplex” or “simultaneous transmit and receive,” SIC effectively doubles spectral efficiency. SIC also enables devices and platforms containing two radios that use the same frequency band to operate both radios simultaneously.
Self-interference cancellation has applications in mobile networks, the unlicensed bands, cable TV, mesh networks, the military, and public safety.
In-band full-duplex has advantages over conventional duplexing schemes. A frequency division duplexing (FDD) system transmits and receives at the same time by using two (usually widely separated) channels in the same frequency band. In-band full-duplex performs the same function using half of the spectrum resources. A time division duplexing (TDD) system operates half-duplex on a single channel, creating the illusion of full-duplex communication by rapidly switching back-and-forth between transmit and receive. In-band full-duplex radios achieve twice the throughput using the same spectrum resources.
Techniques
A radio transceiver cannot cancel out its own transmit signal based solely on knowledge of what information is being sent and how the transmit signal is constructed. The signal that the receiver sees is not entirely predictable. The signal that appears at the receiver is subject to varying delays. It consists of a combination of leakage (the signal traveling directly from the transmitter to the receiver) and local reflections. In addition, transmitter components (such as mixers and power amplifiers) introduce non-linearities that generate harmonics and noise. These distortions must be sampled at the output of the transm |
https://en.wikipedia.org/wiki/Lichenicolous%20fungus | A lichenicolous fungus' (from Latin -cola 'inhabitant'; akin to Latin colere 'to inhabit') is a parasitic fungus that only lives on lichen as the host. A lichenicolous fungus is not the same as the fungus that is the component of the lichen, which is known as a lichenized fungus. They are most commonly specific to a given fungus as the host, but they also include a wide range of pathogens, saprotrophs, and commensals. It is estimated there are 3000 species of lichenicolous fungi. More than 1800 species are already described among the Ascomycota and Basidiomycota. More than 95% of lichenicolous fungi described as of 2003 are ascomycetes, in 7 classes and 19 orders. Although basidiomycetes have less than 5% of lichenicolous lichen species, they represent 4 classes and 8 orders. Many lichenicolous species have yet to be assigned a phylogenetic position as of 2003.
See also
List of lichenicolous fungi of Iceland
References
Lichenology |
https://en.wikipedia.org/wiki/Gelfand%20ring | In mathematics, a Gelfand ring is an associative ring R with identity such that if I and J are distinct right ideals then there are elements i and j such that iRj=0, i is not in I, and j is not in J. introduced them as rings for which one could prove a generalization of Gelfand duality, and named them after Israel Gelfand.
In the commutative case, Gelfand rings can also be characterized as the rings such that, for every and summing to , there exists and such that
.
Moreover, their prime spectrum deformation retracts onto the maximal spectrum.
References
Ring theory |
https://en.wikipedia.org/wiki/Armadillo%20projection | The armadillo projection is a map projection used for world maps. It is neither conformal nor equal-area but instead affords a view evoking a perspective projection while showing most of the globe instead of the half or less that a perspective would. The projection was presented in 1943 by Erwin Raisz (1893–1968) as part of a series of "orthoapsidal" projections, which are perspectives of the globe projected onto various surfaces. This entry in the series has the globe projected onto the outer half of half a torus. Raisz singled it out and named it the "armadillo" projection.
The toroidal shape and the angle it is viewed from tend to emphasize continental areas by eliminating or foreshortening swaths of ocean. In Raisz's original presentation, the torus is tilted so that New Zealand and Antarctica cannot be seen, as in the images here. However, in publications, the projection often develops a "pigtail" which shows the rest of Australia as well as New Zealand.
Raisz coined the term orthoapsidal as a combination of orthographic and apsidal. He used it to mean drawing a parallel-meridian network, or graticule, on any suitable solid other than a sphere, and then making an orthographic projection of that.
Formulas
Given a radius of sphere R, central meridian λ0 and a point with geographical latitude φ and longitude λ, plane coordinates x and y can be computed using the following formulas:
In this formulation, no latitude more southerly than φs should be plotted for the given longitude. The y-axis coincides with the central meridian.
See also
List of map projections
References
External links
Description and characteristics at mapthematics.com
Map projections |
https://en.wikipedia.org/wiki/Painlev%C3%A9%20conjecture | In physics, the Painlevé conjecture is a theorem about singularities among the solutions to the n-body problem: there are noncollision singularities for n ≥ 4.
The theorem was proven for n ≥ 5 in 1988 by Jeff Xia and for n=4 in 2014 by Jinxin Xue.
Background and statement
Solutions of the n-body problem (where M are the masses and U denotes the gravitational potential) are said to have a singularity if there is a sequence of times converging to a finite where . That is, the forces and accelerations become infinite at some finite point in time.
A collision singularity occurs if tends to a definite limit when . If the limit does not exist the singularity is called a pseudocollision or noncollision singularity.
Paul Painlevé showed that for n = 3 any solution with a finite time singularity experiences a collision singularity. However, he failed at extending this result beyond 3 bodies. His 1895 Stockholm lectures end with the conjecture that
For n ≥ 4 the n-body problem admits noncollision singularities.
Development
Edvard Hugo von Zeipel proved in 1908 that if there is a collision singularity, then tends to a definite limit as , where is the moment of inertia. This implies that a necessary condition for a noncollision singularity is that the velocity of at least one particle becomes unbounded (since the positions remain finite up to this point).
Mather and McGehee managed to prove in 1975 that a noncollision singularity can occur in the co-linear 4-body problem (that is, with all bodies on a line), but only after an infinite number of (regularized) binary collisions.
Donald G. Saari proved in 1977 that for almost all (in the sense of Lebesgue measure) initial conditions in the plane or space for 2, 3 and 4-body problems there are singularity-free solutions.
In 1984, Joe Gerver gave an argument for a noncollision singularity in the planar 5-body problem with no collisions. He later found a proof for the 3n body case.
Finally, in his 1988 doctoral disse |
https://en.wikipedia.org/wiki/Total%20set | In functional analysis, a total set (also called a complete set) in a vector space is a set of linear functionals with the property that if a vector satisfies for all then is the zero vector.
In a more general setting, a subset of a topological vector space is a total set or fundamental set if the linear span of is dense in
See also
References
Linear algebra
Topological vector spaces |
https://en.wikipedia.org/wiki/Comparison%20of%20DVD%20ripper%20software | This article lists DVD ripper software capable of ripping and converting DVD discs, ISO image files or DVD folders to computer, mobile handsets and media players supported file formats.
General information
Note: Applications with a purple background are no longer in development.
Supported software & hardware, user interface
This table lists the operating systems that different DVD rippers can run on without emulation and/or compatibility layer(s) (e.g.Wine under Linux and/or other operating systems are marked as No, mostly noted, but there may be other applications running under emulation and/or compatibility layer(s) which are not marked). Other minimum system requirements are listed; some features (like High Definition support) may be unavailable with these specifications.
Disabling DRM
Note: As at 2009-12-10 much of the data below is based on available wiki-pages, official website pages & some limited user experience (i.e. where this table reads 'Yes' OR 'No', may be true OR may in fact need to read 'Partial', or 'Obsolete' as many encryption methods may change over time.)
Input files supported
Output files supported
References
External links
DVD rippers
DVD ripper software |
https://en.wikipedia.org/wiki/Overprovisioning | Overprovisioning can refer to:
Allocating additional bandwidth in
Allocation of additional storage space required to mitigate write amplification in a solid-state drive |
https://en.wikipedia.org/wiki/Extension%20of%20a%20topological%20group | In mathematics, more specifically in topological groups, an extension of topological groups, or a topological extension, is a short exact sequence where and are topological groups and and are continuous homomorphisms which are also open onto their images. Every extension of topological groups is therefore a group extension.
Classification of extensions of topological groups
We say that the topological extensions
and
are equivalent (or congruent) if there exists a topological isomorphism making commutative the diagram of Figure 1.
We say that the topological extension
is a split extension (or splits) if it is equivalent to the trivial extension
where is the natural inclusion over the first factor and is the natural projection over the second factor.
It is easy to prove that the topological extension splits if and only if there is a continuous homomorphism such that is the identity map on
Note that the topological extension splits if and only if the subgroup is a topological direct summand of
Examples
Take the real numbers and the integer numbers. Take the natural inclusion and the natural projection. Then
is an extension of topological abelian groups. Indeed it is an example of a non-splitting extension.
Extensions of locally compact abelian groups (LCA)
An extension of topological abelian groups will be a short exact sequence where and are locally compact abelian groups and and are relatively open continuous homomorphisms.
Let be an extension of locally compact abelian groups
Take and the Pontryagin duals of and and take and the dual maps of and . Then the sequence
is an extension of locally compact abelian groups.
Extensions of topological abelian groups by the unit circle
A very special kind of topological extensions are the ones of the form where is the unit circle and and are topological abelian groups.
The class S(T)
A topological abelian group belongs to the class if and onl |
https://en.wikipedia.org/wiki/The%20Mathematics%20of%20Life | The Mathematics of Life is a 2011 popular science book by mathematician Ian Stewart, on the increasing role of mathematics in biology.
Overview
Stewart discusses the mathematics behind such topics as population growth, speciation, brain function, chaos theory, game theory, networking, symmetry, and animal coloration, with little recourse to equations. He identifies six revolutions which modernized biology:
The invention of the microscope
A systematic means of classifying species
Evidence of evolution
The expansion of the field of genetics
The discovery of the structure of DNA
The application of new mathematics to biology
Reception
Writer Alex Bellos described The Mathematics of Life as "a testament to the versatility of maths and how it is shaping our understanding of the world." Kirkus Reviews called the book "an ingenious overview of biology with emphasis on mathematical ideas—stimulating but requiring careful reading despite the lack of equations." A review in Notices of the American Mathematical Society noted that the book "does an admirable job of unfolding the mathematics undergirding so much of the research being carried out today in the many fields that comprise the subject of biology."
Mathematician and science writer Keith Devlin criticized the book, writing that "readers of the author's many general-audience books on mathematics may be surprised to find themselves at times frustrated by his latest outing, which is marred by overlapping and often repetitious passages."
References
Books by Ian Stewart (mathematician)
Popular mathematics books
Biology books
Basic Books books
2011 non-fiction books |
https://en.wikipedia.org/wiki/Glossary%20of%20Principia%20Mathematica | This is a list of the notation used in Alfred North Whitehead and Bertrand Russell's Principia Mathematica (1910–1913).
The second (but not the first) edition of Volume I has a list of notation used at the end.
Glossary
This is a glossary of some of the technical terms in Principia Mathematica that are no longer widely used or whose meaning has changed.
Symbols introduced in Principia Mathematica, Volume I
Symbols introduced in Principia Mathematica, Volume II
Symbols introduced in Principia Mathematica, Volume III
See also
Glossary of set theory
Notes
References
Whitehead, Alfred North, and Bertrand Russell. Principia Mathematica, 3 vols, Cambridge University Press, 1910, 1912, and 1913. Second edition, 1925 (Vol. 1), 1927 (Vols. 2, 3).
External links
List of notation in Principia Mathematica at the end of Volume I
"The Notation in Principia Mathematica" by Bernard Linsky.
Principia Mathematica online (University of Michigan Historical Math Collection):
Volume I
Volume II
Volume III
Proposition ✸54.43 in a more modern notation (Metamath)
Large-scale mathematical formalization projects
Analytic philosophy literature
Mathematical logic
Mathematics books
Logic books
Mathematics literature
Books by Bertrand Russell
Works by Alfred North Whitehead
Mathematical notation
Logic symbols
Principia Mathematica
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/Bertha%20Lamme%20Feicht | Bertha Lamme Feicht (December 16, 1869 – November 20, 1943) was an American engineer. In 1893, she became the first woman to receive a degree in engineering from the Ohio State University. She is considered to be the first American woman to graduate in a main discipline of engineering other than civil engineering.
Early life and education
She was born Bertha Lamme on her family's farm in Bethel Township near Springfield, Ohio on December 16, 1869.
After graduating from Olive Branch High School in 1889, she followed in her brother, Benjamin G. Lamme's footsteps and enrolled at Ohio State that fall.
She graduated in 1893 with a degree in mechanical engineering with a specialty in electricity. Her thesis was titled "An Analysis of Tests of a Westinghouse Railway Generator." The student newspaper reported that there was an outbreak of spontaneous applause when she received her degree.
Career
She was then hired by Westinghouse as its first female engineer. She worked there until she married Russell S. Feicht, her supervisor and fellow Ohio State alumnus, on December 14, 1905.
Personal life
She had one child, Florence, born in 1910, who became a physicist for the U.S. Bureau of Mines.
Bertha Lamme Feicht died in Pittsburgh on November 20, 1943 and was buried in Homewood Cemetery.
Her husband Russell died in April 1949.
Legacy
Some of her personal effects, including her slide rule, T-square, and diploma, are housed in the collections of the Heinz History Center in Pittsburgh.
The Westinghouse Educational Foundation, in conjunction with the Society of Women Engineers, created a scholarship named for her in 1973.
References
Further reading
1869 births
1943 deaths
Ohio State University College of Engineering alumni
People from Clark County, Ohio
American women engineers
American electrical engineers
Burials at Homewood Cemetery
Human computers |
https://en.wikipedia.org/wiki/Vagrant%20lichen | A vagrant lichen is a lichen that is either not attached to a substrate, or can become unattached then blow around, yet continue to grow and flourish. Some authors reserve the expression "vagrant lichen" for those lichens that never attach, that is, those that are obligately vagrant, referring to vagrant forms of other species as "erratic lichen". Vagrant lichens generally occur in open and windswept habitats, all over the world, in all kinds of temperature zones. Habitats include saltbush (mallee) vegetation zones in Australia, steppes of Eurasia, Arctic tundra, and the North American prairie. They range from the low elevations of the Namib Desert to the high altitude Andean páramo. There are under 100 identified vagrant species, most commonly in the Aspicilia and Xanthoparmelia genera.
References
Lichenology |
https://en.wikipedia.org/wiki/Script%20lichen | A script lichen, or graphid lichen, is a member of a group of lichens which have spore producing structures that look like writing on the lichen body. The structures are elongated and narrow apothecia called lirellae, which look like short scribbles on the thallus. "Graphid" is derived from Greek for "writing". An example is Graphis mucronata.
References
Lichenology
Fungus common names |
https://en.wikipedia.org/wiki/Princeton%20Lectures%20in%20Analysis | The Princeton Lectures in Analysis is a series of four mathematics textbooks, each covering a different area of mathematical analysis. They were written by Elias M. Stein and Rami Shakarchi and published by Princeton University Press between 2003 and 2011. They are, in order, Fourier Analysis: An Introduction; Complex Analysis; Real Analysis: Measure Theory, Integration, and Hilbert Spaces; and Functional Analysis: Introduction to Further Topics in Analysis.
Stein and Shakarchi wrote the books based on a sequence of intensive undergraduate courses Stein began teaching in the spring of 2000 at Princeton University. At the time Stein was a mathematics professor at Princeton and Shakarchi was a graduate student in mathematics. Though Shakarchi graduated in 2002, the collaboration continued until the final volume was published in 2011. The series emphasizes the unity among the branches of analysis and the applicability of analysis to other areas of mathematics.
The Princeton Lectures in Analysis has been identified as a well written and influential series of textbooks, suitable for advanced undergraduates and beginning graduate students in mathematics.
History
The first author, Elias M. Stein, was a mathematician who made significant research contributions to the field of mathematical analysis. Before 2000 he had authored or co-authored several influential advanced textbooks on analysis.
Beginning in the spring of 2000, Stein taught a sequence of four intensive undergraduate courses in analysis at Princeton University, where he was a mathematics professor. At the same time he collaborated with Rami Shakarchi, then a graduate student in Princeton's math department studying under Charles Fefferman, to turn each of the courses into a textbook. Stein taught Fourier analysis in that first semester, and by the fall of 2000 the first manuscript was nearly finished. That fall Stein taught the course in complex analysis while he and Shakarchi worked on the corresponding ma |
https://en.wikipedia.org/wiki/Sensor%20journalism | Sensor journalism refers to the use of sensors to generate or collect data, then analyzing, visualizing, or using the data to support journalistic inquiry. This is related to but distinct from data journalism. Whereas data journalism relies on using historical or existing data, sensor journalism involves the creation of data with sensor tools. This also includes drone journalism.
Background
Examples of sensor-based journalism (below) date back to the early 2000s and usually involve the use of sensor tools to generate or collect data to be reported on. The way in which the sensors are deployed varies. In some cases, a journalist will learn how to operate and deploy a sensor (see Houston Chronicle) while in others (see WNYC Cicada Tracker), the sensors are built and deployed by the general public. Journalists can also request data from existing sensor networks (see Sun Sentinel example) and remote sensors (see ProPublica example).
Sensors used for reporting can be closed source with expressly stated terms of use or open source, which allows for modification of the sensor downstream of development.
Sensor journalism modules have been taught at Emerson College (around water quality/contamination) and Florida International University (around sea-level rise). San Diego State University planned an air-quality sensor-journalism module for spring 2015.
Examples
Houston Chronicle, In Harm’s Way
A study about toxic chemicals in the air in public parks.
USA Today, Ghost Factories
A series that looked at lead-contaminated soil in neighborhoods around previous U.S. lead factories.
Sun Sentinel, Above the Law
A series about the tendencies of cops to speed.
WNYC Cicada Tracker
A project that revolved around the emergence of Magicicada.
Washington Post, ShotSpotter
A project with 300 acoustic sensors across 20 square miles in D.C.
Planet Money, Planet Money Makes a T-shirt
A project that followed the production of a shirt from beginning to end.
ProPublica, L |
https://en.wikipedia.org/wiki/Stickers%20as%20a%20Service | Stickers as a service (SaaS) is a category of cloud computing services that provides digital stickers to messaging apps and photo editing software.
In this model, the stickers are sold through stores integrated in messaging apps, chat and photo editing software. They can be used as a method to generate revenue besides through in-app advertising as they are non-intrusive.
SaaS offerings may include handling micro payments, sticker shop integration and content management systems with developing apps, and is similar to Software as a Service (SaaS) and Platform as a Service (PaaS).
Stickers as a service enables developers to build a full sticker stores into their apps with just a few lines of code.
Stickers
Digital stickers, commonly sold as virtual goods, tend to depict either original or well-known characters. They are used during chat sessions between users and act as large sized emoji to express emotions or as decoration in photographs.
Stickers vary from original characters to popular manga, anime and gaming characters or movie tie-ins. They can be purchased or downloaded for free in apps with sticker stores installed. Limited edition stickers may also be gained via special occasions or achievements.
It is used as an alternative to emoji or emoticons as they are a more expressive form of communication and have a variety of designs and art styles.
Apps that use Stickers
LINE
Kakaotalk
Facebook Messenger
WhatsApp
Instagram (Messages and Stories)
Snapchat (Messages and Stories)
Viber
BlackBerry
PhotoStamped
See also
Virtual economy
Gamification
Purikura
References
External links
Emoji Universe
Emoticons
Online chat
Cloud applications |
https://en.wikipedia.org/wiki/IBML | ibml (Imaging Business Machines, L.L.C.), founded in 1992, is a privately held information capture company headquartered in Irondale, Alabama, United States. Combining hardware and software products and services, ibml products provide end-to-end scanning and document capture.
History and technology
Founded as a document scanning company on August 1, 1992, by Gary Murphy, ibml has grown into an information capture business that focuses on design, manufacture, delivery, and the support of high-speed document capture scanners and software. The ImageTrac scanner, a core product, was first shipped to Australian Airlines to read ticket numbers and capture color images of tickets for the airline revenue accounting process. It became the scanner of choice for the airline industry soon thereafter.
In 1997, ibml released SoftTrac software to manage ImageTrac scanners. The series continued to evolve; ImageTrac II was introduced in 2000, and ImageTrac III and ImageTrac IV were released in about 2003. In 2009, these scanners were selected for use by the 2010 United States Census. 2010 saw the introduction of the ImageTrac Series 5000 platform. This was followed by the launch of SoftTrac Capture Suite software in 2011, the ImageTracDS line of products in 2012, SoftTrac Synergetics intelligent document recognition software in 2013, and the ImageTrac Series 6000 in 2014. In 2020, the company unveiled the FADGI 3-Star Certified ibmlFUSiON™ high-speed intelligent scanner.
In June 2007, the majority of ibml was purchased by the private equity firm Ares Management. A minority is owned by management. The board of directors consists of two individuals from Ares Management, one independent party, and ibml's CEO, Martin Birch.
References
Further reading
Business Insider article "ibml Unveils World's Fastest, Ultra-High-Volume, Intelligent Scanner: The ibml FUSiON, the Most Comprehensive Intelligent Information Capture Solution", February 10, 2020
RealWire news article "ibml |
https://en.wikipedia.org/wiki/Askold%20Khovanskii | Askold Georgievich Khovanskii (; born 3 June 1947, Moscow) is a Russian and Canadian mathematician currently a professor of mathematics at the University of Toronto, Canada. His areas of research are algebraic geometry, commutative algebra, singularity theory, differential geometry and differential equations. His research is in the development of the theory of toric varieties and Newton polyhedra in algebraic geometry. He is also the inventor of the theory of fewnomials, and the Bernstein–Khovanskii–Kushnirenko theorem is named after him.
He obtained his Ph.D. from Steklov Mathematical Institute in Moscow under the supervision of Vladimir Arnold. In his Ph.D. thesis, he developed a topological version of Galois theory. He studies the theory of Newton–Okounkov bodies, or Okounkov bodies for short.
Among his graduate students are Olga Gel'fond, Feodor Borodich, H. Petrov-Tan'kin, Kiumars Kaveh, Farzali Izadi, Ivan Soprunov, Jenya Soprunova, Vladlen Timorin, Valentina Kirichenko, Sergey Chulkov, V. Kisunko, Mikhail Mazin, O. Ivrii, K. Matveev, Yuri Burda, and J. Yang.
In 2014, he received the Jeffery–Williams Prize of the Canadian Mathematical Society for outstanding contributions to mathematical research in Canada.
References
External links
Homepage of Askold Khovanskii at the University of Toronto
Moscow Mathematical Journal volume in honor of Askold Khovanskii (Mosc. Math. J., 7:2 (2007), 169–171)
Askoldfest
1947 births
Living people
Russian mathematicians
Canadian mathematicians
Moscow State University alumni
Steklov Institute of Mathematics alumni
Academic staff of the Independent University of Moscow
Academic staff of the University of Toronto
Geometers
Russian people of Lithuanian descent
Algebraic geometers
Soviet mathematicians |
https://en.wikipedia.org/wiki/Repair%20kit | A repair kit or service kit is a set of items used to repair a device, commonly comprising both tools and spare parts. Many kits are designed for vehicles, such as cars, boats, airplanes, motorbikes, and bicycles, and may be kept with the vehicle in order to make on-the-spot repairs. Some are considered essential safety equipment, and may be included survival kits. In the military, personnel crossing large water bodies in aircraft may be equipped with a raft and raft repair kit. Other kits, such as those for watch repair or specific engine components, are used by professionals. Depending on the type, a repair kits may be included when buying a product, or may be purchased separately.
Examples
Road vehicles often include basic tools and spare parts which commonly fail. A bicycle repair kit, for example, normally contains tools as well as patches and glue to repair a punctured tire. Other kits that include patches and glue are used to fix holes in fabric items such as inflatable boats and tents.
Watercraft normally contain both safety equipment and repair kits as part of their emergency equipment.
Some automobiles, such as the Mitsubishi i-MiEV, have an optional repair kit available. The Mercedes-Benz OM604 engine has an optional repair kit to help replace seals. The 1905 Gale Model A came with a repair kit.
In aerospace, kits have been developed for repairing the thermal protection tiles on the Space Shuttle and to fix space suits.
Professionals who repair and maintain electronic equipment may have a kit containing a soldering iron, wire, and components such as transistors and resistors.
In medicine, a repair kit consisting of a plug and plastic mesh may be used during inguinal hernia surgery.
A particular trade may use a repair kit as part of normal work, such as in watch repair and at automobile repair shops.
Components
A wide variety of tools and replacement parts may be included in a repair kit. Some common examples include screwdriver, spare tire, jum |
https://en.wikipedia.org/wiki/Direct%20sum%20of%20topological%20groups | In mathematics, a topological group is called the topological direct sum of two subgroups and if the map
is a topological isomorphism, meaning that it is a homeomorphism and a group isomorphism.
Definition
More generally, is called the direct sum of a finite set of subgroups of the map
is a topological isomorphism.
If a topological group is the topological direct sum of the family of subgroups then in particular, as an abstract group (without topology) it is also the direct sum (in the usual way) of the family
Topological direct summands
Given a topological group we say that a subgroup is a topological direct summand of (or that splits topologically from ) if and only if there exist another subgroup such that is the direct sum of the subgroups and
A the subgroup is a topological direct summand if and only if the extension of topological groups
splits, where is the natural inclusion and is the natural projection.
Examples
Suppose that is a locally compact abelian group that contains the unit circle as a subgroup. Then is a topological direct summand of The same assertion is true for the real numbers
See also
References
Topological groups
Topology |
https://en.wikipedia.org/wiki/Flying%20glass | Flying glass refers to pieces of broken glass (typically from a window) which become sharp missiles projected by the force which broke the glass, along with any strain energy due to tempering. They often cause cut-type injuries.
Flying glass resulting from an explosion poses a significant risk in the event; up to 85% of injuries from an explosion are due to flying glass.
Severity of injury from flying glass depends on the peak overpressure of the blast. Potential for injury has been derived from both experiments and theoretical modeling of blast effects. Among the important features in models of flying glass are breaking pressure, velocity and distribution of flying fragments, fragment shape, and the distance traveled until impact. Mitigation strategies, such as the use of window glazing or laminated glass can reduce flying glass injuries.
References
Injuries
Glass engineering and science |
https://en.wikipedia.org/wiki/Min%C3%A4%20Per%C3%A4smies | Minä Peräsmies is a 1998 Finnish PC-ROM for Windows that consists of comics, games and other content based on the superhero character of Peräsmies whom is able to fly by farting ”with the power of a thousand hurricanes”. The ROM was created by a team at the media company Mediakeisari Oy including Timo Kokkila (the artist), Petri Tuomola and Reima Mäkinen and published and sold by Plan1 Oy. The character became known from the Finnish comic and humor magazine Pahkasika and strips were released from 1983 to 2000.
Content
The ROM includes 8 comics, 5 games (one of which is a printable board game), the Food Circle of Peräsmies and the Museum Center Fiasco (a multimedia Fart Museum and a collection of images). The packaging also contains comic strips and other "stuff".
Reception
The ROM did not receive a mixed reception. Most of the published reviews conclude that it is an essentially worth a single quick viewing with some descent artwork and momentarily interesting technical work including the wide array of fart sounds´.
Making-of documentary
A making-of has been released on YouTube in two parts. The documentary "Näin tehtiin Minä Peräsmies" consists of interviews and archive footage from the time of the ROM's making and was made by Reima Mäkinen.
References
External links
1998 software
Flatulence
Parody superheroes
Entertainment software |
https://en.wikipedia.org/wiki/High-performance%20Integrated%20Virtual%20Environment | The High-performance Integrated Virtual Environment (HIVE) is a distributed computing environment used for healthcare-IT and biological research, including analysis of Next Generation Sequencing (NGS) data, preclinical, clinical and post market data, adverse events, metagenomic data, etc. Currently it is supported and continuously developed by US Food and Drug Administration (government domain), George Washington University (academic domain), and by DNA-HIVE, WHISE-Global and Embleema (commercial domain). HIVE currently operates fully functionally within the US FDA supporting wide variety (+60) of regulatory research and regulatory review projects as well as for supporting MDEpiNet medical device postmarket registries. Academic deployments of HIVE are used for research activities and publications in NGS analytics, cancer research, microbiome research and in educational programs for students at GWU. Commercial enterprises use HIVE for oncology, microbiology, vaccine manufacturing, gene editing, healthcare-IT, harmonization of real-world data, in preclinical research and clinical studies.
Infrastructure
HIVE is a massively parallel distributed computing environment where the distributed storage library and the distributed computational powerhouse are linked seamlessly. The system is both robust and flexible due to maintaining both storage and the metadata database on the same network. The distributed storage layer of software is the key component for file and archive management and is the backbone for the deposition pipeline. The data deposition back-end allows automatic uploads and downloads of external datasets into HIVE data repositories. The metadata database can be used to maintain specific information about extremely large files ingested into the system (big data) as well as metadata related to computations run on the system. This metadata then allows details of a computational pipeline to be brought up easily in the future in order to validate or replicate |
https://en.wikipedia.org/wiki/GhostTunes | GhostTunes was an online music store and digital library. Founded by American country music singer Garth Brooks, Randy Bernard, and Chris Webb, it launched in September 2014 and featured singles and albums from a variety of artists, including Brooks' entire catalogue. GhostTunes varied from other online music stores such as the iTunes Store by allowing the individual record labels to choose their selling format, such as entire albums or singles (all 320 kbit/s MP3s), as well as prices, with an emphasis on fair and proper royalty payments. Its digital library could be synced across multiple devices, creating a multi-platform collection encompassing all user-downloaded music, regardless of the store used to purchase.
On March 3, 2017, GhostTunes was absorbed into Amazon Music.
History
Following widely covered disagreements with music streaming, Garth Brooks founded GhostTunes in 2014 to coincide with his return to live performing and album releases. Its beta version launched on September 4, 2014, with the full version rolling out two months later.
While GhostTunes' original purpose was to exclusively showcase Brooks' music, Brooks made a push to allow many other artists to sell their music in the online store, allowing it to evolve into an e-commerce site containing more than 10 million songs available for purchase. Fittingly, the first albums available for purchase through the music service were Brooks' entire catalogue, available digitally for the first time, along with the exclusive release of his album, Man Against Machine. GhostTunes remained the only online means by which to purchase Brooks' albums until his 2016 partnership with Amazon. The service's name, "GhostTunes", was derived from founder Brooks' first name, Garth, and his "hosting" of the site ("G-host").
Brooks announced on October 19, 2016, in an interview with Billboard, that he was moving his music to the "Music Unlimited" streaming service from Amazon Music, stating that he was unsure what the f |
https://en.wikipedia.org/wiki/List%20of%20extinct%20rodents | This list is of rodent species that are extinct − no longer alive.
Species from related groups such as Lagomorpha (rabbits and hares) are not included.
Before 1500
Extinct after 1500
16th century
Oriente cave rat
Torre's cave rat
Imposter hutia
Montane hutia
Megaoryzomys
Cuban coney
Hispaniolan edible rat
Conilurus capricornensis
Samaná hutia
Buhler's coryphomys
Noronhomys
Pennatomys nivalis
Desmarest's hutia
17th century
Insular cave rat
Puerto Rican hutia
Verhoeven's giant tree rat
See also
– all periods
References
.
Rodents
.
Extinct rodents
Rodents, extinct |
https://en.wikipedia.org/wiki/Hola%20%28VPN%29 | Hola is a freemium web and mobile application which provides a form of VPN service to its users through a peer-to-peer network. It also uses peer-to-peer caching. When a user accesses certain domains that are known to use geo-blocking, the Hola application redirects the request to go through the computers and Internet connections of other users in non-blocked areas, thereby circumventing the blocking. Users of the free service share a portion of their idle upload bandwidth to be used for serving cached data to other users. Paying users can choose to redirect all requests to peers but are themselves never used as peers.
History
In 1998, Ofer Vilenski and Derry Shribman founded KRFTech, a software development tools company. With the profits from the company, they started Jungo in 2000 to develop an operating system for home gateways. In 2006, NDS (Cisco) acquired Jungo for $107 million.
In 2008, Vilenski and Shribman started investigating the idea of re-inventing HTTP by building a peer-to-peer overlay network that would employ peer-to-peer caching to accelerate content distribution and peer-to-peer routing to make the effective bandwidth to target sites much faster. This would make the Internet faster for users and cheaper to operate for content distributors. They started up Hola with $18 million from investors such as DFJ (Skype, Hotmail), Horizons Ventures (Li Ka-shing's venture capital fund), Magma Venture Partners (Waze), Israel's Chief Scientist Fund, and others.
Hola Networks Limited launched its network in late 2012, and it became popular in January 2013 when consumers started using Hola for Internet privacy and anonymity by utilizing the P2P routing for IP masking. "After being around for two months with 80 downloads a day, on January 23, 2013, at 5 PM Israel time, the product was good enough. That was the second it took off and went up overnight to 40,000 downloads a day", Vilenski told Startup Camel.
In May 2015, Hola came under criticism from 8chan fo |
https://en.wikipedia.org/wiki/Saxicolous%20lichen | A saxicolous lichen is a lichen that grows on rock. The prefix "sax" from the Latin means "rock" or "stone".
Characteristics
Saxicolous lichens exhibit very slow growth rates. They may develop on rock substrates for long periods of time, given the absence of external disturbances. The importance of the mineral composition of the rock substrate, as well as the elemental geochemistry is also important to the distribution of saxicolous lichens, but the relationship between the substrate influence on lichens, either chemical or textural, is still obscure.
Communities of saxicolous lichens are often species-rich in terms of number.
References
Lichenology |
https://en.wikipedia.org/wiki/Lignicolous%20lichen | A lignocolous lichen is a lichen that grows on wood that has the bark stripped from it. This is to be compared to a corticolous lichen that grows on bark, and saxicolous lichens that grow on rock.
References
Lichenology |
https://en.wikipedia.org/wiki/Corticolous%20lichen | A corticolous lichen is a lichen that grows on bark. This is contrasted with lignicolous lichen, which grows on wood that has had the bark stripped from it, and saxicolous lichen, which grows on rock.
Examples of corticolous lichens include the crustose lichen Graphis plumierae, foliose lichen Melanohalea subolivacea and the fruticose Bryoria fuscescens.
References
Lichenology |
https://en.wikipedia.org/wiki/Mechanical%E2%80%93electrical%20analogies | Mechanical–electrical analogies are the representation of mechanical systems as electrical networks. At first, such analogies were used in reverse to help explain electrical phenomena in familiar mechanical terms. James Clerk Maxwell introduced analogies of this sort in the 19th century. However, as electrical network analysis matured it was found that certain mechanical problems could more easily be solved through an electrical analogy. Theoretical developments in the electrical domain that were particularly useful were the representation of an electrical network as an abstract topological diagram (the circuit diagram) using the lumped element model and the ability of network analysis to synthesise a network to meet a prescribed frequency function.
This approach is especially useful in the design of mechanical filters—these use mechanical devices to implement an electrical function. However, the technique can be used to solve purely mechanical problems, and can also be extended into other, unrelated, energy domains. Nowadays, analysis by analogy is a standard design tool wherever more than one energy domain is involved. It has the major advantage that the entire system can be represented in a unified, coherent way. Electrical analogies are particularly used by transducer designers, by their nature they cross energy domains, and in control systems, whose sensors and actuators will typically be domain-crossing transducers. A given system being represented by an electrical analogy may conceivably have no electrical parts at all. For this reason domain-neutral terminology is preferred when developing network diagrams for control systems.
Mechanical–electrical analogies are developed by finding relationships between variables in one domain that have a mathematical form identical to variables in the other domain. There is no one, unique way of doing this; numerous analogies are theoretically possible, but there are two analogies that are widely used: the imp |
https://en.wikipedia.org/wiki/Endolithic%20lichen | An endolithic lichen is a crustose lichen that grows inside solid rock, growing between the grains, with only the fruiting bodies exposed to the air. An example is Caloplaca luteominea subspecies bolandri.
References
Lichenology |
https://en.wikipedia.org/wiki/Umbilicate%20lichen | An umbilicate lichen is a lichen that is only attached to its substrate at a single point. An example is Lasallia papulosa.
References
Lichenology |
https://en.wikipedia.org/wiki/Autonomous%20decentralized%20system | An autonomous decentralized system (or ADS) is a decentralized system composed of modules or components that are designed to operate independently but are capable of interacting with each other to meet the overall goal of the system. This design paradigm enables the system to continue to function in the event of component failures. It also enables maintenance and repair to be carried out while the system remains operational. Autonomous decentralized systems have a number of applications including industrial production lines, railway signalling and robotics.
The ADS has been recently expanded from control applications to service application and embedded systems, thus autonomous decentralized service systems and autonomous decentralized device systems.
History
Autonomous decentralized systems were first proposed in 1977.
ADS received significant attention as such systems have been deployed in Japanese railway systems for many years safely with over 7 billion trips, proving the value of this concept. Japan railway with ADS is considered as a smart train as it also learns.
To recognizing this outstanding contribution, Dr. Kinji Mori has received numerous awards including 2013 IEEE Life Fellow, 2012 Distinguished Service Award, Tokyo Metropolitan Government, 2012 Distinguished Specialist among 1000 in the world, Chinese Government, 2008 IEICE Fellow, 1995 IEEE Fellow 1994 Research and Development Award of Excellence Achievers, Science and Technology Agency, 1994 Ichimura Industrial Prize, 1992 Technology Achievement Award, Society of Instrument and Control Engineers, 1988 National Patent Award, Science and Technology Agency, and 1988 Mainichi Technology Prize of Excellence. Dr. Mori donated the cash from Ichimura Industrial Price to IEEE to fund the IEEE Kanai Award.
Since 1977, ADS has been a subject of research by many researchers in the world including US, Japan, EU particularly Germany, and China.
ADS architecture
An ADS is a decoupled architecture where each |
https://en.wikipedia.org/wiki/FMLLR | In signal processing, Feature space Maximum Likelihood Linear Regression (fMLLR) is a global feature transform that are typically applied in a speaker adaptive way, where fMLLR transforms acoustic features to speaker adapted features by a multiplication operation with a transformation matrix. In some literature, fMLLR is also known as the Constrained Maximum Likelihood Linear Regression (cMLLR).
Overview
fMLLR transformations are trained in a maximum likelihood sense on adaptation data. These transformations may be estimated in many ways, but only maximum likelihood (ML) estimation is considered in fMLLR. The fMLLR transformation is trained on a particular set of adaptation data, such that it maximizes the likelihood of that adaptation data given a current model-set.
This technique is a widely used approach for speaker adaptation in HMM-based speech recognition. Later research also shows that fMLLR is an excellent acoustic feature for DNN/HMM hybrid speech recognition models.
The advantage of fMLLR includes the following:
the adaptation process can be performed within a pre-processing phase, and is independent of the ASR training and decoding process.
this type of adapted feature can be applied to deep neural networks (DNN) to replace traditionally used mel-spectrogram in end-to-end speech recognition models.
fMLLR's speaker adaptation process leads to a significant performance boost for ASR models, hence outperforming other transform or features like MFCCs (Mel-Frequency Cepstral Coefficients) and FBANKs (Filter bank) coefficients.
fMLLR features can be efficiently realized with speech toolkits like Kaldi.
Major problem and disadvantage of fMLLR:
when the amount of adaptation data is limited, the transformation matrices tends to easily overfit the given data.
Computing fMLLR transform
Feature transform of fMLLR can be easily computed with the open source speech tool Kaldi, the Kaldi script uses the standard estimation scheme described in Appendix B of |
https://en.wikipedia.org/wiki/Social%20Bonding%20and%20Nurture%20Kinship | Social Bonding and Nurture Kinship: Compatibility between Cultural and Biological Approaches is a book on human kinship and social behavior by Maximilian Holland, published in 2012. The work synthesizes the perspectives of evolutionary biology, psychology and sociocultural anthropology towards understanding human social bonding and cooperative behavior. It presents a theoretical treatment that many consider to have resolved longstanding questions about the proper place of genetic (or 'blood') connections in human kinship and social relations, and a synthesis that "should inspire more nuanced ventures in applying Darwinian approaches to sociocultural anthropology". The book has been called "A landmark in the field of evolutionary biology" which "gets to the heart of the matter concerning the contentious relationship between kinship categories, genetic relatedness and the prediction of behavior", "places genetic determinism in the correct perspective" and serves as "a shining example of what can be achieved when excellent scholars engage fully across disciplinary boundaries."
The aim of the book is to show that "properly interpreted, cultural anthropology approaches (and ethnographic data) and biological approaches are perfectly compatible regarding processes of social bonding in humans." Holland's position is based on demonstrating that the dominant biological theory of social behavior (inclusive fitness theory) is typically misunderstood to predict that genetic ties are necessary for the expression of social behaviors, whereas in fact the theory only implicates genetic associations as necessary for the evolution of social behaviors. Whilst rigorous evolutionary biologists have long understood the distinction between these levels of analysis (see Tinbergen's four questions), past attempts to apply inclusive fitness theory to humans have often overlooked the distinction between evolution and expression.
Beyond its central argument, the broader philosophical implic |
https://en.wikipedia.org/wiki/Mobility%20analogy | The mobility analogy, also called admittance analogy or Firestone analogy, is a method of representing a mechanical system by an analogous electrical system. The advantage of doing this is that there is a large body of theory and analysis techniques concerning complex electrical systems, especially in the field of filters. By converting to an electrical representation, these tools in the electrical domain can be directly applied to a mechanical system without modification. A further advantage occurs in electromechanical systems: Converting the mechanical part of such a system into the electrical domain allows the entire system to be analysed as a unified whole.
The mathematical behaviour of the simulated electrical system is identical to the mathematical behaviour of the represented mechanical system. Each element in the electrical domain has a corresponding element in the mechanical domain with an analogous constitutive equation. All laws of circuit analysis, such as Kirchhoff's laws, that apply in the electrical domain also apply to the mechanical mobility analogy.
The mobility analogy is one of the two main mechanical–electrical analogies used for representing mechanical systems in the electrical domain, the other being the impedance analogy. The roles of voltage and current are reversed in these two methods, and the electrical representations produced are the dual circuits of each other. The mobility analogy preserves the topology of the mechanical system when transferred to the electrical domain whereas the impedance analogy does not. On the other hand, the impedance analogy preserves the analogy between electrical impedance and mechanical impedance whereas the mobility analogy does not.
Applications
The mobility analogy is widely used to model the behaviour of mechanical filters. These are filters that are intended for use in an electronic circuit, but work entirely by mechanical vibrational waves. Transducers are provided at the input and output |
https://en.wikipedia.org/wiki/Lichen%20growth%20forms | Lichens are symbiotic organisms made up of multiple species: a fungus, one or more photobionts (an alga and/or a cyanobacteria) and sometimes a yeast. They are regularly grouped by their external appearance – a characteristic known as their growth form. This form, which is based on the appearance of vegetative part of the lichen (its thallus), varies depending on the species and the environmental conditions it faces. Those who study lichens (lichenologists) have described a dozen of these forms: areolate, byssoid, calicioid, cladoniform, crustose, filamentous, foliose, fruticose, gelatinous, leprose, placoidioid and squamulose. Traditionally, crustose (flat), foliose (leafy) and fruticose (shrubby) are considered to be the three main forms. In addition to these more formalised, traditional growth types, there are a handful of informal types named for their resemblance to the lichens of specific genera. These include alectorioid, catapyrenioid, cetrarioid, hypogymnioid, parmelioid and usneoid.
Overview
Lichens are composite organisms made up of multiple species: a fungal partner, one or more photosynthetic partners (also known as photobionts), and sometimes a yeast. It is a symbiotic relationship, to which each partner contributes. In most cases, the fungal partner provides the structure in which the various partners live; this structure helps to protect the photobiont from environmental pressures. The photosynthetic partner(s) provide the nutrients which the various partners need to survive. The yeast (where present) appears to help ward off microbes and potential predators through the production of various chemicals. Thallus types have evolved to provide the lichen's photobiont with optimal levels of light, water, and carbon dioxide, with different environmental conditions favouring different forms.
With the exception of calicioid lichens, lichen growth forms are based on the appearance of the thallus, which is the vegetative (non-reproductive) part of the liche |
https://en.wikipedia.org/wiki/Lichen%20morphology | Lichen morphology describes the external appearance and structures of a lichen. These can vary considerably from species to species. Lichen growth forms are used to group lichens by "vegetative" thallus types, and forms of "non-vegetative" reproductive parts. Some lichen thalli have the aspect of leaves (foliose lichens); others cover the substrate like a crust (crustose lichens) (illustration, right), others such as the genus Ramalina adopt shrubby forms (fruticose lichens), and there are gelatinous lichens such as the genus Collema.
Although the form of a lichen is determined by the genetic material of the fungal partner, association with a photobiont is required for the development of that form. When grown in the laboratory in the absence of its photobiont, a lichen fungus develops as an undifferentiated mass of hyphae. If combined with its photobiont under appropriate conditions, its characteristic form emerges, in the process called morphogenesis. In a few remarkable cases, a single lichen fungus can develop into two very different lichen forms when associating with either a green algal or a cyanobacterial symbiont. Quite naturally, these alternative forms were at first considered to be different species, until they were found growing in a conjoined manner.
Under magnification, a section through a typical foliose lichen thallus reveals four layers of interlaced fungal filaments. The uppermost layer is formed by densely agglutinated fungal hyphae building a protective outer layer called the cortex, which can reach several hundred μm in thickness. This cortex may be further topped by an epicortex 0.6-1μm thick in some Parmeliaceae, which may be with or without pores, and is secreted by cells—it is not itself cellular. In lichens that include both green algal and cyanobacterial symbionts, the cyanobacteria may be held on the upper or lower surface in small pustules called cephalodia. Beneath the upper cortex is an algal layer composed of algal cells embedded in |
https://en.wikipedia.org/wiki/Lichen%20anatomy%20and%20physiology | Lichen anatomy and physiology is very different from the anatomy and physiology of the fungus and/or algae and/or cyanobacteria that make up the lichen when growing apart from the lichen, either naturally, or in culture. The fungal partner is called the mycobiont. The photosynthetic partner, algae or cyanobacteria, is called the photobiont. The body of a lichens that does not contain reproductive parts of the fungus is called the thallus. The thallus is different from those of either the fungus or alga growing separately. The fungus surrounds the algal cells, often enclosing them within complex fungal tissues unique to lichen associations. In many species the fungus penetrates the algal cell wall, forming penetration pegs or haustoria similar to those produced by pathogenic fungi. Lichens are capable of surviving extremely low levels of water content (poikilohydric). However, the re-configuration of membranes following a period of dehydration requires several minutes at least.
The algal or cyanobacterial cells are photosynthetic, and as in plants they reduce atmospheric carbon dioxide into organic carbon sugars to feed both symbionts. Both partners gain water and mineral nutrients mainly from the atmosphere, through rain and dust. The fungal partner protects the alga by retaining water, serving as a larger capture area for mineral nutrients and, in some cases, provides minerals obtained from the substrate. If a cyanobacterium is present, as a primary partner or another symbiont in addition to green alga as in certain tripartite lichens, they can fix atmospheric nitrogen, complementing the activities of the green alga.
Although strains of cyanobacteria found in various cyanolichens are often closely related to one another, they differ from the most closely related free-living strains. The lichen association is a close symbiosis. It extends the ecological range of both partners but is not always obligatory for their growth and reproduction in natural environments, s |
https://en.wikipedia.org/wiki/Symbiosis%20in%20lichens | Symbiosis in lichens is the mutually beneficial symbiotic relationship of green algae and/or blue-green algae (cyanobacteria) living among filaments of a fungus, forming lichen.
Living as a symbiont in a lichen appears to be a successful way for a fungus to derive essential nutrients, as about 20% of all fungal species have adopted this mode of life. The autotrophic symbionts occurring in lichens are a wide variety of simple, photosynthetic organisms commonly and traditionally known as “algae”. These symbionts include both prokaryotic and eukaryotic organisms.
Overview of lichens
"Lichens are fungi that have discovered agriculture" — Trevor Goward
A lichen is a combination of fungus and/or algae and/or cyanobacteria that has a very different form (morphology), physiology, and biochemistry than any of the constituent species growing separately. The algae or cyanobacteria benefit their fungal partner by producing organic carbon compounds through photosynthesis. In return, the fungal partner benefits the algae or cyanobacteria by protecting them from the environment by its filaments, which also gather moisture and nutrients from the environment, and (usually) provide an anchor to it.
The majority of the lichens contain eukaryotic autotrophs belonging to the Chlorophyta (green algae) or to the Xanthophyta (yellow-green algae). About 90% of all known lichens have a green alga as a symbiont. Among these, Trebouxia is the most common genus, occurring in about 20% of all lichens. The second most commonly represented green alga genus is Trentepohlia. Overall, about 100 species are known to occur as autotrophs in lichens. All the algae and cyanobacteria are believed to be able to survive separately, as well as within the lichen; that is, at present no algae or cyanobacteria are known which can only survive naturally as part of a lichen. Common algal partners are Trebouxia, Pseudotrebouxia, or Myrmecia.
The prokaryotes belong to the Cyanobacteria, which are often called |
https://en.wikipedia.org/wiki/Internal%20control%20region | An internal control region is a sequence of DNA located with the coding region of eukaryotic genes that binds regulatory elements such as activators or repressors. This region can recruit RNA Polymerase or contribute to splicing.
See also
DNA
Gene expression
Gene family
References
Google Book Search; first published 1976.
External links
DNA From The Beginning - a primer on genes and DNA
Genes And DNA - Introduction to genes and DNA aimed at non-biologist
ENCODE threads Explorer Characterization of intergenic regions and gene definition. Nature (journal)
Molecular biology |
https://en.wikipedia.org/wiki/Fog%20computing | Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation (edge computing), storage, and communication locally and routed over the Internet backbone.
Concept
In 2011, the need to extend cloud computing with fog computing emerged, in order to cope with huge number of IoT devices and big data volumes for real-time low-latency applications. Fog computing, also called edge computing, is intended for distributed computing where numerous "peripheral" devices connect to a cloud. The word "fog" refers to its cloud-like properties, but closer to the "ground", i.e. IoT devices. Many of these devices will generate voluminous raw data (e.g., from sensors), and rather than forward all this data to cloud-based servers to be processed, the idea behind fog computing is to do as much processing as possible using computing units co-located with the data-generating devices, so that processed rather than raw data is forwarded, and bandwidth requirements are reduced. An additional benefit is that the processed data is most likely to be needed by the same devices that generated the data, so that by processing locally rather than remotely, the latency between input and response is minimized. This idea is not entirely new: in non-cloud-computing scenarios, special-purpose hardware (e.g., signal-processing chips performing Fast Fourier Transforms) has long been used to reduce latency and reduce the burden on a CPU.
Fog networking consists of a control plane and a data plane. For example, on the data plane, fog computing enables computing services to reside at the edge of the network as opposed to servers in a data-center. Compared to cloud computing, fog computing emphasizes proximity to end-users and client objectives (e.g. operational costs, security policies, resource exploitation), dense geographical distribution and context-awareness (for what concerns computational and IoT resources), latency r |
https://en.wikipedia.org/wiki/Regional%20Scale%20Nodes | The National Science Foundation's (NSF) Ocean Observatories Initiative (OOI) Regional Scale Nodes (RSN) component is an electro-optically cabled underwater observatory that directly connects to the global Internet. It is the largest cable-linked seabed observatory in the world, and also the first of its kind in the United States.
Located on the southern part of the Juan de Fuca plate, off the coast of Washington and Oregon, it is the first ocean observatory to span a tectonic plate.
RSN utilizes several high-power, high-bandwidth sub-sea terminals called primary nodes which are linked together by fiber-optic cable and provide support to oceanographic sensors at key locations.
Upon completion of the network in 2014, RSN will cover a distance of over 900 kilometers at depths of up to 3000 meters. Implementation of the OOI Regional Scale Nodes is led by the University of Washington's (UW) School of Oceanography, the UW Applied Physics Laboratory, and L-3 MariPro.
Live RSN data from >100 seafloor and water column instruments will be made available live on the Internet. This will allow both scientists and the general public to study long-term changes in ocean systems over the next 25 years.
Construction of RSN will be completed in 2014. Efforts are substantially aided by the crews of ROPOS (Remotely Operated Platform for Observation Sciences. The 83-day VISIONS ’14 expedition aboard the 274-foot global-class R/V Thomas G. Thompson is responsible for the observatory's final implementation.
Overview
The Regional Scale Nodes (RSN) is a component of the National Science Foundation's (NSF's) Ocean Observatories Initiative (OOI). The NSF's OOI is managed and coordinated by the OOI Project Office at the Consortium for Ocean Leadership (COL) in Washington, D.C. The UW, located in Seattle, Washington, is the RSN Implementing Organization for the COL.
The vision behind RSN is to launch a new era of scientific discovery and understanding of the oceans.
The RSN consis |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.