source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Advmaker | Advmaker is an affiliate program of Internet advertising in Runet, which has about 17,000 advertising spaces, covering more than 100 million visitors, which are three billion page views per month. It is intended for webmasters and site owners who wish to place advertising on their web projects, and advertisers.
History
The advertising network Advmaker was founded in April 2008, and a year later it hit the top 50 sites in Russia (23rd place), Ukraine (28th place), Belarus (32nd) and Kazakhstan (25th place). In 2010, according to a published «Google» ranking, the company entered the top 1000 sites worldwide. In 2014, the company takes part in the ranking of the second annual award RACE Awards 2014 in the category «breakthrough of the year in the lead generation market» and in October the 3rd -4th, is a Wi-Fi sponsor of the marketing and affiliate programs exhibition Russian Affiliate Congress & Expo (RACE ).
In 2015, the company according to the results of the analytical research project Ruward: Track ranked first among the eight major players in the Russian Internet banner networks: Advmaker, Kadam, ADSkape, Post Banners, Propellers Ads, AdForse, Traffic.ru.
Requirements for webmasters
Before putting on the Internet all the websites are moderated. Website owners who are members of Advmaker, earn an income for clicks or impressions, payments are made once a month. Any site may enter the advertising network, which does not violate the laws of any country, with the Russian speaking audience, satisfying the rules of participation (at least 500 hosts per day, there must be more than 3 visits per person, the ratio of RU-traffic is more than 50% to the rest). An additional point is that a website, created on a free hosting Narod.ru and others, for example Ucoz may become a member of Advmaker, there are also a referral system in the ad network and scheduled payments are made twice a month.
Requirements for advertisers
Minimal advertising budget should be five thousan |
https://en.wikipedia.org/wiki/Lambda2%20method | The Lambda2 method, or Lambda2 vortex criterion, is a vortex core line detection algorithm that can adequately identify vortices from a three-dimensional fluid velocity field. The Lambda2 method is Galilean invariant, which means it produces the same results when a uniform velocity field is added to the existing velocity field or when the field is translated.
Description
The flow velocity of a fluid is a vector field which is used to mathematically describe the motion of a continuum.
The length of the flow velocity vector is the flow speed and is a scalar. The flow velocity of a fluid is a vector field
which gives the velocity of an element of fluid at a position and time
The Lambda2 method determines for any point in the fluid whether this point is part of a vortex core. A vortex is now defined as a connected region for which every point inside this region is part of a vortex core.
Usually one will also obtain a large number of small vortices when using the above definition. In order to detect only real vortices, a threshold can be used to discard any vortices below a certain size (e.g. volume or number of points contained in the vortex).
Definition
The Lambda2 method consists of several steps. First we define the velocity gradient tensor ;
where is the velocity field.
The velocity gradient tensor is then decomposed into its symmetric and antisymmetric parts:
and
where T is the transpose operation. Next the three eigenvalues of
are calculated so that for each
point in the velocity field there are three corresponding eigenvalues; , and . The eigenvalues are ordered in such a way that .
A point in the velocity field is part of a vortex core only if at least two of its eigenvalues are negative i.e. if . This is what gave the Lambda2 method its name.
Using the Lambda2 method, a vortex can be defined as a connected region where is negative. However, in situations where several vortices exist, it can be difficult for this method to distinguish bet |
https://en.wikipedia.org/wiki/Dazu%20Lotus%20Manor | Dazu Lotus Manor (大足荷花山庄) is a lotus farm attraction in Dazu, Chongqing Municipality, China.
The attraction was established in 1992 and is owned by Luo Dengqiang. It covers 33 hectares and is located in Baoding Township, Dazu District. It is a holiday resort with floral plants on display, especially aquatic species, and other recreational facilities. The site included some reconstructed traditional buildings. It is close to the Dazu Rock Carvings World Heritage Site.
Seeds of lotus plants on the site have been taken into space, with mutations claimed as a result. 3,000 seeds were sent into space by the Beijing Space Satellite Application Company. Luo Dengqiang was the first Chinese individual to undertake such a space programme.
See also
Dazu Rock Carvings
References
External links
1992 establishments in China
Farms in China
Tourist attractions in Chongqing
Buildings and structures in Chongqing
Space-flown life |
https://en.wikipedia.org/wiki/Three-part%20lesson | A three-part lesson is an inquiry-based learning method used to teach mathematics in K–12 schools.
The three-part lesson has been attributed to John A. Van de Walle, a mathematician at Virginia Commonwealth University.
Components
Getting started phase (10 to 15 minutes)
The purpose is to cognitively prepare students for the math lesson by having them think about a procedure, strategy or concept used in a prior lesson. Teachers determine what specific previous learning they wish students to recall, based on outcomes desired for that particular lesson. The role of the teacher is to "get students mentally prepared to work on the problem".
Marian Small, a proponent of a constructivist approach to mathematical instruction, provides an example of an inquiry-based question from which a three-part lesson could be created: "one bus has 47 students in it; another has 38. How many students are on both buses?"
Work phase (30 to 40 minutes)
Students engage in solving math problems individually, in pairs, or in small groups, and "record the mathematical thinking they used to develop solutions". Students then plan the strategies, methods, and concrete materials they will use to solve the problem. The teacher will circulate and make observations about the ways students are interacting, and will note the mathematical language they are using as well as the mathematical models they are employing to solve the problem. If a student is having difficulty, "the teacher might pose questions to provoke further thinking or have other students explain their plan for solving the problem". Teachers are advised to be active listeners in this phase, and to take notes. This is also a phase in which teachers can assess students.
Consolidation and practice phase (10 to 15 minutes)
In this final phase, the teacher oversees the sharing of solutions by students, and may employ other teaching techniques such as "math congress", "gallery walk", or "bansho". If new methods and strategies were |
https://en.wikipedia.org/wiki/Aiyara%20cluster | An Aiyara cluster is a low-powered computer cluster specially designed to process Big Data. The Aiyara cluster model can be considered as a specialization of the Beowulf cluster in the sense that Aiyara is also built from commodity hardware, not inexpensive personal computers, but system-on-chip computer boards. Unlike Beowulf, applications of an Aiyara cluster are scoped only for the Big Data area, not for scientific high-performance computing. Another important property of an Aiyara cluster is that it is low-power. It must be built with a class of processing units that produces less heat.
The name Aiyara originally referred to the first ARM-based cluster built by Wichai Srisuruk and Chanwit Kaewkasi at Suranaree University of Technology. The name "Aiyara" came from a Thai word literally an elephant to reflect its underneath software stack, which is Apache Hadoop.
Like Beowulf, an Aiyara cluster does not define a particular software stack to run atop it. A cluster normally runs a variant of the Linux operating system. Commonly used Big Data software stacks are Apache Hadoop and Apache Spark.
Development
A report of the Aiyara hardware which successfully processed a non-trivial amount of Big Data was published in the Proceedings of ICSEC 2014. Aiyara Mk-I, the second Aiyara cluster, consists of 22 Cubieboards. It is the first known SoC-based ARM cluster which is able to process Big Data successfully using the Spark and HDFS stack.
The Aiyara cluster model, a technical description explaining how to build an Aiyara cluster, was later published by Chanwit Kaewkasi in the DZone's 2014 Big Data Guide.
The further results and cluster optimization techniques, that make the cluster's processing rate boost to 0.9 GB/min while still preserve low-power consumption, were reported in the Proceeding of IEEE's TENCON 2014.
See also
Beowulf cluster
Apache Hadoop
Apache Spark
References
Cluster computing
Parallel computing |
https://en.wikipedia.org/wiki/Pantachy | In mathematics, a pantachy or pantachie (from the Greek word πανταχη meaning everywhere) is a maximal totally ordered subset of a partially ordered set, especially a set of equivalence classes of sequences of real numbers. The term was introduced by to mean a dense subset of an ordered set, and he also introduced "infinitary pantachies" to mean the ordered set of equivalence classes of real functions ordered by domination, but as Felix Hausdorff pointed out this is not a totally ordered set. redefined a pantachy to be a maximal totally ordered subset of this set.
Notes
References
English translation in
Order theory
Set theory |
https://en.wikipedia.org/wiki/List%20of%20Wi-Fi%20microcontrollers | Wi-Fi microcontrollers enable Wi-Fi connectivity for devices so that they can send & receive data and accept commands. As such, Wi-Fi microcontrollers can be used for bringing otherwise ordinary devices into the realm of the Internet of things.
Wi-Fi microcontroller chips:
References
External links
Texas Instruments Wi-Fi MCU product selector
Cypress Wireless MCU products
.
L
Wi-Fi microcontrollers
Digital electronics
Internet of things |
https://en.wikipedia.org/wiki/Xerox%20500%20series | The Xerox 500 series is a discontinued line of computers from Xerox Data Systems (XDS) introduced in the early 1970s as backward-compatible upgrades for the Sigma series machines.
Although orders for the Xerox 530 were deemed "encouraging" as of January 1974,
the systems had failed to gain traction by the time Xerox sold its Data Systems Division in 1975. The buyer, Honeywell, Inc., continued to support existing 500-series systems until 1984 but discontinued manufacturing.
Binary integer arithmetic is standard on all models; floating-point is optional on the 530, and standard on the 550 and 560. The 560 also supports decimal arithmetic. The 550 and 560 include one or more "system control processors" (CPs) to handle interrupts, diagnostics, clocks, direct I/O, and operator communications. Systems are clusterable, with multiple "basic processors" (BPs), I/O processors (IOPs), and "system control processors" (CPs) sharing busses and memory.
16-bit systems (Xerox 530)
The Xerox 530 system is a 16-bit computer aimed at upgrading the 16-bit Sigma 2 and 3 systems. The 530 was the first system of the line introduced in early 1973.
The 530 supports memory sizes of 8 K to 64 K 16-bit words (16 KB to 128 KB) with a cycle time of 800 ns. The memory protection feature protects the foreground (real-time) program from the background tasks.
When IBM discontinued the 16-bit IBM 1130, Xerox began marketing the 530 as a possible successor,
including mention of Fortan IV, COBOL and RPG. Both the 1130 and Xerox 530 had Indirect addressing and 8-bit relative addressing.
On the IBM 1130/1800 magnetic tape drives were only available as a special feature—RPQ (Request Price Quotation). The Xerox 530 offered a choice of 7-track drives operating at 37.5 inches per second (ips) or nine-track, 75 ips drives.
32-bit systems (Xerox 550, 560)
The Xerox 550 and Xerox 560 systems are 32-bit computers introduced in 1974. The 550 was aimed at real-time applications and intended as an upgrade |
https://en.wikipedia.org/wiki/Foliicolous%20lichen | A foliicolous lichenized fungi is a lichen which grows on the surfaces of living leaves of vascular plants, usually inhabiting the upper surface (epiphyllous) but sometimes also the lower surface (hypophyllous). Foliicolous lichens largely occur in tropical environments and of the over 800 foliicolous lichens accepted (as of 2008) over 600 of these are known from the tropics. Unlike most lichens which are common in humid but cool and temperate climates, these tropical lichens are more suited to the higher temperatures and lower light levels present beneath the rainforest canopy, where they are involved in the nutrient cycle and water retention. Chlorophyta are common photosynthetic partner phycobionts of epiphyllous lichens.
Etymology
Foliicolous simply means 'growing upon leaves' whilst epiphyllous derives from the Greek meaning on or over and means leaf so 'over leaf' and hypophyllous means 'under leaf'.
References
Lichenology |
https://en.wikipedia.org/wiki/Odd%20Squad | Odd Squad (stylized as ODD SQUAD) is a children's live action educational television series that premiered on TVOKids in Canada and PBS Kids in the United States on November 26, 2014. The series ran for three seasons and 108 episodes in a span of seven years, airing its final episode on July 8, 2022. Similar to Cyberchase and Peg + Cat, other math-centered programs aired on PBS Kids, the series involves child characters using mathematical concepts (addition, multiplication, using data in graphs, etc.) to advance each episode's plot. The series was created by Tim McKeon and Adam Peltzman and is co-produced by Sinking Ship Entertainment and Fred Rogers Productions in association with TVOKids and Ici Radio-Canada Télé. The series features child actors (whose characters are the employees of the "Odd Squad") who use indirect reasoning and basic math to solve and investigate strange happenings in their town. The series is a general satire of the police procedural and spy fiction genres and uses humour to teach the audience basic math skills and math-related topics. In the UK, the series aired on CBBC and BBC Two. In Australia, it aired on ABC Kids and ABC Me.
Description
The series follows the exploits of Odd Squad, an organization run entirely by children, that solves peculiar problems using math skills. In the first two seasons, it typically features two employees of the organization's investigation division that work in precinct 13579 of the organization—Agents Olive (Dalila Bela) and Otto (Filip Geljo) in the first season and Olympia (Anna Cathcart) and Otis (Isaac Kragten) in the second season. Selected episodes feature other types of employees of the fictional organization, like security officers, so-called "tube operators" and scientists. The names of the employees nearly always start with the letter O. Agents are typically assigned cases by their boss, Ms. O (Millie Davis), and travel via a system of interconnected tubes to get to their destinations. They deduce |
https://en.wikipedia.org/wiki/Hierarchical%20closeness | Hierarchical closeness (HC) is a structural centrality measure used in network theory or graph theory. It is extended from closeness centrality to rank how centrally located a node is in a directed network. While the original closeness centrality of a directed network considers the most important node to be that with the least total distance from all other nodes, hierarchical closeness evaluates the most important node as the one which reaches the most nodes by the shortest paths. The hierarchical closeness explicitly includes information about the range of other nodes that can be affected by the given node. In a directed network where is the set of nodes and is the set of interactions, hierarchical closeness of a node ∈ called was proposed by Tran and Kwon as follows:
where:
is the reachability of a node defined by a path from to , and
is the normalized form of original closeness (Sabidussi, 1966). It can use a variant definition of closeness as follows: where is the distance of the shortest path, if any, from to ; otherwise, is specified as an infinite value.
In the formula, represents the number of nodes in that can be reachable from . It can also represent the hierarchical position of a node in a directed network. It notes that if , then because is . In cases where , the reachability is a dominant factor because but . In other words, the first term indicates the level of the global hierarchy and the second term presents the level of the local centrality.
Application
Hierarchical closeness can be used in biological networks to rank the risk of genes to carry diseases.
References
Graph theory
Graph algorithms
Algebraic graph theory
Networks
Network analysis
Network theory |
https://en.wikipedia.org/wiki/Passive%20survivability | Passive survivability refers to a building's ability to maintain critical life-support conditions in the event of extended loss of power, heating fuel, or water. This idea proposes that designers should incorporate ways for a building to continue sheltering inhabitants for an extended period of time during and after a disaster situation, whether it be a storm that causes a power outage, a drought which limits water supply, or any other possible event.
The term was coined by BuildingGreen President and EBN Executive editor Alex Wilson in 2005 after the wake of Hurricane Katrina. Passive Survivability is suggested to become a standard in the design criteria for houses, apartment buildings, and especially buildings used as emergency shelters. While many of the strategies considered to achieve the goals of passive survivability are not new concepts and have been widely used in green building over the decades, the distinction comes from the motivation for moving towards resilient and safe buildings.
Current Issues
The increase in duration, frequency, and intensity of extreme weather events due to climate change exacerbates the challenges that passive survivability tries to address. Climates that did not previously need cooling are now seeing warmer temperatures and a need for air conditioning. Sea level rise and storm surge increases the risk of flooding in coastal locations, while precipitation-based flooding is an issue in low-lying areas. In order for buildings to provide livable conditions at all times, potential threats must be realized.
Power Outages
In much of the developed world, there is a heavy reliance on a grid for power and gas. These grids are the main source of energy for many societies, and while they generally do not get interrupted, they are constantly prone to events that may cause disruption, such as natural disasters. In California, there have even been intentional power outages as a preventative measure in response to wildfires caused by power li |
https://en.wikipedia.org/wiki/Reference%20distance | In broadcast engineering, the reference distance is the distance which, under normal circumstances and flat terrain, a radio station would reach with a particular level of signal strength. This distance depends on two factors: effective radiated power (ERP) and height above average terrain (HAAT). The actual distance a station's signal travels depends highly on weather, where factors like temperature inversions and heavy precipitation have a strong and highly variable influence on radio propagation. However, for purposes of broadcast law such as construction permits and broadcast licenses, fixed calculations called propagation curves are applied to determine the reference distances for all existing and proposed stations. These also take into account beam tilt, carrier frequency, and even the Earth's curvature at longer distances.
This is in turn used to define most broadcast classes for FM stations in North America. Each class (except D) is defined as having a maximum ERP and HAAT. If the HAAT of a station's radio antenna exceeds that specified for the class, it must reduce ERP so that its signal does not exceed the reference distance. The signal strength used differs by class, but generally the value is 1.0mV/m (millivolt per meter) or 60dBu (decibels over one microvolt per meter) for most of the United States, and 0.5mV/m or 54dBu in Canada, and for some U.S. stations in parts of certain areas including California, the Great Lakes region, and the Northeast. This is considered the service contour of a station by the Federal Communications Commission (FCC) and the Canadian Radio-television and Telecommunications Commission (CRTC), and by COFETEL in Mexico, according to NARBA and other international agreements among the three. The reference distances are in turn used to create mandatory minimum spacing distances among co-channel stations, and certain adjacent channels as well.
Real-world calculations can also be done by including data from digital topograp |
https://en.wikipedia.org/wiki/X%20%2B%20Y%20sorting | In computer science, sorting is the problem of sorting pairs of numbers by their sums. Applications of the problem include transit fare minimisation, VLSI design, and sparse polynomial multiplication. As with comparison sorting and integer sorting more generally, algorithms for this problem can be based only on comparisons of these sums, or on other operations that work only when the inputs are small integers.
It is unknown whether this problem has a comparison-based solution whose running time is asymptotically faster than sorting an unstructured list of equally many items. Therefore, research on the problem has focused on two approaches to settle the question of whether such an improvement is possible: the development of algorithms that improve on unstructured sorting in their number of comparisons rather than in their total running time, and lower bounds for the number of comparisons based on counting cells in subdivisions of high-dimensional spaces. Both approaches are historically tied together, in that the first algorithms that used few comparisons were based on the weakness of the cell-counting lower bounds.
Problem statement and history
The input to the sorting problem consists of two finite collections of numbers and , of the same length. The problem's output is the collection of all pairs of a number from and a number from , arranged into sorted order by the sum of each pair. As a small example, for the inputs and , the output should be the list of pairsof one element from and one element from , listed in sorted order by their sums of pairsOne way to solve the problem would be to construct the pairs to be sorted (the Cartesian product of the two collections) and use these pairs as input to a standard comparison sorting algorithm such as merge sort or heapsort. When the inputs have length , they form pairs, and the time to sort the pairs in this way is . In terms of its big O notation, this method is the fastest known algorithm for sorting. Wheth |
https://en.wikipedia.org/wiki/Cartan%20pair | In the mathematical fields of Lie theory and algebraic topology, the notion of Cartan pair is a technical condition on the relationship between a reductive Lie algebra and a subalgebra reductive in .
A reductive pair is said to be Cartan if the relative Lie algebra cohomology
is isomorphic to the tensor product of the characteristic subalgebra
and an exterior subalgebra of , where
, the Samelson subspace, are those primitive elements in the kernel of the composition ,
is the primitive subspace of ,
is the transgression,
and the map of symmetric algebras is induced by the restriction map of dual vector spaces .
On the level of Lie groups, if G is a compact, connected Lie group and K a closed connected subgroup, there are natural fiber bundles
,
where
is the homotopy quotient, here homotopy equivalent to the regular quotient, and
.
Then the characteristic algebra is the image of , the transgression from the primitive subspace P of is that arising from the edge maps in the Serre spectral sequence of the universal bundle , and the subspace of is the kernel of .
References
Cohomology theories
Homological algebra
Lie algebras |
https://en.wikipedia.org/wiki/OneID | OneID was a digital security service based in Redwood City, California. OneID sold a digital identity system that claimed to provide security across all devices using public-key cryptography instead of passwords. The technology is utilized by non-profits, such as Salsa Labs, to increase the frequency and security of online donations. OneID now operates as a subsidiary program of Neustar following its acquisition in 2016.
History
The company was founded in 2011 by serial entrepreneur, Steve Kirsch. Kirsch recruited engineers Jim Fenton, Adam Back, and Bobby Beckmann to create the flagship product, which was launched in early 2012. Following the launch, the company raised US$7 million in venture capital financing from Menlo Park-based venture capital firm Khosla Ventures.
Following their Series A, Alex Doll took over the position as CEO. Doll was previously an executive-in-residence as Khosla Ventures, and before that was a founding executive at PGP Corp. With Doll's appointment, founder Kirsch moved into the CTO role. Shirish Sathaye, general partner at Khosla Ventures, and Jonathan Heiliger were added to OneID's board of directors.
Following a growth period in late 2013, the company appointed Kirsch CEO.
In 2014, Fast Company named OneID one of the top 10 most innovative companies in finance.
In August 2016, OneID was acquired by Neustar.
See also
Multi-factor authentication
References
External links
2011 establishments in California
Companies based in Redwood City, California
American companies established in 2011
Computer security software companies
Software companies established in 2011
Public-key cryptography
2016 mergers and acquisitions |
https://en.wikipedia.org/wiki/Subspace%20Gaussian%20mixture%20model | Subspace Gaussian mixture model (SGMM) is an acoustic modeling approach in which all phonetic states share a common Gaussian mixture model structure, and the means and mixture weights vary in a subspace of the total parameter space.
References
Speech recognition |
https://en.wikipedia.org/wiki/Cepstral%20mean%20and%20variance%20normalization | Cepstral mean and variance normalization (CMVN) is a computationally efficient normalization technique for robust speech recognition. The performance of CMVN is known to degrade for short utterances. This is due to insufficient data for parameter estimation and loss of discriminable information as all utterances are forced to have zero mean and unit variance.
CMVN minimizes distortion by noise contamination for robust feature extraction by linearly transforming the cepstral coefficients to have the same segmental statistics. Cepstral Normalization has been effective in the CMU Sphinx for maintaining a high level of recognition accuracy over a wide variety of acoustical environments.
Cepstral Normalization Techniques
There are multiple algorithms that achieve Cepstral Normalization in different ways.
Fixed codeword-dependent cepstral normalization (FCDCN)
FCDCN was developed to provide a form of compensation that provides greater recognition accuracy than SDCN but in a more computationally-efficient manner than the CDCN algorithm. The FCDCN algorithm applies an additive correction that depends on the instantaneous SNR of the input (like SDCN), but that can also vary from codeword to codeword (like CDCN).
Multiple Fixed Codeword-dependent Cepstral Normalization (MFCDCN)
MFCDCN is a simple extension of FCDCN algorithm that does not need environment specific training. In MFCDCN, compensation vectors are pre-computed in parallel for a set of target environments, using the FCDCN algorithm.
Incremental Multiple Fixed Codeword-dependent Cepstral Normalization (IMFCDCN)
While environment selection for the compensation vectors of MFCDCN is generally performed on an utterance-by-utterance basis, IMFCFCN improves on it by allowing the classification process to make use of cepstral vectors from previous utterances in a given session.
Cepstral Noise Subtraction
Automatic speech recognition (ASR) describes the steps of transcribing speech utterances represented as aco |
https://en.wikipedia.org/wiki/SwitchUp | SwitchUp is an online coding and computing programing platform. Students use the website to research online and offline programming courses by reading alumni reviews, connecting with mentors in the forum, taking an online quiz, and reading industry studies. SwitchUp only accepts reviews from verified alumni and has a verification process.
History
SwitchUp, was started after Jonathan Lau, an MIT alum, attended a Coding Bootcamp in Boston. He launched SwitchUp with a small team, and left the first code bootcamp review on the site.
SwitchUp aims to add transparency to the technology education industry. The website was launched in August 2014.
Product
As of October 2020, the site had over 20,000 reviews of 1000 different programming bootcamps and courses across 30 different countries. Switch guides students on a career path, recommends bootcamps, and aggregates alumni reviews.
Research Publications and Rankings
SwitchUp regularly publishes industry research and bootcamp rankings. They also put out data science, cyber security, and web design rankings.
They also offer scholarship information and listings for bootcamps that accept the GI Bill.
In a job outcomes study conducted by researchers published on Dec 1, 2016, the following trends were found:
63% of graduates reported increase in salary
80% of graduates reported they were 'satisfied' or 'very satisfied'
Average class size is 30 students with a 1-to-3.8 student instructor ratio
A one-tailed paired-difference test showed that the increase in salary was statistically significant at the 95% level
SwitchUp also published the 2018 best coding bootcamp rankings on December 31, 2018.
See also
Code.org
Codecademy
Team Treehouse
Udacity
Dev Bootcamp
References
External links
SwitchUp
Computer programming
American review websites |
https://en.wikipedia.org/wiki/Interference%20of%20the%20footings | The Interference of the footings is a phenomenon that is observed when two footings are closely spaced. The buildings when are to be constructed nearby to each other, the architectural requirements or the less availability of space for the construction forces the engineers to place the foundation footings close to each other, and when foundations are placed close to each other with similar soil conditions, the Ultimate Bearing Capacity of each foundation may change due to the interference effect of the failure surface in the soil.
Introduction
Foundations or group of foundations are important components of the structure through which the superficial structural loads are transmitted to the underlying foundation soil or bed on which the foundations are laid. The structural loads are transmitted to the foundation soil safely such that neither the foundation fail nor the foundation soil fails either in shear or in excessive settlement. The foundations are basically designed based on two criterion namely Bearing Capacity and Settlement criterion. Many classical theories have been postulated for the isolated foundations by many pioneers like Terzhagi (1943), Meyerhoff (1963), Hansen (1970) and Vesic (1973). In general as per the Terzaghi (1943), when an isolated shallow foundation is loaded, the stress or the failure zone in the foundation soil extends in horizontal direction on either side of the footing to about twice the width of the footing and in vertical downward direction to about three times the width of the footing. Unless until the stress or failure zone of individual footings do not interfere, the individual footings behave as an isolated footing. However, in many a situations such as lack of construction space, structural restrictions, rapid urbanization, architecture of the building, structures close to each other etc. In such situations the foundations or group of foundations may be placed close to each other. In such cases the stress isobars or the failure |
https://en.wikipedia.org/wiki/Memory%20cell%20%28computing%29 | The memory cell is the fundamental building block of computer memory. The memory cell is an electronic circuit that stores one bit of binary information and it must be set to store a logic 1 (high voltage level) and reset to store a logic 0 (low voltage level). Its value is maintained/stored until it is changed by the set/reset process. The value in the memory cell can be accessed by reading it.
Over the history of computing, different memory cell architectures have been used, including core memory and bubble memory. Today, the most common memory cell architecture is MOS memory, which consists of metal–oxide–semiconductor (MOS) memory cells. Modern random-access memory (RAM) uses MOS field-effect transistors (MOSFETs) as flip-flops, along with MOS capacitors for certain types of RAM.
The SRAM (static RAM) memory cell is a type of flip-flop circuit, typically implemented using MOSFETs. These require very low power to keep the stored value when not being accessed. A second type, DRAM (dynamic RAM), is based around MOS capacitors. Charging and discharging a capacitor can store a '1' or a '0' in the cell. However, the charge in this capacitor will slowly leak away, and must be refreshed periodically. Because of this refresh process, DRAM uses more power. However, DRAM can achieve greater storage densities.
On the other hand, most non-volatile memory (NVM) is based on floating-gate memory cell architectures. Non-volatile memory technologies including EPROM, EEPROM and flash memory use floating-gate memory cells, which are based around floating-gate MOSFET transistors.
Description
The memory cell is the fundamental building block of memory. It can be implemented using different technologies, such as bipolar, MOS, and other semiconductor devices. It can also be built from magnetic material such as ferrite cores or magnetic bubbles. Regardless of the implementation technology used, the purpose of the binary memory cell is always the same. It stores one bit of binary in |
https://en.wikipedia.org/wiki/Shellshock%20%28software%20bug%29 | Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests.
On 12 September 2014, Stéphane Chazelas informed Bash's maintainer Chet Ramey of his discovery of the original bug, which he called "Bashdoor". Working with security experts, Mr. Chazelas developed a patch (fix) for the issue, which by then had been assigned the vulnerability identifier . The existence of the bug was announced to the public on 2014-09-24, when Bash updates with the fix were ready for distribution.
The bug Chazelas discovered caused Bash to unintentionally execute commands when the commands are concatenated to the end of function definitions stored in the values of environment variables. Within days of its publication, a variety of related vulnerabilities were discovered (). Ramey addressed these with a series of further patches.
Attackers exploited Shellshock within hours of the initial disclosure by creating botnets of compromised computers to perform distributed denial-of-service attacks and vulnerability scanning. Security companies recorded millions of attacks and probes related to the bug in the days following the disclosure.
Because of the potential to compromise millions of unpatched systems, Shellshock was compared to the Heartbleed bug in its severity.
Background
The Shellshock bug affects Bash, a program that various Unix-based systems use to execute command lines and command scripts. It is often installed as the system's default command-line interface. Analysis of the source code history of Bash shows the bug was introduced on 5 August 1989, and released in Bash version 1.03 on 1 September 1989.
Shellshock is an arbitrary code execution vulnerability that offers a way for users of a system to exe |
https://en.wikipedia.org/wiki/Roberto%20Kreimerman | Roberto Kreimerman (Montevideo, 1958) is a Uruguayan engineer and politician.
He graduated in Chemical Engineering from the University of the Republic (Uruguay). Afterwards he got a postgraduate degree from the University of Barcelona.
A member of the Broad Front, during 2010-2014 he served as Minister of Industry, Energy and Mining in the cabinet of President José Mujica.
As of 2019, Kreimerman left the Broad Front and joined Popular Unity, running for a Senate seat in the 2019 Uruguayan general election.
References
External links
MIEM
1958 births
Politicians from Montevideo
Engineers from Montevideo
University of the Republic (Uruguay) alumni
University of Barcelona alumni
Uruguayan chemical engineers
Broad Front (Uruguay) politicians
Ministers of Industries, Energy and Mining of Uruguay
Jewish Uruguayan politicians
Living people |
https://en.wikipedia.org/wiki/Class%20logic | Class logic is a logic in its broad sense, whose objects are called classes. In a narrower sense, one speaks of a class logic only if classes are described by a property of their elements. This class logic is thus a generalization of set theory, which allows only a limited consideration of classes.
Class logic in the strict sense
The first class logic in the strict sense was created by Giuseppe Peano in 1889 as the basis for his arithmetic (Peano Axioms). He introduced the class term, which formally correctly describes classes through a property of their elements. Today the class term is denoted in the form {x|A(x)}, where A(x) is an arbitrary statement, which all class members x meet. Peano axiomatized the class term for the first time and used it fully. Gottlob Frege also tried establishing the arithmetic logic with class terms in 1893; Bertrand Russell discovered a conflict in it in 1902 which became known as Russell's paradox. As a result, it became generally known that you can not safely use class terms.
To solve the problem, Russell developed his type theory from 1903 to 1908, which allowed only a restricted use of class terms. Among mathematicians, Russell's type theory was superseded by an alternative axiomatization of set theory initiated by Ernst Zermelo. This axiomatization is not a class logic in the narrower sense, because in its present form (Zermelo-Fraenkel or NBG) it does not axiomatize the class term, but uses it only in practice as a useful notation. Willard Van Orman Quine described a set theory New Foundations (NF) in 1937, based on a theory of types which was intended as an alternative to Zermelo-Fraenkel. In 1940 Quine advanced NF to Mathematical Logic (ML). Since the antinomy of Burali-Forti was derived in the first version of ML, Quine clarified ML, retaining the widespread use of classes, and took up a proposal by Hao Wang introducing in 1963 in his theory of {x|A(x)} as a virtual class, so that classes are although not yet full-fledged |
https://en.wikipedia.org/wiki/Indie%20Rights | Indie Rights, Inc. is an American distributor of independent films, based in Los Angeles, California. Indie Rights is a subsidiary of Nelson Madison Films and was incorporated in 2007 to act as distributor for other independent filmmakers. The corporation began as a private MySpace group where the makers of independent films could get information about the changing face of film distribution; founders Linda Nelson and Michael Madison created Indie Rights so that distribution contracts could be signed by a legal entity. The corporation distributes films largely through video on demand services, though more recently it has overseen such theatrical releases as We Are Kings and Fray, both in 2014.
Nelson Madison Films has produced three features: Bigger Than Live (2002), Shifted (2006) and Delivered (2011).
History
Background
Linda Nelson is a former investment banker and computer systems analyst based in Los Angeles since 1980; Michael Madison moved there in 1999 from Duncanville, Texas, to work as an actor and film producer. They first partnered in 2000 to create and distribute the NSYNC concert film Bigger Than Live for IMAX theaters. In 2003, they formed their own company with the goal of making independent features using local talent. Madison acts and handles writing, producing and directing duties; Nelson writes and produces while developing distribution plans for other filmmakers.
Lawsuit and recovery
Bigger Than Live broke even during its theatrical run, but Nelson and Madison "failed to tie up the necessary rights in our initial contract" and lost home video distribution in a lawsuit that shut down their production office. They moved into "more humble digs" and tried again with the crime thriller Shifted, learning the ins and outs of distribution while attending film festivals. Nelson soon discovered that the chances of getting a film seen at a major festival such as Sundance or Cannes without having connections in the industry "are slim to nothing." The com |
https://en.wikipedia.org/wiki/Binding%20neuron | A binding neuron (BN) is an abstract concept of processing of input impulses in a generic neuron based on their temporal coherence and the level of neuronal inhibition. Mathematically, the concept may be implemented by most neuronal models including the well-known leaky integrate-and-fire model. The BN concept originated in 1996 and 1998 papers by A. K. Vidybida,
Description of the concept
For a generic neuron the stimuli are excitatory impulses. Normally, more than single input impulse is necessary for exciting neuron up to the level when it fires and emits an output impulse.
Let the neuron receives input impulses at consecutive moments of time . In the BN concept the temporal coherence between input impulses is defined as follows
The high degree of temporal coherence between input impulses suggests that in external media all
impulses can be created by a single complex event. Correspondingly, if BN is stimulated by a highly coherent set of input impulses, it fires and emits an output impulse. In the BN terminology, BN binds the elementary events (input impulses) into a single event (output impulse). The binding happens if the input impulses are enough coherent in time, and does not happen if those impulses do not have required degree of coherence.
Inhibition in the BN concept (essentially, the slow somatic potassium inhibition) controls the degree of temporal coherence required for binding: the higher level of inhibition, the higher degree of temporal coherence is necessary for binding to occur.
The emitted output impulse is treated as abstract representation of the compound event (the set of coherent in time input impulses), see Scheme.
Origin
"Although a neuron requires energy, its main function is to receive signals and to send them out that is, to handle information." --- this words by Francis Crick point at the necessity to describe neuronal functioning in terms of processing of abstract signals
The two abstract concepts, namely, the "coinciden |
https://en.wikipedia.org/wiki/Bob%20Adams%20%28electrical%20engineer%29 | Robert Whitlock Adams is a Technical Fellow at Analog Devices, Inc. (ADI) in Wilmington, Massachusetts. His focus is on signal processing and analog-to-digital conversion for professional audio. He is a leader in the development of sigma-delta converters, introducing architectural advances including mismatch shaping, multi-bit quantization, and continuous-time architectures.
Adams graduated with a Bachelor of Science in Electrical Engineering from Tufts University in 1976. From 1977 to 1988 he worked for DBX, a professional audio recording company. There, he helped develop the industry's first audio converter with greater than 16-bit resolution, as well as one of the earliest digital audio recorders. In 1988, he joined the Converter Group of Analog Devices as a Senior Staff Designer, and went on to develop ADI's first sigma-delta converters in partnership with Paul Ferguson. He produced the world's first monolithic asynchronous sample rate converters (the AD1890 family), and he created ADI's sigmaDSP line of audio-specific digital signal processing cores.
As of 1998, Adams had received 15 patents related to audio signal processing.
Awards and honors
Elected Fellow of the Audio Engineering Society (AES), 1991
Received AES Silver Medal Award, 1995
Included in Electronic Design magazine's Engineering Hall of Fame, 2011
Became a Fellow of the Institute of Electrical and Electronics Engineers (IEEE), 2012 "for contributions to analog and digital signal processing"
Received the IEEE Donald O. Pederson Award, 2015 "for contributions to noise-shaping data converter circuits, digital signal processing, and log-domain analog filters"
Elected as a member into the National Academy of Engineering in 2018 for contributions to digital storage and reproduction of high-fidelity audio.
References
Year of birth missing (living people)
Living people
20th-century American engineers
21st-century American engineers
20th-century American inventors
21st-century American inventors
Am |
https://en.wikipedia.org/wiki/Extended%20side | In plane geometry, an extended side or sideline of a polygon is the line that contains one side of the polygon. The extension of a finite side into an infinite line arises in various contexts.
Triangle
In an obtuse triangle, the altitudes from the acute angled vertices intersect the corresponding extended base sides but not the base sides themselves.
The excircles of a triangle, as well as the triangle's inconics that are not inellipses, are externally tangent to one side and to the other two extended sides.
Trilinear coordinates locate a point in the plane by its relative distances from the extended sides of a reference triangle. If the point is outside the triangle, the perpendicular from the point to the sideline may meet the sideline outside the triangle—that is, not on the actual side of the triangle.
In a triangle, three intersection points, each of an external angle bisector with the opposite extended side, are collinear.
In a triangle, three intersection points, two of them between an interior angle bisector and the opposite side, and the third between the other exterior angle bisector and the opposite side extended, are collinear.
Ex-tangential quadrilateral
An ex-tangential quadrilateral is a quadrilateral for which there exists a circle that is tangent to all four extended sides. The excenter (center of the tangent circle) lies at the intersection of six angle bisectors. These are the internal angle bisectors at two opposite vertex angles, the external angle bisectors (supplementary angle bisectors) at the other two vertex angles, and the external angle bisectors at the angles formed where the extensions of opposite sides intersect.
Hexagon
Pascal's theorem states that if six arbitrary points are chosen on a conic section (i.e., ellipse, parabola or hyperbola) and joined by line segments in any order to form a hexagon, then the three pairs of opposite sides of the hexagon (extended if necessary) meet in three points which lie on a straight li |
https://en.wikipedia.org/wiki/Pocket%20comparator | A pocket comparator is an optical device for measuring and inspection comprising a loupe and a reticle. The instrument was developed and manufactured by the Bell & Howell Company, but similar instruments of other names are made by other manufacturers.
It is used for:
Linear measurements in fractions of an inch
Circular measurements in fractions of an inch
Radius measurements
Angle measurements
Narrow line width measurements
Circular measurements in decimals of an inch
Linear measurements in inches
Linear measurements in millimeters
Measurements are performed by bringing the surface of the reticle as close as possible to the work inspected.
References
Measuring instruments
Magnifiers
Articles containing video clips |
https://en.wikipedia.org/wiki/Projector%20phone | A projector phone is a mobile phone that contains a built-in pico projector.
List of projector phones
See also
List of 3D-enabled mobile phones
List of NFC-enabled mobile devices
References
5 Best Projector Phones For Presenters
Projectors
Emerging technologies |
https://en.wikipedia.org/wiki/Reprringer | The Reprringer is a 3D printed pepperbox firearm, made public around September 2013. It is a 5-shot, single-action, manually-indexed .22 CB Cap revolver.
Design
Unlike the many early 3D-printed firearm designs, which are usually massively overbuilt in order to withstand the pressures and strain on the material from modern gunpowder cartridges, the Reprringer is small and only slightly larger than a gun made from steel. It is chambered for .22 CB Cap which is considered the least powerful commercially produced cartridge on the market. The barrels are not rifled, the lack of theoretical accuracy is considered a non-issue in a small gun with no sights.
See also
List of notable 3D printed weapons and parts
References
External links
Reprringer_Hexen__v3.0_Derringer_Pepperbox_Gun-franco
3D printed firearms
RepRap project |
https://en.wikipedia.org/wiki/Georges%20Matheron%20Lectureship | The Georges Matheron Lecture Series is sponsored by the International Association for Mathematical Geosciences (IAMG) to honor the legacy of the French engineer Georges François Paul Marie Matheron, known as the founder of geostatistics and a co-founder (together with Jean Serra) of mathematical morphology. The Georges Matheron Lecture is given by a scientist with proven research ability in the field of spatial statistics or mathematical morphology. It is presented annually if an eligible and worthy nominee is found. The first recipient of the award was Jean Serra, for a long time a scientists with the Centre of Mathematical Morphology, Fontainebleau. Serra delivered the first lecture at the IAMG conference in Liège, Belgium in 2006. The IAMG Lectures Committee seeks nominations and makes the selection.
Awardees
See also
IAMG Distinguished Lectureship
Bullerwell Lecture
List of geology awards
List of geophysics awards
List of mathematics awards
References
Awards of the International Association for Mathematical Geosciences
Awards established in 2006
International awards
Mathematical morphology
Science lecture series
Recurring events established in 2006
Statistics education
Geostatistics |
https://en.wikipedia.org/wiki/JSON%20streaming | JSON streaming comprises communications protocols to delimit JSON objects built upon lower-level stream-oriented protocols (such as TCP), that ensures individual JSON objects are recognized, when the server and clients use the same one (e.g. implicitly coded in). This is necessary as JSON is a non-concatenative protocol (the concatenation of two JSON objects does not produce a valid JSON object).
Introduction
JSON is a popular format for exchanging object data between systems. Frequently there's a need for a stream of objects to be sent over a single connection, such as a stock ticker or application log records. In these cases there's a need to identify where one JSON encoded object ends and the next begins. Technically this is known as framing.
There are four common ways to achieve this:
Send the JSON objects formatted without newlines and use a newline as the delimiter.
Send the JSON objects concatenated with a record separator control character as the delimiter.
Send the JSON objects concatenated with no delimiters and rely on a streaming parser to extract them.
Send the JSON objects prefixed with their length and rely on a streaming parser to extract them.
Comparison
Line-delimited JSON works very well with traditional line-oriented tools.
Concatenated JSON works with pretty-printed JSON but requires more effort and complexity to parse. It doesn't work well with traditional line-oriented tools. Concatenated JSON streaming is a superset of line-delimited JSON streaming.
Length-prefixed JSON works with pretty-printed JSON. It doesn't work well with traditional line-oriented tools, but may offer performance advantages over line-delimited or concatenated streaming. It can also be simpler to parse.
Newline-Delimited JSON
Two terms for equivalent formats of line-delimited JSON are:
Newline delimited (NDJSON) - The old name was Line delimited JSON (LDJSON).
JSON lines (JSONL)
Streaming makes use of the fact that the JSON format does not allow return a |
https://en.wikipedia.org/wiki/Semantic%20heterogeneity | Semantic heterogeneity is when database schema or datasets for the same domain are developed by independent parties, resulting in differences in meaning and interpretation of data values. Beyond structured data, the problem of semantic heterogeneity is compounded due to the flexibility of semi-structured data and various tagging methods applied to documents or unstructured data. Semantic heterogeneity is one of the more important sources of differences in heterogeneous datasets.
Yet, for multiple data sources to interoperate with one another, it is essential to reconcile these semantic differences. Decomposing the various sources of semantic heterogeneities provides a basis for understanding how to map and transform data to overcome these differences.
Classification
One of the first known classification schemes applied to data semantics is from William Kent more than two decades ago. Kent's approach dealt more with structural mapping issues than differences in meaning, which he pointed to data dictionaries as potentially solving.
One of the most comprehensive classifications is from Pluempitiwiriyawej and Hammer, "Classification Scheme for Semantic and Schematic Heterogeneities in XML Data Sources". They classify heterogeneities into three broad classes:
Structural conflicts arise when the schema of the sources representing related or overlapping data exhibit discrepancies. Structural conflicts can be detected when comparing the underlying schema. The class of structural conflicts includes generalization conflicts, aggregation conflicts, internal path discrepancy, missing items, element ordering, constraint and type mismatch, and naming conflicts between the element types and attribute names.
Domain conflicts arise when the semantics of the data sources that will be integrated exhibit discrepancies. Domain conflicts can be detected by looking at the information contained in the schema and using knowledge about the underlying data domains. The class of domain |
https://en.wikipedia.org/wiki/Hopf%20construction | In algebraic topology, the Hopf construction constructs a map from the join X*Y of two spaces X and Y to the suspension SZ of a space Z out of a map from X×Y to Z. It was introduced by in the case when X and Y are spheres. used it to define the J-homomorphism.
Construction
The Hopf construction can be obtained as the composition of a map
X*Y → S(X×Y)
and the suspension
S(X×Y) → S(Z)
of the map from X×Y to Z.
The map from X*Y to S(X×Y) can be obtained by regarding both sides as a quotient of X×Y×I where I is the unit interval. For X*Y one identifies (x,y,0) with (z,y,0) and (x,y,1) with (x,z,1), while for S(X×Y) one contracts all points of the form (x,y,0) to a point and also contracts all points of the form (x,y,1) to a point. So the map from X×Y×I to S(X×Y) factors through X*Y.
References
Algebraic topology |
https://en.wikipedia.org/wiki/Nero%20AAC%20Codec |
Nero AAC Codec is a set of software tools for encoding and decoding Advanced Audio Coding (AAC) format audio, and editing MPEG-4 metadata. It was developed and distributed by Nero AG, and is available at no cost for Windows and Linux for non-commercial use. The codec was originally part of Nero Digital, but was later released as a stand-alone package.
Nero's AAC encoder has been very competitive when tested against other encoders in scientific listening tests, for a time, second only to Apple's AAC encoder.
In 2006, Chip Magazine (Germany) found that AAC files encoded with the Nero AAC encoder would consume as little as half of the space on a portable music player when compared to MP3 files of similar audio quality.
Components and Capabilities
The current package is labeled version "1.5.1.0", but contains the following three utilities:
The encoder and decoder support MPEG-4 AAC LC, HE-AAC (AAC LC + SBR), and HE-AACv2 (LC + SBR + PS) Audio Object Types. Sample rates up to 96 kHz, and multichannel audio up to six channels (5.1 surround) are supported.
The metadata utility can read and write Nero Digital, iTunes, and Memory Stick format tags to MPEG-4 containers.
These command-line tools are commonly used by shell scripts and programs like ABCDE, Exact Audio Copy and foobar2000 to convert audio to AAC.
History
The codec was originally part of Nero Digital, a complete MPEG-4 Audio/Video solution. The ASP/AVC (video) codec was developed by a French company called Ateme. Nero built an in-house team to develop the AAC (audio) codec that included Ivan Dimkovic, Menno Bakker, and others. Dimkovic was the author of the PsyTel codec, and the Nero AAC codec is said to be based on this work. Menno Bakker was the developer of FAAC, one of the earliest widely available AAC encoders, and also what would become its companion decoder, FAAD. The Nero AAC codec became a stand-alone package around 2006, although still called Nero Digital Audio until 2009. Nero apparently still |
https://en.wikipedia.org/wiki/Paracatenula | Paracatenula is a genus of millimeter sized free-living marine gutless catenulid flatworms.
Paracatenula is found worldwide in warm temperate to tropical subtidal sediments. They are part of the interstitial meiofauna of sandy sediments. Adult Paracatenula lack a mouth and a gut and are associated with intracellular symbiotic alphaproteobacteria of the genus Candidatus. Riegeria.
The symbionts are housed in bacteriocytes in a specialized organ, the trophosome (Greek ‘food’). Ca. Riegeria can make up half of the worms' biomass. The beneficial symbiosis with the carbon dioxide fixing and sulfur-oxidizing endosymbionts allows the marine flatworm to live in nutrient poor environments. The symbionts not only provide the nutrition but also maintain the primary energy reserves in the symbiosis.
Diversity
Five species of Paracatenula have been described - P. erato, P. kalliope, P. polyhymnia, P. urania and P. galateia, named after muses and nymphs of the Greek mythology. Several more species have been morphologically and molecularly identified, but are not formally described. The best studied species are P. galateia from the Belize barrier reef and a yet undescribed species P. sp. santandrea from the Italian Island of Elba.
Distribution
Paracatenula are globally distributed in warm temperate to tropical regions and have been collected from Belize (Caribbean Sea), Egypt (Red Sea), Australia (Pacific Ocean) and Italy (Mediterranean Sea). They occur in the oxic-anoxic interface of subtidal sands and have been found in water depths up to 40 m.
Anatomy
Paracatenula can reach a length of up to 15 mm and a width of 0.4 mm. Several larger species of Paracatenula, such as P. galateia are flattened like a leaf, while all smaller species are round. All Paracatenula species examined so far were found to harbor bacterial symbionts in specialized symbiont-housing cells that form the nutritive organ - the trophosome. The frontal part of the worms - the rostrum - is transparent and b |
https://en.wikipedia.org/wiki/ZmEu%20%28vulnerability%20scanner%29 | ZmEu is a computer vulnerability scanner which searches for web servers that are open to attack through the phpMyAdmin program,
It also attempts to guess SSH passwords through brute-force methods, and leaves a persistent backdoor. It was developed in Romania and was especially common in 2012.
It is apparently named after Zmeu, a dragon-like being in Romanian folklore.
References
Computer security software |
https://en.wikipedia.org/wiki/Windows%2010 | Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on July 29, 2015. Windows 10 was made available for download via MSDN and TechNet, as a free upgrade for retail copies of Windows 8 and Windows 8.1 users via the Windows Store, and to Windows 7 users via Windows Update. Windows 10 receives new builds on an ongoing basis, which are available at no additional cost to users, in addition to additional test builds of Windows 10, which are available to Windows Insiders. Devices in enterprise environments can receive these updates at a slower pace, or use long-term support milestones that only receive critical updates, such as security patches, over their ten-year lifespan of extended support. In June 2021, Microsoft announced that support for Windows 10 editions which are not in the Long-Term Servicing Channel (LTSC) will end on October 14, 2025.
Windows 10 received generally positive reviews upon its original release. Critics praised Microsoft's decision to provide the desktop-oriented interface in line with previous versions of Windows, contrasting the tablet-oriented approach of Windows 8, although Windows 10's touch-oriented user interface mode was criticized for containing regressions upon the touch-oriented interface of its predecessor. Critics also praised the improvements to Windows 10's bundled software over Windows 8.1, Xbox Live integration, as well as the functionality and capabilities of the Cortana personal assistant and the replacement of Internet Explorer with Microsoft Edge. However, media outlets have been critical of the changes to operating system behaviors, including mandatory update installation, privacy concerns over data collection performed by the OS for Microsoft and its partners, and adware-like tactics used to promote the operating system on its release.
Microsoft |
https://en.wikipedia.org/wiki/WPGF-LD | WPGF-LD (channel 6) is a low-power television station in Memphis, Tennessee, United States. The station's audio channel, transmitting at 87.75 MHz (or VHF channel 6), lies within the FM band; as a result, WPGF-LD's audio channel operates as a radio station at 87.7 FM. Owned by Flinn Broadcasting, the station airs an urban oldies format via the 87.75 MHz audio channel under the brand "Right On Radio". WPGF-LD's transmitter is located on the northeast side of Memphis near Bartlett, Tennessee, just off US 64.
Flinn Broadcasting surrendered WPGF-LD's license to the Federal Communications Commission on June 20, 2021, and the FCC canceled it the following day. At the time, it was an affiliate of Estrella TV. The station returned to the air in January 2022 under a new license and converted to ATSC 3.0 broadcasting that month. On July 20, 2023, an FCC "Report and Order" included this station as one of 13 "FM6" stations allowed to continue to operate an FM radio broadcast, as a "ancillary or supplementary" service.
References
External links
RabbitEars TV Query for WPGF-LD
PGF-LD
Low-power television stations in Tennessee
Television channels and stations established in 2007
2007 establishments in Tennessee
ATSC 3.0 television stations
Radio stations in Memphis, Tennessee
Urban oldies radio stations in the United States |
https://en.wikipedia.org/wiki/Panaya | Panaya a global technology company based in Hod Hasharon, Israel. The company is a subsidiary of Infosys, and has offices in North America, Europe and Japan. It specializes in SaaS (Software as a Service) Change impact analysis and cloud-based testing for packaged applications, focusing on Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) software systems.
History
Panaya was founded in 2006 as ChangeSoft Technologies by entrepreneur Yossi Cohen. It was originally headquartered in Ra'anana, Israel. A first patent on Panaya's technology was published in 2009, followed by a continuation in 2012. In 2010, shares of Tamares Group, a private equity investment firm based in Vaduz, Liechtenstein, were acquired by Panaya as part of fundraising round.
In 2012, CGI Group, a Canadian multinational information technology (IT) consulting company, announced the launching of a new Panaya Practice. In 2013 and 2014, Panaya laid off around 20% of the company. In June 2014, Deloitte and Panaya announced an agreement to provide Oracle E-business Suite customers the ability to reduce the cost and risk of application change projects. In February 2015, Infosys announced the acquisition of Panaya for a reported $200 million. As part of a few strategic moves to pivot the company, in 2017 Panaya launched Test Dynamix, an end-to-end smart test management platform for ERP and Enterprise Package Applications that enables seamless collaboration between IT and Business teams. In 2019, Panaya expanded its portfolio to support Salesforce market with the launch of the product ForeSight. In June 2019 the company appointment David Binny as CEO. In 2021, Panaya release Change Intelligence Platform, SaaS platform that shows organizations the impact of every upgrade, updates or added feature on their ERP or CRM, Such as of SAP, Oracle E-Business Suite and Salesforce systems. In 2022 the company launched Change Analysis add-on to enhance the Panaya Test Dynamix solution wit |
https://en.wikipedia.org/wiki/Camera%20Serial%20Interface | The Camera Serial Interface (CSI) is a specification of the Mobile Industry Processor Interface (MIPI) Alliance. It defines an interface between a camera and a host processor. The latest active interface specifications are CSI-2 v3.0, CSI-3 v1.1 and CCS v1.0 which were released in 2019, 2014 and 2017 respectively.
Standards
CSI-1
CSI-1 was the original standard MIPI interface for cameras. It emerged as an architecture to define the interface between a camera and a host processor. Its successors were MIPI CSI-2 and MIPI CSI-3, two standards that are still evolving.
CSI-2
The MIPI CSI-2 v1.0 specification was released in 2005. It uses either D-PHY or C-PHY (Both standards are set by the MIPI Alliance) as a physical layer option. The protocol is divided into the following layers:
Physical Layer (C-PHY/D-PHY)
Lane Merger Layer.
Low Level Protocol Layer.
Pixel to Byte Conversion Layer
Application Layer
In April 2017, the CSI-2 v2.0 specification was released. CSI-2 v2.0 brought support for RAW-16 and RAW-20 color depth, increase virtual channels from 4 to 32, Latency Reduction and Transport Efficiency (LRTE), Differential Pulse-Code Modulation (DPCM) compression and scrambling to reduce Power Spectral Density.
In September 2019, the CSI-2 v3.0 specification was released. CSI-2 v3.0 introduced Unified Serial Link (USL), Smart Region of Interest (SROI), End-of-Transmission Short Packet (EoTp) and support for RAW-24 color depth.
CSI-3
MIPI CSI-3 is a high-speed, bidirectional protocol primarily intended for image and video transmission between cameras and hosts within a multi-layered, peer-to-peer, UniPro-based M-PHY device network. It was originally released in 2012 and got re-released in version 1.1 in 2014.
Camera Command Set (CCS)
The Camera Command Set (CCS) v1.0 specification was released on November 30, 2017. CCS defines a standard set of functionalities for controlling image sensors using CSI-2.
Technology & speeds
For EMI reasons the system design |
https://en.wikipedia.org/wiki/Forensic%20mycology | Forensic mycology is the use of mycology in criminal investigations. Mycology is used in estimating times of death or events by using known growth rates of fungi, in providing trace evidence, and in locating corpses. It also includes tracking mold growth in buildings, the use of fungi in biological warfare, and the use of psychotropic and toxic fungus varieties as illicit drugs or causes of death.
Post Mortem Interval
The constant growth rate of fungi is used to determine post-mortem interval and help investigators pinpoint time of death. Traditionally, medical examiners will rely on body cooling, level of decomposition, and/or insect succession. Fungi have been noted to be present on dead bodies but, until recently, were thought be little more than another organism aiding in decomposition. There is no limit to which species of fungi or which parts of the body can be used in this process, as long as conditions at the scene can be experimentally recreated.
H. van de Voorde and P. J. Van Dijck of the Catholic University of Leuven had the first noted use of recreating fungal growth to determine post-mortem interval in 1980. In this, a woman, living alone, was found dead in a temperature-controlled house with stab wounds in her chest and fungal growth on her face and lower abdomen. The body had already cooled to 12 °C, the ambient temperature, and showed no signs of insect colonization which made accurate post-mortem interval determination difficult. van de Voorde and Van Dijck recorded the size of the fungal growth on the eye and obtained a sample. This sample was incubated in similar conditions to the corpse and the time needed to grow the colony to the size on the body was used to determine port-mortem interval and, subsequently, the time of death, which was confirmed by the confession of the murderer. In addition to size, distinct phases of fungal growth can be used to aid in post-mortem determination. Chronologically, these include the formation of substrate m |
https://en.wikipedia.org/wiki/Temple%20Reef | Temple Reef is an artificial reef off the coast of Pondicherry, India. It was constructed of fully recycled materials such as concrete blocks, rocks, trees, palm leaves, and iron bars by the Temple Adventures team starting from October 2013. Temple Reef Foundation currently maintains and monitors the reef.
Etymology
The reef was named both after its creator, Temple Adventures, and the shape of the site on the ocean floor. The current dive site is now divided into four different sites:
1) Original Temple Reef
2) Parking Lot
3) Beer Garden
4) Temple 2 aka Wreck City
Location
It is located below the surface, 5 km west, off the Coromandel coast of Pondicherry, India in the Bay of Bengal.
Biodiversity
Within a short span of time, the reef became home to a diverse aquatic life. There is a vast range of corals and fishes like groupers, lion fish, kingfish, eagle and manta rays, moray eels, sea snakes, triggerfish, parrot fish, angelfish, bannerfish, butterflyfish and crustaceans. Overall there has been 75 + different species recorded in this site. Some other marine life are: Malabar Grouper, Red Snapper, Blue line Grouper, Coral Banded Shrimp, Dancing Durban Shrimp, Spearing Mantis Shrimp, Humphead Batfish, Roundface Batfish, Zebra Batfish, Chevron Barracuda, Yellowtail Barracuda, Yellow Boxfish, Blue Spot Toby, Titan Triggerfish, Indian Vagabond Butterfly fish, Harlequin Sweetlips, Longfin Bannerfish, Blue tang surgeonfish Bronzelined Rabbitfish, Eyestripe Surgeonfish, Gold-lined spinefoot, Cleaner wrasse, Three spot Dascyllus, Blue ring angel fish, Yellowtail Chromis, Sargent fish, Copper Sweepers, Ring tailed Cardinalfish, Brown Lionfish, Chinese Trumpetfish, Salmacis Belli, Honeycomb Moray Eel, Moray Eels, Garden Eels, Porcupine Puffer fish, Blackspotted pufferfish, Peacock sole, Yellowspot Goatfish, Jackfish, Mackerels, Valenciennea Goby, Amblyeleotris Goby, Yellow Prawn Goby, Red Lionfish, Clearfin Lionfish, Pterois mombasae Lionfish.
See also
Artificial re |
https://en.wikipedia.org/wiki/Multi-primary%20color%20display | Multi-primary color (MPC) display is a display that can reproduce a wider gamut color than conventional displays. In addition to the standard RGB (Red Green and Blue) color subpixels, the technology utilizes additional colors, such as yellow, magenta and cyan, and thus increases the range of displayable colors that the human eye can see.
Sharp's Quattron is the brand name of an LCD color display technology that utilizes a yellow fourth color subpixel. It is used in Sharp's Aquos LCD TV product line, particularly in models with screens 40 inches across and larger.
References
External links
Aquos LCD TV (Sharp website)
Sharp LC46LE821E Review – Technical assessment of Quattron TV by David Mackenzie at HDTVtest
GENOA Color Technologies
Liquid crystal displays
Consumer electronics
Color depths
Color space |
https://en.wikipedia.org/wiki/Jeannine%20Mosely | Jeannine Mosely (born May 16, 1953 in Pittsburgh, PA) holds a Ph.D. in EECS from the Massachusetts Institute of Technology, and is known for her work as an origami artist. She is best known for her modular origami designs, especially her work using business cards. She has organized several crowd-sourced origami projects built from tens of thousands of business cards involving hundred of volunteers for each project. She is also known for her minimalist origami designs (such as her fourfold alphabet), curved crease models, and her invention of "or-egg-ami" models made from egg cartons.
Education and engineering career
Mosely earned a B.A. in mathematics and a B.S. in electrical engineering from the University of Illinois at Urbana-Champaign and a M.S. and Ph.D. in electrical engineering and computer science from the Massachusetts Institute of Technology. For her master's degree she developed algorithms for time-division multiple access (used in cell-phone technology). For her doctorate she developed flow-control algorithms for handling internet traffic. After finishing her degree, Mosely taught as a visiting lecturer for a year at the University of California, Berkeley in the EECS Department. Subsequently she worked at ICAD, Inc. from 1986 to 1999, developing geometric modeling algorithms for computer-aided design.
Origami
Mosely has created several, large, crowd sourced, origami projects with business cards, as well as many smaller business card models. In 1994 she invented a method for linking traditional business card cubes together into structures that could be very large. In 1995 she launched a project to construct a level 3 approximation to the fractal called the Menger Sponge using these cubes. The project was finished in 2005 with 66,048 cards folded and assembled by Mosely and about 200 volunteers.
In 2008 she was commissioned by First Night Worcester (MA) to develop a project to be a part Worcester's New Year's Eve celebration. Worcester's Union St |
https://en.wikipedia.org/wiki/Apparent%20longitude | Apparent longitude is celestial longitude corrected for aberration and nutation as opposed to mean longitude.
Apparent longitude is used in the definition of equinox and solstice. At equinox, the apparent geocentric celestial longitude of the Sun is 0° or 180°. At solstice, it is equal to 90° or 270°. This does not match up to declination exactly zero or declination extreme value because the celestial latitude of the Sun is (less than 1.2 arcseconds but) not zero.
Sources
Astronomical coordinate systems |
https://en.wikipedia.org/wiki/Meter%20water%20equivalent | In physics, the meter water equivalent (often m.w.e. or mwe) is a standard measure of cosmic ray attenuation in underground laboratories. A laboratory at a depth of 1000 m.w.e is shielded from cosmic rays equivalently to a lab below the surface of a body of water. Because laboratories at the same depth (in meters) can have greatly varied levels of cosmic ray penetration, the m.w.e. provides a convenient and consistent way of comparing cosmic ray levels in different underground locations.
Cosmic ray attenuation is dependent on the density of the material of the overburden, so the m.w.e. is defined as the product of depth and density (also known as an interaction depth). Because the density of water is , of water gives an interaction depth of . Some publications use hg/cm² instead of m.w.e., although the two units are equivalent.
For example, the Waste Isolation Pilot Plant, located deep in a salt formation, achieves 1585 m.w.e. shielding. Soudan Mine, at depth is only 8% deeper, but because it is in denser iron-rich rock it achieves 2100 m.w.e. shielding, 32% more.
Another factor that must be accounted for is the shape of the overburden. While some laboratories are located beneath a flat ground surface, many are located in tunnels in mountains. Thus, the distance to the surface in directions other than straight up is less than it would be assuming a flat surface. This can increase the muon flux by a factor of .
The usual conversion between m.w.e. and total muon flux is given by Mei and Hime:
where is the depth in m.w.e. and is the total muon flux per cm2⋅s. (The first term dominates for depths up to 1681.5 m.w.e.; below that, the second term dominates. Thus, for great depths, the factor of 4 mentioned above corresponds to a difference of 698 ln 4 ≈ 968 m.w.e.)
Standard rock
In addition to m.w.e., underground laboratory depth can also be measured in meters of standard rock. Standard rock is defined to have mass number A = 22, atomic number Z = 11, a |
https://en.wikipedia.org/wiki/Real-root%20isolation | In mathematics, and, more specifically in numerical analysis and computer algebra, real-root isolation of a polynomial consist of producing disjoint intervals of the real line, which contain each one (and only one) real root of the polynomial, and, together, contain all the real roots of the polynomial.
Real-root isolation is useful because usual root-finding algorithms for computing the real roots of a polynomial may produce some real roots, but, cannot generally certify having found all real roots. In particular, if such an algorithm does not find any root, one does not know whether it is because there is no real root. Some algorithms compute all complex roots, but, as there are generally much fewer real roots than complex roots, most of their computation time is generally spent for computing non-real roots (in the average, a polynomial of degree has complex roots, and only real roots; see ). Moreover, it may be difficult to distinguish the real roots from the non-real roots with small imaginary part (see the example of Wilkinson's polynomial in next section).
The first complete real-root isolation algorithm results from Sturm's theorem (1829). However, when real-root-isolation algorithms began to be implemented on computers it appeared that algorithms derived from Sturm's theorem are less efficient than those derived from Descartes' rule of signs (1637).
Since the beginning of 20th century there is an active research activity for improving the algorithms derived from Descartes' rule of signs, getting very efficient implementations, and computing their computational complexity. The best implementations can routinely isolate real roots of polynomials of degree more than 1,000.
Specifications and general strategy
For finding real roots of a polynomial, the common strategy is to divide the real line (or an interval of it where root are searched) into disjoint intervals until having at most one root in each interval. Such a procedure is called root isolation, a |
https://en.wikipedia.org/wiki/Clumsy%20Thief | Clumsy Thief is a dedicated deck card game published by the company Melon Rind. The game was created by Jeanie Mehran in an effort to help her son with his addition skills. Clumsy Thief won several game awards including Academics' Choice, Major Fun Award and Parents' Choice Award in 2013.
Gameplay
The game consists of 84 Money cards, 6 Thief cards and 4 Jail cards. Each player is dealt seven cards face down that they pick up and review.
The objective is to have the most money at the end of the game. Players get money by making or stealing money stacks. Players lose money if their stacks are stolen.
Players with two cards in their hand that add exactly to $100 must place them face up with one card on top of the other, creating a money stack. After all players have built their stacks and placed them on the table the stealing begins. On "Go" all players steal money stacks from other players using the cards in their hands.
Players may steal a money stack from any player if they have a card that adds up to $100 when added to the top card of that stack. After placing the card on top, players slide the whole stack to their side of the table.
A Thief card let players steal any money stack from any player. It can also steal money stacks stolen by another thief. A Jail card tops only a Thief card and takes the whole stack. Players can also top their own Thief card to prevent other players from stealing their stack.
When the stealing is over, each player takes another card and adds it to their hand. On "Go" a new round of stacking and stealing begins.
The game is over the instant any player is out of cards or there aren't enough new cards for every player. Anyone still holding cards turns them face down and discards them. Players add their cards. Money cards are worth their dollar value. Thief, Jail and discarded cards have no value. The player with the most money wins.
References
External links
Melon Rind Games: Clumsy Thief
Video Review
Dedicated deck card games
C |
https://en.wikipedia.org/wiki/Invincea | Invincea, Inc. was a company that offered a suite of endpoint protection software products. Originally called Secure Command LLC, Invincea, Inc. was a venture-backed software company that provided malware threat detection, prevention, and analysis to stop advanced threats. It was acquired by Sophos in February 2017.
History
The company was founded in 2006 by Dr. Anup Ghosh and was based in Fairfax, Virginia. Major investors included Dell Ventures, New Atlantic Ventures, Grotech Ventures, Aeris Capital, and Harbert Venture Partners.
In 2012, Invincea used a $21 million grant from DARPA to improve the security of the US military's Android-based devices such as tablet PCs and smartphones. The Invincea software secured data from unauthorized access and protect devices from malicious applications.
In June 2013, Dell announced an OEM partnership with Invincea and began shipping new endpoint security software dubbed "Dell Data Protection | Protected Workspace" on all of its commercial tablets and PCs worldwide. Dell Data Protection included Invincea container technology to put a shield - or virtualized container around each browser or application instance to protect it from the rest of the device and the network on which it resided.
In December 2013, Invincea acquired Sandboxie for an undisclosed amount. Sandboxie was a pioneer in the Windows Containment and sandboxing market, also called “container” technology, and the acquisition was made to consolidate Sandboxie and Invincea's own container solution.
In May 2016, Invincea launched X by Invincea. X by Invincea was a suite of products that protected endpoints by detecting and blocking known and unknown malware without signatures in real-time. X combined deep learning, an advanced form of machine learning, behavioral analysis and the legacy Invincea container technology, also known as isolation technology, in one lightweight agent.
In February 2017, Invincea was acquired by Sophos, a security software and hardware co |
https://en.wikipedia.org/wiki/RadyoBisyon | RadyoBisyon (RadioVision, portmanteau of Filipino words of "radio" and "television") is the Philippine national morning radio and television newscast that was produced by Media ng Bayan, aired on People's Television Network (PTV), Intercontinental Broadcasting Corporation (IBC) and PBS-Radyo ng Bayan. It began airing on MNB's state-owned TV and radio stations on October 6, 2014, and is currently aired from 6:00 - 7:00 am PST on PTV with simulcast over IBC and DZRB Radyo ng Bayan.
PTV (formerly NBN), IBC and Radyo ng Bayan have earlier aired a joint venture morning show, One Morning Cafe, aired from 2007 - 2010; along with government owned Radio Philippines Network (RPN), now majority owned by ALC Group of Companies.
Cancellation
RadyoBisyon aired its final broadcast on June 2, 2017, as Radyo ng Bayan 738 was rebranded as Radyo Pilipinas 1 (RP1) on June 5, 2017.
Presenters
Aljo Bendijo (DZRB Radyo ng Bayan) (2016–2017)
Czarinah Lusuegro (DZRB Radyo ng Bayan) (2014–2015, 2016–2017)
Segments
Words of Wisdom
PTV News sa RadyoBisyon
Provincial Round-up
On the Road
PTV InfoWeather
Hapag ng Talastasan
Former Anchors
Francis Cansino (DZRB Radyo ng Bayan) (2014–2016)
Julius Disamburun (People's Television Network) (2014–2015)
Vivienne Gulla (People's Television Network) (2014–2015) (now with ABS-CBN News Channel)
Maria Arra Perez (People's Television Network) (2015–2016) (now with DZMM)
Audrey Gorriceta (People's Television Network) (2016–2017)
See also
List of programs aired by People's Television Network
List of programs previously broadcast by Intercontinental Broadcasting Corporation
External links
People's Television Network original programming
Intercontinental Broadcasting Corporation original programming
Philippine television news shows
Breakfast television in the Philippines
Filipino-language television shows
2014 Philippine television series debuts
2017 Philippine television series endings
IBC News and Public Affairs shows
Intercontinental Br |
https://en.wikipedia.org/wiki/German%20Parliamentary%20Committee%20investigation%20of%20the%20NSA%20spying%20scandal | The German Parliamentary Committee investigation of the NSA spying scandal (official title: 1. Untersuchungsausschuss „NSA“) was started on March 20, 2014, by the German Parliament in order to investigate the extent and background of foreign secret services spying in Germany in the light of the Global surveillance disclosures (2013–present).
The Committee is also in search of strategies on how to protect telecommunication with technical means.
Members
The committee is formed by eight members of the German Parliament. The parliamentarian of the Christian Democratic Union (CDU) Clemens Binninger was head of the committee but stepped down after six days. In a statement, Binninger clarified that the other committee members had insisted on inviting Edward Snowden to testify; Binninger objected to this and resigned in protest. Patrick Sensburg (CDU) succeeded him.
Witnesses
Discussion about the witness Snowden
On May 8, 2014, the committee unanimously decided to let US whistleblower Edward Snowden testify as a witness.
On September 23, 2014, the Green Party and The Left filed a constitutional complaint against the Christian Democratic Union, the Social Democrats and the NSA Parliamentary Committee because of the Christian Democrats' and the Social Democrats' refusal to let the witness Edward Snowden testify in Berlin. The accused proposed a video conference from Moscow which Snowden had refused.
On September 28, 2014, the Green Party and The Left filed a constitutional complaint against German chancellor Merkel. According to them, she refuses to comply with her duty according to Chapter 44 of the German constitution to ensure a real investigation; especially by refusing to ensure the legal requirements to allow the witness Edward Snowden to testify.
Testimony of Binney and Drake
On July 3, 2014, the former Technical Director of the NSA, William Binney, who had become a whistleblower after the terrorist attacks of September 11, 2001, testified to the committee. H |
https://en.wikipedia.org/wiki/Im%20schwarzen%20Walfisch%20zu%20Askalon | "Im schwarzen Walfisch zu Askalon" ("In the Black Whale of Ascalon") is a popular academic commercium song. It was known as a beer-drinking song in many German speaking ancient universities. Joseph Victor von Scheffel provided the lyrics under the title Altassyrisch (Old Assyrian) 1854, the melody is from 1783 or earlier.
Content
The lyrics reflect an endorsement of the bacchanalian mayhem of student life, similar as in Gaudeamus igitur. The song describes an old Assyrian drinking binge of a man in an inn with some references to the Classics. The desks are made of marble and the large invoice is being provided in cuneiform on bricks. However the carouser has to admit that he left his money already in Nineveh. A Nubian house servant kicks him out then and the song closes with the notion, that (compare John 4:44) a prophet has no honor in his own country, if he doesn't pay cash for his consumption. Charles Godfrey Leland has translated the poems among other works of Scheffel. Each stanza begins with the naming verse "Im Schwarzen Walfisch zu Askalon", but varies the outcome. The "Im" is rather prolonged with the melody and increases the impact. Some of the stanzas:
Im schwarzen Wallfisch zu Ascalon
Da trank ein Mann drei Tag',
Bis dass er steif wie ein Besenstiel
Am Marmortische lag.
'In the Black Whale at Ascalon
A man drank day by day,
Till, stiff as any broom-handle,
Upon the floor he lay.
...
In the Black Whale at Ascalon
The waiters brought the bill,
In arrow-heads on six broad tiles
To him who thus did swill.
...
In the Black Whale at Ascalon
No prophet hath renown;
And he who there would drink in peace
Must pay the money down.
In typical manner of Scheffel, it contains an anachronistic mixture of various times and eras, parodistic notions on current science, as e.g. Historical criticism and interpretations of the Book of Jonah as a mere shipwrecking narrative. According to Scheffel, the guest didn't try to get back in the inn as „Aussi bin |
https://en.wikipedia.org/wiki/Generalized%20Wiener%20filter | The Wiener filter as originally proposed by Norbert Wiener is a signal processing filter which uses knowledge of the statistical properties of both the signal and the noise to reconstruct an optimal estimate of the signal from a noisy one-dimensional time-ordered data stream. The generalized Wiener filter generalizes the same idea beyond the domain of one-dimensional time-ordered signal processing, with two-dimensional image processing being the most common application.
Description
Consider a data vector which is the sum of independent signal and noise vectors with zero mean and covariances and . The generalized Wiener Filter is the linear operator which minimizes the expected residual between the estimated signal and the true signal, . The that minimizes this is , resulting in the Wiener estimator . In the case of Gaussian distributed signal and noise, this estimator is also the maximum a posteriori estimator.
The generalized Wiener filter approaches 1 for signal-dominated parts of the data, and S/N for noise-dominated parts.
An often-seen variant expresses the filter in terms of inverse covariances. This is mathematically equivalent, but avoids excessive loss of numerical precision in the presence of high-variance modes. In this formulation, the generalized Wiener filter becomes using the identity .
An example
The cosmic microwave background (CMB) is a homogeneous and isotropic random field, and its covariance is therefore diagonal in a spherical harmonics basis. Any given observation of the CMB will be noisy, with the noise typically having different statistical properties than the CMB. It could for example be uncorrelated in pixel space. The generalized Wiener filter exploits this difference in behavior to isolate as much as possible of the signal from the noise.
The Wiener-filtered estimate of the signal (the CMB in this case) requires the inversion of the usually huge matrix . If S and N were diagonal in the same basis this would be trivial, but of |
https://en.wikipedia.org/wiki/Classical%20control%20theory | Classical control theory is a branch of control theory that deals with the behavior of dynamical systems with inputs, and how their behavior is modified by feedback, using the Laplace transform as a basic tool to model such systems.
The usual objective of control theory is to control a system, often called the plant, so its output follows a desired control signal, called the reference, which may be a fixed or changing value. To do this a controller is designed, which monitors the output and compares it with the reference. The difference between actual and desired output, called the error signal, is applied as feedback to the input of the system, to bring the actual output closer to the reference.
Classical control theory deals with linear time-invariant (LTI) single-input single-output (SISO) systems. The Laplace transform of the input and output signal of such systems can be calculated. The transfer function relates the Laplace transform of the input and the output.
Feedback
To overcome the limitations of the open-loop controller, classical control theory introduces feedback. A closed-loop controller uses feedback to control states or outputs of a dynamical system. Its name comes from the information path in the system: process inputs (e.g., voltage applied to an electric motor) have an effect on the process outputs (e.g., speed or torque of the motor), which is measured with sensors and processed by the controller; the result (the control signal) is "fed back" as input to the process, closing the loop.
Closed-loop controllers have the following advantages over open-loop controllers:
disturbance rejection (such as hills in a cruise control)
guaranteed performance even with model uncertainties, when the model structure does not match perfectly the real process and the model parameters are not exact
unstable processes can be stabilized
reduced sensitivity to parameter variations
improved reference tracking performance
In some systems, closed-loop and ope |
https://en.wikipedia.org/wiki/Tuttminx | A Tuttminx ( or ) is a Rubik's Cube-like twisty puzzle, in the shape of a truncated icosahedron. It was invented by Lee Tutt in 2005. It has a total of 150 movable pieces to rearrange, compared to 20 movable pieces of the Rubik's Cube.
Description
The Tuttminx has a total of 32 face centre pieces (12 pentagon and 20 hexagon), 60 corner pieces, and 90 edge pieces. The face centres each have a single colour, which identifies the colour of that face in the solved state. The edge pieces have two colours, and the corner pieces have three colours. Each hexagonal face contains a centre piece, 6 corner pieces, and 6 edge pieces, while each pentagonal face contains a centre piece, 5 corner pieces, and 5 edge pieces.
The puzzle twists around the faces: each twist rotates one face centre piece and moves all edge and corner pieces surrounding it. The pentagonal faces can be twisted 72° in either direction, while the hexagonal faces can be rotated 120°.
The purpose of the puzzle is to scramble the colours, and then restore it to its original state of having one colour per face.
Number of combinations
The puzzle has 150 movable pieces: 60 corner pieces, 60 edge pieces that are adjacent to a pentagonal face (so-called pentagonal edges) and 30 edge pieces that are not (non-pentagonal edges). Only even permutations of all three types of pieces are possible (i.e. it is impossible to have only one pair of identical pieces swapped). Thus, there are 60!/2 possible ways to arrange the corner pieces, 60!/2 ways to arrange the pentagonal edges and 30!/2 ways to arrange the non-pentagonal edges.
All corner pieces have only one possible orientation, as do all pentagonal edge pieces. The non-pentagonal edge pieces all have 2 possible orientations each. Only even orientations of those are possible (meaning that it is impossible to have only one edge piece flipped over). This means there are 229 ways to orientate the edge pieces.
The number of possible combinations on the Tuttminx is ther |
https://en.wikipedia.org/wiki/J.%20A.%20Lindon | James Albert Lindon ( – 16 December 1979) was an English puzzle enthusiast and poet specialising in light verse, constrained writing, and children's poetry.
Lindon was based in Addlestone and Weybridge. His poems often won weekly newspaper competitions, but seldom appeared in anthologies, though poems of his did appear in Yet More Comic and Curious Verse, compiled by J. M. Cohen, published by Penguin Books in 1959. Among his anthologised works are numerous parodies, including spoofs of Dylan Thomas, E. E. Cummings, T. E. Brown, Lewis Carroll, Rudyard Kipling, and Ernest L. Thayer. His palindromic poems appeared occasionally in Word Ways: The Journal of Recreational Linguistics, and several were collected in Howard W. Bergerson's Palindromes and Anagrams. Lindon is also noted as being the world's first writer of vocabularyclept poetry, in which poems are constructed by rearranging the words of an existing poem.
Author Martin Gardner often spoke highly of Lindon's poetry, referring to him as the greatest English writer of comic verse. His skill at wordplay was similarly lauded, with Gardner, Bergerson, Dmitri Borgmann, and others proclaiming him to be among the world's finest palindromists.
In addition to being a poet, Lindon was an accomplished writer and solver of puzzles, especially those in recreational mathematics. He was responsible for most of the pioneering work on antimagic squares.
Bibliography
Lindon's poetry appears in the following anthologies, edited volumes, and journals:
J. M. Cohen, ed. Yet More Comic and Curious Verse. Penguin, 1959.
Worm Runner's Digest. 1959–.
The Guinness Book of Poetry 1958–59. Putnam, 1960.
Martin Gardner. The Annotated Snark. Simon & Schuster, 1962.
Martin Gardner, ed. The Annotated Casey at the Bat: A Collection of Ballads about the Mighty Casey. Dover, 1967.
Word Ways: The Journal of Recreational Linguistics. Greenwood Periodicals et al., 1968–.
Howard W. Bergerson. Palindromes and Anagrams. Dover, 1973.
Oxford |
https://en.wikipedia.org/wiki/Exit%20sign | An exit sign is a pictogram or short text in a public facility (such as a building, aircraft, or boat) denoting the location of the closest emergency exit to be used in case of fire or other emergency that requires rapid evacuation. Most relevant codes (fire, building, health, or safety) require exit signs to be permanently lit at all times.
Exit signs are intended to be absolutely unmistakable and understandable to anyone. In the past, this generally meant exit signs that show the word "EXIT" or the equivalent in the local language, but increasingly, exit signs around the world are in pictogram form, with or without supplementary text.
History
Early exit signs were generally either made of metal and lit by a nearby incandescent light bulb or were a white glass cover with "EXIT" written in red, placed directly in front of a single-bulb light fixture. An inherent flaw with these designs was that in a fire, the power to the light often failed. In addition, the fixtures could be difficult to see in a fire where smoke often reduced visibility, despite being relatively bright. The biggest problem was that the exit sign was hardly distinguishable from an ordinary safety lighting fixture commonly installed above doors in the past. The problem was partially solved by using red-tinted bulbs instead.
Better signs were soon developed that more resembled today's modern exit sign, with an incandescent bulb inside a rectangular-shaped box that backlit the word "EXIT" on one or both sides. Being larger than its predecessors, this version of the exit sign solved some of the visibility problems. The sign was still only useful as long as mains power remained on.
As battery-backup systems became smaller and more efficient, some exit signs began to use a dual-power system. Under normal conditions, the exit sign was lit by mains power and the battery was maintained in a charged state. In the event of a power outage, the battery would supply power to light the sign. Early battery-ba |
https://en.wikipedia.org/wiki/ZX80%20character%20set | The ZX80 character set is the character encoding used by the Sinclair Research ZX80 microcomputer with its original 4K BASIC ROM. The encoding uses one byte per character for 256 code points. It has no relationship with previously established ones like ASCII or EBCDIC, but it is related though not identical to the character set of the successor ZX81.
Printable characters
The character set has 64 unique glyphs present at code points 0–63. With the most significant bit set the character is generated in inverse video; corresponding to code points 128–191. These 128 values are the only displayable ones allowed in the video memory (known as the display file). The remaining code points (64–127 and 192–255) are used as control characters or Sinclair BASIC keywords, while some are unused.
The small effective range of only 64 unique glyphs precludes support for Latin lower case letters, and many symbols used widely in computing such as the exclamation point or the at sign.
There are 11 block graphics characters, counting code point 0 which also doubles as space. Together with the 11 inverse video versions these 22 code points provide every combination of the character cell divided into 2×2 black-and-white block pixels for low-resolution 64×48 pixel graphics, or into 1×2 black, white or dithered gray wide block pixels for a 32×48 resolution. The 2×2 versions of these are also present in the Block Elements Unicode block.
Code point 1 is the double-quote (") character when used in the display file, but uniquely to the ZX80 it is used internally as the string terminator character so the BASIC function CHR$(1) returns a null string; CHR$(212) translates to the printable " character.
Changes in the ZX81
The 8K BASIC ROM of the follow-up ZX81 model was also available as an upgrade for the ZX80, replacing its integer-only 4K BASIC ROM. It introduced the modified ZX81 character set which has mostly the same code points, e.g. for A-Z and 0-9, but the code points are different fo |
https://en.wikipedia.org/wiki/Tree%20box%20filter | A tree box filter is a best management practice (BMP) or stormwater treatment system widely implemented along sidewalks, street curbs, and car parks. They are used to control the volume and amount of urban runoff pollutants entering into local waters, by providing areas where water can collect and naturally infiltrate or seep into the ground. Such systems usually consist of a tree planted in a soil media, contained in a small, square, concrete box. Tree box filters are popular bioretention and infiltration practices, as they collect, retain, and filter runoff as it passes through vegetation and microorganisms in the soil. The water is then either consumed by the tree or transferred into the storm drain system.
Construction
Design Considerations
Before construction of the tree box filter, several factors must be considered to maximize the effectiveness and impact of the system. Such factors include:
area available
area of coverage
types of contaminants
level of rainfall
aesthetic appeal
maintenance
budget.
In order to accommodate such considerations, the location, design, and type of material of the box filter may be altered.
Location
Tree box filters are designed to accommodate a low volume of rainfall. A filter surface area of can only cover up to of impervious or nonporous surface. As a result, strategically positioning multiple tree boxes around the area of coverage is vital, when trying to reduce costs and work.
Design
Tree box filters consist of four main parts.
Tree
Open-Bottom Concrete Box
Porous Soil Mix
Underdrain
The tree is planted in a soil mixture of construction sand, unscreened topsoil, and compost. The soil layer must be deep enough to accommodate nutrient and space requirements of the tree. It is recommended that there be
of soil for every of tree canopy. Therefore, a five by six foot tree box must contain at least two feet of soil media in order to sustain a tree with a canopy of thirty square feet. Underneath the layer of |
https://en.wikipedia.org/wiki/List%20of%20program%20transformation%20systems | This article lists notable program transformation systems by alphabetical order:
ATC
CIL (for C)
Coccinelle (for C)
DMS
JetBrains MPS
Nemerle
Rascal Metaprogramming Language
Spoon (for Java)
TXL
References
The Program transformation Wiki
Transformation Technology Bibliography
Program transformation
Computer programming |
https://en.wikipedia.org/wiki/Smaato | Smaato is a platform for digital advertising technology and ad serving. Smaato's self-serve omnichannel monetization solution allows publishers to manage their complete advertising stack in a single location. Monetization technology for advertising enables publishers to maintain free content.
Smaato was established in 2005 by Ragnar Kruse and Petra Vorsteher. Smaato gets its name from the Japanese word for "smart".
The Empire State Building in New York City is home to Smaato's headquarters. Smaato has offices in Hamburg, Berlin, Amsterdam, Seoul, Pune, Istanbul, Madrid, and Beijing. The company has over 190 employees from more than 40 different countries.
History
Smaato was established in 2005, and one year later, the company introduced its mobile supply-side platform (SSP). In 2012, Smaato launched its real-time bidding ad exchange. Thereafter, the company's focus shifted towards mobile acquisition and expansion of its automation platform's self-service aspect.
The Smaato Publisher Platform (SPX), a comprehensive publisher ad server, was launched by the company in 2015. The platform offers app developers and digital publishers the ability to profit from their properties immediately by employing real-time data to send targeted consumers to advertisers.
The next year, Smaato was picked by Google and incorporated into the AdMob and DoubleClick for Publishers platforms, through SDK-less mediation. Later in 2016, Smaato further developed its products for the demand side of mobile advertising. Smaato's Demand Platform (SDX) provided mobile ad traffic demand partners with increased flexibility and control. In 2016, Beijing-based Spearhead Integrated Marketing Communication Group acquired Smaato for $148 million.
In 2018, the company collaborated with Amazon Publisher Services (APS) to give demand partners within the app, the ability to access Amazon's Transparent Ad Marketplace inventory.
Smaato is currently focusing on leveraging artificial intelligence and machin |
https://en.wikipedia.org/wiki/Charles%20Sherman%20%28artist%29 | Charles Sherman (born 1947) is an American artist best known for his continuum sculptures based on a three-dimensional form of the Möbius strip. Sherman’s work is included in museum and public collections, such as the San Diego Museum of Art, the Mobile Museum of Art, and the Golda Meir Center for Political Leadership at Metropolitan State University of Denver. His work has been shown in solo and group exhibitions in the United States and Asia. His sculpture and jewelry designs have appeared in contemporary design and architectural publications. Serenity (2006), part of his monumental ceramic Infinity Ring body of work, is installed lakeside at the Fountain Park Sculpture Garden in Fountain Hills, Arizona, and also in the front of the John Entenza House in Santa Monica, California, a precursor to the Case Study Houses.
Early work: The Spiritual in Art and the Goddess
Sherman’s early-career paintings, drawings, and prints were of flowers. He closely observed and recorded their transformation from life to death. He characterized this exploration as a gateway to his Goddess Series.
In the 1980s, Sherman was a significant artistic interpreter of the Goddess movement that had begun worldwide in the 1970s. Sherman embraced the feminine energy of the goddess as a powerful force, and created a visual language that was inspired by the work of Los Angeles-based Lithuanian archaeologist Marija Gimbutas. Sherman's depictions of goddesses from the Neolithic period and the traditions of ancient Europe were described by Starr Goode as abstracted, fanciful images which sometimes verged on the grotesque. Her interview of Charles Sherman was one of 21 interviews of scholars and artists by Starr Goode for her cable series, The Goddess in Art (1986-1991). The videos are in the permanent collection of the Getty Research Institute in Los Angeles, California.
Sherman exhibited his predominantly black and white acrylic paintings in goddess-themed Los Angeles exhibitions, such as The |
https://en.wikipedia.org/wiki/Suffix%20automaton | In computer science, a suffix automaton is an efficient data structure for representing the substring index of a given string which allows the storage, processing, and retrieval of compressed information about all its substrings. The suffix automaton of a string is the smallest directed acyclic graph with a dedicated initial vertex and a set of "final" vertices, such that paths from the initial vertex to final vertices represent the suffixes of the string.
In terms of automata theory, a suffix automaton is the minimal partial deterministic finite automaton that recognizes the set of suffixes of a given string . The state graph of a suffix automaton is called a directed acyclic word graph (DAWG), a term that is also sometimes used for any deterministic acyclic finite state automaton.
Suffix automata were introduced in 1983 by a group of scientists from the University of Denver and the University of Colorado Boulder. They suggested a linear time online algorithm for its construction and showed that the suffix automaton of a string having length at least two characters has at most states and at most transitions. Further works have shown a close connection between suffix automata and suffix trees, and have outlined several generalizations of suffix automata, such as compacted suffix automaton obtained by compression of nodes with a single outgoing arc.
Suffix automata provide efficient solutions to problems such as substring search and computation of the largest common substring of two and more strings.
History
The concept of suffix automaton was introduced in 1983 by a group of scientists from University of Denver and University of Colorado Boulder consisting of Anselm Blumer, Janet Blumer, Andrzej Ehrenfeucht, David Haussler and Ross McConnell, although similar concepts had earlier been studied alongside suffix trees in the works of Peter Weiner, Vaughan Pratt and Anatol Slissenko. In their initial work, Blumer et al. showed a suffix automaton built for the |
https://en.wikipedia.org/wiki/List%20of%20Martin%20Gardner%20Mathematical%20Games%20columns | Over a period of 24 years (January 1957 – December 1980), Martin Gardner wrote 288 consecutive monthly "Mathematical Games" columns for Scientific American magazine. During the next years, through June 1986, Gardner wrote 9 more columns, bringing his total to 297. During this period other authors wrote most of the columns. In 1981, Gardner's column alternated with a new column by Douglas Hofstadter called "Metamagical Themas" (an anagram of "Mathematical Games"). The table below lists Gardner's columns.
Twelve of Gardner's columns provided the cover art for that month's magazine, indicated by "[cover]" in the table with a hyperlink to the cover.
Other articles by Gardner
Gardner wrote 5 other articles for Scientific American. His flexagon article in December 1956 was in all but name the first article in the series of Mathematical Games columns and led directly to the series which began the following month. These five articles are listed below.
References
External links
A Quarter Century of Recreational Mathematics, by Martin Gardner preserved at the Internet Archive
A subject index for the fifteen books of Martin Gardner's Mathematical Games columns
The Top 10 Martin Gardner Scientific American Articles
Columns (periodical)
Recreational mathematics
Mathematics-related lists
Mathematical Games columns |
https://en.wikipedia.org/wiki/Orthomorphism | In abstract algebra, an orthomorphism is a certain kind of mapping from a group into itself. Let G be a group, and let θ be a permutation of G. Then θ is an orthomorphism of G if the mapping f defined by f(x) = x−1 θ(x) is also a permutation of G. A permutation φ of G is a complete mapping if the mapping g defined by g(x) = xφ(x) is also a permutation of G. Orthomorphisms and complete mappings are closely related.
References
Mathematical terminology |
https://en.wikipedia.org/wiki/Triploid%20block | Triploid block is a phenomenon describing the formation of nonviable progeny after hybridization of flowering plants that differ in ploidy. The barrier is established in the endosperm, a nutritive tissue supporting embryo growth. This phenomenon usually happens when autopolyploidy occurs in diploid plants. Triploid blocks lead to reproductive isolation. The triploid block effects have been explained as possibly due to genomic imprinting in the endosperm. Triploid block can be partially ovecome by chemical treatment with 5-Azacytidine.
References
Botany
Evolution |
https://en.wikipedia.org/wiki/Tokogeny | Tokogeny or tocogeny is the biological relationship between parent and offspring, or more generally between ancestors and descendants. In contradistinction to phylogeny it applies to individual organisms as opposed to species.
In the tokogentic system shared characteristics are called traits.
References
Biology |
https://en.wikipedia.org/wiki/Penveu | The Penveu is a pen-like device developed by the American company Interphase, for use with digital audio-visual presentations.
History
In 1991, SMART Technologies introduced an Interactive Whiteboard, on which the image from a projector was displayed. A USB connection allowed the presenter to virtually interact with the projection. Other after-market products aimed at working with existing projectors (Mimio and eBeam) came out after that.
Interphase Corporation (NASDAQ:INPH) was founded in 1974, and filed for initial public offering in 1984. In 2010, penveu was invented. The company developed the concepts and tested them for two years until unveiling the product at the DEMO conference in Santa Clara, California, on April 18, 2012. On May 30, 2014, the product was released to the market.
Since the product is made of two electronic boards (one in the handheld pen and one in the base station), the engineering department named those two boards the PEN and the VEU (video enhancement unit). PENVEU became the name of the device.
On September 30, 2015, Interphase Corporation announced it had ceased operations and commenced bankruptcy proceedings.
Technology
The core of the penveu technology surrounds a camera located near the tip of the pen, but is implemented in two parts of the penveu system: the PEN, and the VEU. The video signal (VGA) that comes from the computer towards the display device (projector or TV monitor) is intercepted by the VEU box. Over there, visual targets are inserted into that video stream. Those targets include position-encoded information, related to the location of each target within the display area. The targets are inserted as increased brightness in one frame, and reduced brightness in the next frame. There is a digital signal processor (DSP) in the pen, which calculates the position of the tip based on the information retrieved from the targets detected.
As a result of the positioning targeting system being integrated with the displayed i |
https://en.wikipedia.org/wiki/Goverlan%20Systems%20Management | Goverlan Reach Systems Management is a remote support software created and distributed by Goverlan, Inc.
Goverlan is an on-premises client management software designed for medium to large enterprises for remote control, active directory management, global configuration change management, and reporting within a Windows IT Infrastructure.
History
Goverlan Reach, the primary product of Goverlan, Inc. was conceived and created in 1996 as a result of working at an investment bank in New York City with help-desks worldwide. The product was later commercialized and Goverlan Inc was incorporated in 1998.
Features
The Goverlan Reach Remote Support Software is used for remote support, IT process automation, IT management, software installation, inventory, and remote control. Other features include: displaying system information, mapping printers, and Wake-on-LAN settings.
Remote Control
Goverlan Reach Remote Control (RC) is a remote desktop support software option for IT specialists. Goverlan allows for remote control and desktop sharing. With Goverlan, administrators can remote shadow multiple client sessions in a single pane and multiple administrators can participate in a single remote control session. In addition, an administrator can capture screenshots or video recordings during a remote session.
There are Other features that Goverlan Remote Control supports such as: remote assistance with the ability to connect to computers over the internet, transfer files, or view multiple sessions in one screen and control bandwidth used during a remote session. Goverlan supports Citrix XenApp and Microsoft Terminal Services shadowing.
Behind-the-scenes systems management
The Goverlan Administration & Diagnostics tool integrates into an existing Active Directory (AD) organization unit (OU) structure for Windows Systems management. Goverlan can perform remote administration on a single machine, group of machines, or entire domain. Goverlan is compatible with VDI, RDP, and Citrix |
https://en.wikipedia.org/wiki/Coherent%20turbulent%20structure | Turbulent flows are complex multi-scale and chaotic motions that need to be classified into more elementary components, referred to coherent turbulent structures. Such a structure must have temporal coherence, i.e. it must persist in its form for long enough periods that the methods of time-averaged statistics can be applied. Coherent structures are typically studied on very large scales, but can be broken down into more elementary structures with coherent properties of their own, such examples include hairpin vortices. Hairpins and coherent structures have been studied and noticed in data since the 1930s, and have been since cited in thousands of scientific papers and reviews.
Flow visualization experiments, using smoke and dye as tracers, have been historically used to simulate coherent structures and verify theories, but computer models are now the dominant tools widely used in the field to verify and understand the formation, evolution, and other properties of such structures. The kinematic properties of these motions include size, scale, shape, vorticity, energy, and the dynamic properties govern the way coherent structures grow, evolve, and decay. Most coherent structures are studied only within the confined forms of simple wall turbulence, which approximates the coherence to be steady, fully developed, incompressible, and with a zero pressure gradient in the boundary layer. Although such approximations depart from reality, they contain sufficient parameters needed to understand turbulent coherent structures in a highly conceptual degree.
History and Discovery
The presence of organized motions and structures in turbulent shear flows was apparent for a long time, and has been additionally implied by mixing length hypothesis even before the concept was explicitly stated in literature. There were also early correlation data found by measuring jets and turbulent wakes, particularly by Corrsin and Roshko. Hama's hydrogen bubble technique, which used flow visu |
https://en.wikipedia.org/wiki/Table%20computer | A table computer, or a table PC, or a tabletop is a device class of a full-featured large-display portable all-in-one computer with an internal battery. It can either be used on a table's top, hence the name, or carried around the house.
Table computers feature an 18-inch or larger multi-touch touchscreen display, a battery capable of at least 2 hours of autonomous work and a full-featured desktop operating system, such as Windows 10. They are typically shipped with pre-installed multi-user touch-enabled casual games and apps, and typically marketed as family entertainment devices. Manufacturers of some table computers provide a specialized graphical user interface to simplify a simultaneous interaction of multiple users, one example is Aura interface, which is installed in Lenovo IdeaCentre Horizon tabletop.
A number of manufacturers released their own versions of tabletops, some prominent examples are HP Envy Rove 20, Dell XPS 18 and Sony VAIO Tap 20.
See also
Surface computer
References
Classes of computers
Portable computers
All-in-one desktop computers |
https://en.wikipedia.org/wiki/MS-Net | MS-Net, sometimes stylized as MS-NET, was a network operating system sold by Microsoft in the 1980s, the earliest days of local area networking.
Overview
MS-Net was not a complete networking system of its own; Microsoft licensed it to vendors who used it as the basis for server programs that ran on MS-DOS, porting it to their own underlying networking hardware and adding services on top. Version 1.0 was announced on 14 August 1984 and released along with the PC/AT on 2 April 1985. A number of MS-Net products were sold during the late 1980s, before it was replaced by LAN Manager in 1990.
MS-Net's network interface was based on IBM's NetBIOS protocol definition, which allowed it to be ported to different networking systems with relative ease. It did not implement the entire NetBIOS protocol, however, only the small number of features required for the server role. One key feature that was not implemented was NetBIOS's name management routines, a feature third parties often added back in. The system also supplied the program REDIR.EXE, which allowed transparent file access from DOS machines to any MS-Net based server.
Several products from the mid-to-late-1980s were based on the MS-Net system. IBM's PC-Net was a slightly modified version of the MS-Net system typically used with Token Ring. MS partnered with 3Com to produce the more widely used 3+Share system running on a 3Com networking stack based on the XNS protocol on Ethernet. Other well-known systems, including Banyan VINES and Novell NetWare, did not use MS-Net as their basis, using Unix and a custom OS, respectively. They did, however, allow access to their own files via the REDIR.EXE.
MS-Net was sold only for a short period of time. MS and 3Com collaborated on a replacement known as LAN Manager running on OS/2, using the new Server Message Block standard for file transfer. 3Com's version of the product retained their XNS-based protocol, but 3Com abandoned the server market not long after. MS's version remain |
https://en.wikipedia.org/wiki/Blockchain | A blockchain is a distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree, where data nodes are represented by leaves). Since each block contains information about the previous block, they effectively form a chain (compare linked list data structure), with each additional block linking to the ones before it. Consequently, blockchain transactions are irreversible in that, once they are recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks.
Blockchains are typically managed by a peer-to-peer (P2P) computer network for use as a public distributed ledger, where nodes collectively adhere to a consensus algorithm protocol to add and validate new transaction blocks. Although blockchain records are not unalterable, since blockchain forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.
A blockchain was created by a person (or group of people) using the name (or pseudonym) Satoshi Nakamoto in 2008 to serve as the public distributed ledger for bitcoin cryptocurrency transactions, based on previous work by Stuart Haber, W. Scott Stornetta, and Dave Bayer. The implementation of the blockchain within bitcoin made it the first digital currency to solve the double-spending problem without the need of a trusted authority or central server. The bitcoin design has inspired other applications and blockchains that are readable by the public and are widely used by cryptocurrencies. The blockchain may be considered a type of payment rail.
Private blockchains have been proposed for business use. Computerworld called the marketing of such privatized blockchains without a proper security model "snake oil"; however, others have argued that permis |
https://en.wikipedia.org/wiki/List%20of%20computer%20security%20certifications | In the computer security or Information security fields, there are a number of tracks a professional can take to demonstrate qualifications. Four sources categorizing these, and many other credentials, licenses, and certifications, are:
Schools and universities
Vendor-sponsored credentials (e.g. Microsoft, Cisco)
Association- and organization-sponsored credentials
Governmental (or quasi-governmental) licenses, certifications, and credentials
Quality and acceptance vary worldwide for IT security credentials, from well-known and high-quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser-known credentials and organizations.
In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry-sponsored competitions, including team competitions and contests.
Certifying organizations
Vendor-neutral
Altered Security
ASIS International
APMG International
Blockchain Council
Blockchain Training Alliance
CCC
CertNexus
CompTIA
CREST
Crypto Consortium
Cloud Security Alliance (CSA)
CWNP
CyberDefenders
Cyber Struggle
EC Council
EITCA/IS
eLearnSecurity
EXIN
GAQM
GIAC
HISPI
InfoSec Institute
IBITGQ
TCM Security
The IIA
IAPP
ISACA
ISECOM
ISC2
Linux Professional Institute (LPI)
Lunarline
McAfee Institute
Mile2
Offensive Security
The Open Group
SECO-Institute
SABSA
Star Certification
Zero-Point Security
EC First
Vendor-specific
Alibaba (Cloud)
AWS
Cisco
Check Point
Fortinet
Google
IBM
Jamf
Juniper
Microsoft
Kali
OpenText
Palo Alto
Red Hat
Symantec (since 2012 NortonLifeLock)
List of certifications
Vendor-neutral
Vendor-specific
Microsoft 1 year * : you have t |
https://en.wikipedia.org/wiki/Poisson%20wavelet | In mathematics, in functional analysis, several different wavelets are known by the name Poisson wavelet. In one context, the term "Poisson wavelet" is used to denote a family of wavelets labeled by the set of positive integers, the members of which are associated with the Poisson probability distribution. These wavelets were first defined and studied by Karlene A. Kosanovich, Allan R. Moser and Michael J. Piovoso in 1995–96. In another context, the term refers to a certain wavelet which involves a form of the Poisson integral kernel. In still another context, the terminology is used to describe a family of complex wavelets indexed by positive integers which are connected with the derivatives of the Poisson integral kernel.
Wavelets associated with Poisson probability distribution
Definition
For each positive integer n the Poisson wavelet is defined by
To see the relation between the Poisson wavelet and the Poisson distribution let X be a discrete random variable having the Poisson distribution with parameter (mean) t and, for each non-negative integer n, let Prob(X = n) = pn(t). Then we have
The Poisson wavelet is now given by
Basic properties
is the backward difference of the values of the Poisson distribution:
The "waviness" of the members of this wavelet family follows from
The Fourier transform of is given
The admissibility constant associated with is
Poisson wavelet is not an orthogonal family of wavelets.
Poisson wavelet transform
The Poisson wavelet family can be used to construct the family of Poisson wavelet transforms of functions defined the time domain. Since the Poisson wavelets satisfy the admissibility condition also, functions in the time domain can be reconstructed from their Poisson wavelet transforms using the formula for inverse continuous-time wavelet transforms.
If f(t) is a function in the time domain its n-th Poisson wavelet transform is given by
In the reverse direction, given the n-th Poisson wavelet transform of |
https://en.wikipedia.org/wiki/Movim | Movim (My Open Virtual Identity Manager) is a distributed social network built on top of XMPP, a popular open standards communication protocol. Movim is a free and open source software licensed under the AGPL-3.0-or-later license. It can be accessed using existing XMPP clients and Jabber accounts.
The project was founded by Timothée Jaussoin in 2010. It is maintained by Timothée Jaussoin and Christine Ho.
Concept
Movim is a distributed social networking platform. It builds an abstraction layer for communication and data management while leveraging the strength of the underlying XMPP protocol.
XMPP is a widely used open standards communication platform. Using XMPP allows the service to interface with existing XMPP clients like Conversations, Pidgin, Xabber and Jappix. Users can directly login to Movim using their existing Jabber account.
Movim addresses the privacy concerns related to centralized social networks by allowing users set up their own server (or "pod") to host content; pods can then interact to share status updates, photographs, and other social data. Users can export their data to other pods or offline allowing for greater flexibility.
It allows its users to host their data with a traditional web host, a cloud-based host, an ISP, or a friend. The framework, which is being built on PHP, is a free software and can be experimented with by external developers.
Technology
Movim is developed using PHP, CSS and HTML5. The software initially used the Symfony framework. Due to the complexity of the application and the XMPP connection management, developers rewrote Movim as a standalone application. It now has its own libraries and APIs.
Movim was earlier based on the JAXL library for implementing XMPP. JAXL has been replaced by Moxl (Movim XMPP Library), licensed under the AGPL-3.0-only license, to manage connecting to the server through the XMPP WebSocket protocol. This is claimed to have reduced the code complexity and performance load while providing |
https://en.wikipedia.org/wiki/Symplectic%20category | In mathematics, Weinstein's symplectic category is (roughly) a category whose objects are symplectic manifolds and whose morphisms are canonical relations, inclusions of Lagrangian submanifolds L into , where the superscript minus means minus the given symplectic form (for example, the graph of a symplectomorphism; hence, minus). The notion was introduced by Alan Weinstein, according to whom "Quantization problems suggest that the category of symplectic manifolds and symplectomorphisms be augmented by the inclusion of canonical relations as morphisms." The composition of canonical relations is given by a fiber product.
Strictly speaking, the symplectic category is not a well-defined category (since the composition may not be well-defined) without some transversality conditions.
References
Notes
Sources
Further reading
Victor Guillemin and Shlomo Sternberg, Some problems in integral geometry and some related problems in microlocal analysis, American Journal of Mathematics 101 (1979), 915–955.
See also
Fourier integral operator
Category theory
Symplectic geometry |
https://en.wikipedia.org/wiki/Cord-cutting | In broadcast television, cord-cutting refers to the pattern of viewers, referred to as cord-cutters, cancelling their subscriptions to multichannel television services available over cable or satellite, dropping pay television channels or reducing the number of hours of subscription TV viewed in response to competition from rival media available over the Internet. This content is either free or significantly cheaper than the same content provided via cable.
As a market trend, a growing number of "cord cutters" do not pay for subscription television in favor of some combination of broadband Internet and IPTV, digital video recorders, digital terrestrial television and/or free-to-air satellite television broadcasts. A related group, the cord-nevers, have never used commercial cable for television service, relying on internet sources from the start. A number of purely internet television services, part of the wider IPTV concept, have emerged to cater to these groups.
In the third and fourth quarters of 2018, 1.1 million subscribers in the United States left traditional satellite and cable in favor of internet based streaming television. This decline continued into the first quarter of 2019 as cable and satellite lost 1.4 million subscribers. This trend is occurring globally as cord-cutting varies between 7% and 15% of households across multiple countries in Europe and Asia.
A 2021 study found that cord-cutter households "increase internet usage by 22%, reduce payments to multiple-system operators by 50%, and 16% acquire new over-the-top (OTT) video subscriptions."
Market impact
Parks Associates estimated that in 2008, about 0.9 million American households relied entirely on the Internet for television viewing; by 2017, this figure had increased to 22.2 million. Leichtman Research Group found that six percent of Americans watched at least one show online each week in 2008, a figure that grew to eight percent in 2009. The number of Americans subscribing to cable serv |
https://en.wikipedia.org/wiki/Jawshing%20Arthur%20Liou | Jawshing Arthur Liou (劉肇興; born June 13, 1968) is a digital artist whose work depicts spaces not probable in reality. Working with both lens-based representation and digital post-production, he aims to transform recognizable imagery into realms of transcendent and otherworldly experience.
Life and education
Liou was born in Zhongli District, Taoyuan. He completed a BA in journalism at National Chengchi University in Taipei, Taiwan in 1990, and worked as a video journalist in Taiwan in the early 1990s before emigrating to the United States at age 25. He enrolled in graduate school and received an MFA in Photography and Electronic Intermedia from the University of Florida, Gainesville in 1998. While in Florida, Liou studied photography with the world-renowned Jerry Uelsmann. During this time Liou's work became more personal and organic, and his practice expanded to incorporate video.
Career
Artworks
Liou's works are derived from source footage spanning many types of content. From the human body, to landscapes, to oil paint and food items, Liou's works are filled with rich details. He responds to the personal experiences of spiritual sanctuary, illness, searching, tragedy, and the spectacles in life. Liou's work is primarily based in extremely high resolution and exquisitely layered moving image composites, which he then shapes into large-scale installations for gallery spaces, or screens at experimental film and new media festivals. Stills taken from his video works are also printed and exhibited photographically.
Exhibitions
Liou's videos and prints have been exhibited and screened internationally, including in the United Kingdom, Taiwan, Canada, Japan, Sweden, Italy, Denmark, the Netherlands, Argentina, Brazil, as well as New York, Chicago, Houston, Miami, Atlanta, New Orleans, and Indianapolis. His works have also been featured at the New Media Caucus Showcase, College Art Association National Conference, (2013), SIGGRAPH conference in Vancouver (2011) and the |
https://en.wikipedia.org/wiki/Cardiac%20Pacemakers%2C%20Inc. | Cardiac Pacemakers, Inc.(CPI), doing business as Guidant Cardiac Rhythm Management, manufactured implantable cardiac rhythm management devices, such as pacemakers and defibrillators. It sold microprocessor-controlled insulin pumps and equipment to regulate heart rhythm. It developed therapies to treat irregular heartbeat. The company was founded in 1971 and is based in St. Paul, Minnesota. Cardiac Pacemakers, Inc. is a subsidiary of Boston Scientific Corporation.
Early history
CPI was founded in February 1972 in St. Paul, Minnesota. The first $50,000 capitalization for CPI was raised from a phone booth on the Minneapolis skyway system. They began designing and testing their implantable cardiac pacemaker powered with a new longer-life lithium battery in 1971. The first heart patient to receive a CPI pacemaker emerged from surgery in June 1973. Within two years, the upstart company that challenged Medtronic had sold approximately 8,500 pacemakers.
Medtronic at the time had 65% of the artificial pacemaker market. CPI was the first spin-off from Medtronic. It competition using the world's first lithium-powered pacemaker. Medtronic's market share plummeted to 35%.
Founding partners Anthony Adducci, Manny Villafaña, Jim Baustert, and Art Schwalm, were former Medtronic employees. Lawsuits ensued, all settled out of court.
Acquisition
In early 1978, CPI was concerned about a friendly takeover attempt. Despite impressive sales, the company's stock price had fluctuated wildly the year before, dropping from $33 to $11 per share. Some speculated that the stock was being sold short, while others attributed the price to the natural volatility of high-tech stock. As a one-product company, CPI was susceptible to changing market conditions, and its founders knew they needed to diversify. They considered two options: acquiring other medical device companies or being acquired themselves. They chose the latter.
Several companies expressed interest in acquiring CPI, including 3M, |
https://en.wikipedia.org/wiki/Packaging%20machinery | Packaging machinery is used throughout all packaging operations, involving primary packages to distribution packs. This includes many packaging processes: fabrication, cleaning, filling, sealing, combining, labeling, overwrapping, palletizing.
Overview
Some packaging operations cannot be accomplished without packaging equipment. For example many packages include heat seals to prepare or seal a package. Heat sealers are needed, even in slow labor-intensive operations.
With many industries, the effectiveness of the heat seal is critical to product safety so the heat sealing operation must closely controlled with documented Verification and validation protocols. Food, drug, and medical regulations require consistent seals on packages. Proper equipment is needed.
Automation
Packaging operations can be designed for variable package sizes and forms or for handling only uniform packages, where the machinery or packaging line is adjustable between production runs. Certainly slow manual operations allow workers to be flexible to package variation but also some automated lines can handle significant random variation.
Moving from manual operations, through semi-automatic operations to fully automated packaging lines offers advantages to some packagers. Other than the obvious control of labor costs, quality can be more consistent, and throughput can be optimized.
Efforts at packaging line automation increasingly use programmable logic controllers and robotics.
Large fully automatic packaging lines can involve several pieces of major equipment from different manufactures as well as conveyors and ancillary equipment. Integrating such systems can be a challenge. Often consultants or external engineering firms are used to coordinate large projects.
Choosing packaging machinery
Choosing packaging machinery includes an assessment of technical capabilities, labor requirements, worker safety, maintainability, serviceability, reliability, ability to integrate into the pack |
https://en.wikipedia.org/wiki/Internet%20Digital%20DIOS | The LG Internet Digital DIOS (also known as R-S73CT) is an internet refrigerator released by LG Electronics in June 2000. The technology is the result of a project that started in 1997 and staffed by a team of 55 researchers with a budget cost of 15 billion won (US$49.2 million).
Features
The refrigerator has a TFT-LCD (thin-film transistor-liquid crystal display) screen with TV functionality and Local Area Network (LAN) port. It includes a LCD information window that features electronic pen, data memo, video messaging and schedule management functions and provides information, such as inside temperature, the freshness of stored foods, nutrition information and recipes. Other features are a webcam that is used as a scanner and tracks what is inside the refrigerator, a MP3 player and a three-level automatic icemaker. In addition, the electricity consumption is half the level of conventional refrigerators and the noise level is only 23 decibels.
References
Home appliances
Internet of things
Food storage
Cooling technology
Food preservation
LG Electronics
Refrigerators |
https://en.wikipedia.org/wiki/Dot%20lichen | Dot lichen is a common name for lichens in the genus Arthonia or genus Micarea. "Dotted lichens" are lichens in the genus Bacidia.
Lichenology |
https://en.wikipedia.org/wiki/Dust%20lichen | Dust lichens are lichens in either the genus Chrysothrix or genus Lepraria.
References
Lichenology |
https://en.wikipedia.org/wiki/Density%20matrix%20embedding%20theory | The density matrix embedding theory (DMET) is a numerical technique to solve strongly correlated electronic structure problems. By mapping the system to a fragment plus its entangled quantum bath, the local electron correlation effects on the fragment can be accurately modeled by a post-Hartree–Fock solver. This method has shown high-quality results in 1D- and 2D- Hubbard models,
and in chemical model systems incorporating the fully interacting electronic Hamiltonian, including long-range interactions.
The basis of DMET is the Schmidt decomposition for quantum states, which shows that a given quantum many-body state, with macroscopically many degrees of freedom, K, can be represented exactly by an Impurity model consisting of 2N degrees of freedom for N<<K. Using an existing approximation (here called the effective lattice model) to the many-body state (for example in the mean-field approximation where correlations are neglected), DMET relates this effective lattice model to the impurity model by a one-body local potential, U. This potential is then optimised by requiring that the Density matrix of the impurity model and effective lattice model projected onto the impurity cluster match. When this matching is determined self-consistently, U thus derived in principle exactly models the correlations of the system (since the mapping from the full Hamiltonian to the impurity Hamiltonian is exact).
References
Matrices
Computational physics
Computational chemistry |
https://en.wikipedia.org/wiki/Orban%20%28audio%20processing%29 | Orban is an international company making audio processors for radio, television and Internet broadcasters. It has been operating since founder Bob Orban sold his first product in 1967. The company was originally based in San Francisco, California.
History
The Orban company started in 1967 when Bob Orban built and sold his first product, a stereo synthesizer, to WOR-FM in New York City, a year before Orban earned his master's degree from Stanford University. He teamed with synthesizer pioneers Bernie Krause and Paul Beaver to promote his products. In 1970, Orban established manufacturing and design in San Francisco. Bob Orban partnered with John Delantoni to form Orban Associates in 1975. The company was bought by Harman International in 1989, and the firm moved to nearby San Leandro in 1991. In 2000, Orban was bought by Circuit Research Labs (CRL) who moved manufacturing to Tempe, Arizona, in 2005, keeping the design team in the San Francisco Bay Area. Orban expanded into Germany in 2006 by purchasing Dialog4 System Engineering in Ludwigsburg. Orban USA acquired the company in 2009, based in Arizona. The Orban company was acquired by Daysequerra in 2016, moving manufacturing to New Jersey. In 2020, Orban Labs consolidated divisions and streamlined operations, with Orban Europe GmbH assuming responsibility for all Orban product sales worldwide.
Over its years of trading, the Orban company has released many well-known audio-processing products, including the Orban Optimod 8000, which was the first audio processor to include FM processing and a stereo generator under one package, an innovative idea at the time, as no other processor took into account 75 μs pre-emphasis curve employed by FM, which leads to low average modulation and many peaks.
This was followed by the Orban Optimod 8100, which went on to become the company's most successful product, and the Orban Optimod 8200, the first successful digital signal processor. It was entirely digital and featured a two |
https://en.wikipedia.org/wiki/Heterostasis%20%28cybernetics%29 | Heterostasis is a medical term. It is a neologism coined by Walter Cannon intended to connote an alternative but related meaning to its lexical sibling Homeostasis, which means 'same state'. Any device, organ, system or organism capable of Heterostasis (multistable behavior) can be represented by an abstract state machine composed of a characteristic set of related, interconnected states, linked dynamically by change processes allowing transition between states.
Although the term 'Heterostasis' is an obvious rearrangement (by syntactically substituting the prefix 'Hetero-' for its dichotome 'Homeo-', and likewise swapping the semantic reference, from 'same'/'single' to 'different'/'many'), the endocrinologist Hans Selye is generally credited with its invention. An excellent overview of the two concepts is contained in the Cambridge Handbook of Psychophysiology, Chapter 19. Selye's ideas were used by Gunther et al., in which dimensionless numbers (allometric invariance analysis) were used to investigate the existence of heterostasis in canine cardiovascular systems.
Alternative terminology
The equivalent term Allostasis is used in biological contexts, where state change is analog (continuous), but Heterostasis is sometimes preferred for systems which possess a finite number of distinct (discrete) internal states, such as those containing computational processes. The term Servomechanism is usually used in industrial/mechanical situations (non-biological and non-computational) where it often applies to analog state change, e.g. in a Direct Current Servomotor.
References
Homeostasis
Servomechanisms
Technology neologisms |
https://en.wikipedia.org/wiki/RadView%20Software | RadView Software develops and offers enterprises test automation solution (Radview TestAutomation) and load testing tool and performance monitoring (Radview WebLoad) for web and mobile applications that allows companies to accelerate the development and deployment of their Web and Mobile applications and enables the implementation of their strategies involving their Websites. As of August 26, 2021, it had licensed its software to over 3,500 organizations.
Products
RadView WebLOAD is a load testing and analysis tool that combines performance, scalability, and integrity as a single process for the verification of web applications. It scales to hundreds of thousands of virtual users, making it possible to test massive loads and report bottlenecks, constraints, and weak points within an application.
In 2021, RadView added RadView TestAutomation to its portfolio of products – an AI-based Test Automation solution through its acquisition of Shield34, an AI-based Test Automation company.
Radview TestAutomation is an intelligent Selenium-based platform for fast, easy, and reliable testing of web applications. It accelerates test development, cuts script maintenance work, eliminates redundant test failures, and shortens the time to reproduce and fix failed tests. Radview TestAutomation is fully compatible with Selenium, which allows the execution of any existing Selenium-based scripts immediately with no migration effort.
History
RadView was founded in 1993 by Ilan Kinreich, former co-founder of Mercury Interactive. In 1996, the company launched WebLOAD to meet the need for testing web and mobile applications under load peak conditions. In August 2000, RadView completed an initial public offering, followed by private financing from Fortissimo Capital, Meitav, and others. In April 2021, RadView acquired an AI-based Test Automation company, adding RadView TestAutomation to its portfolio of products.
See also
Load testing
Test automation
Cloud testing
Artificial intell |
https://en.wikipedia.org/wiki/Acct%20URI%20scheme | The acct URI scheme is a proposed internet standard published by the Internet Engineering Task Force, defined by . The purpose of the scheme is to identify, rather than interact, with user accounts hosted by a service provider. This scheme differs from the DNS name which specifies the service provider.
The acct URI was intended to be the single URI scheme that would return information about a person (or possibly a thing) that holds an account at a given domain.
Example
The following is an example of an acct URI:
acct:juliet%40capulet.example@shoppingsite.example
References
External links
List of Uniform Resource Identifier (URI) Schemes
Application layer protocols
Internet Standards
Request for Comments
URI schemes
Semantic Web |
https://en.wikipedia.org/wiki/Kyoto%20Prize%20in%20Basic%20Sciences | The Kyoto Prize in Basic Sciences is awarded once a year by the Inamori Foundation. The Prize is one of three Kyoto Prize categories; the others are the Kyoto Prize in Advanced Technology and the Kyoto Prize in Arts and Philosophy. The first Kyoto Prize in Basic Sciences was awarded to Claude Elwood Shannon, the “Establishment of Mathematical Foundation of Information Theory”. The Prize is widely regarded as the most prestigious award available in fields which are traditionally not honored with a Nobel Prize.
Fields
The Kyoto Prize in Basic Sciences is awarded on a rotating basis to researchers in the following four fields:
Mathematical sciences (including pure mathematics)
Biological sciences (evolution, behavior, ecology, environment)
Earth and planetary sciences, astronomy and astrophysics
Cognitive science/Life sciences (molecular biology, cell biology, neurobiology)
Laureates
Source: Kyoto Prize
Biological sciences
Mathematical sciences
Earth and planetary sciences, astronomy and astrophysics
Life sciences
Cognitive science
See also
Kyoto Prize
Kyoto Prize in Advanced Technology
Kyoto Prize in Arts and Philosophy
List of Kyoto Prize winners
List of astronomy awards
List of biology awards
List of mathematics awards
References
Kyoto Prize
Science and technology awards
Mathematics awards
Biology awards
Astronomy prizes
Space-related awards |
https://en.wikipedia.org/wiki/Dabiq%20%28magazine%29 | {{Infobox magazine
| title = دابقDābiq
| image_file = Dabiq-English-number-one.jpg
| image_size = 200px
| image_caption = The English language edition of Dabiqs first issue "The Return of Khilafah".
| category = Online magazine for propaganda
| firstdate =
| founder = Islamic State
| founded = 2014
| publisher = Al Hayat Media Center
| finaldate =
| finalnumber = 15
| frequency = Variable; on average, one issue was published every 54 days
| country = Syria, Iraq
| based = Raqqa
| language = Arabic, English, German, French
}}Dabiq''' () was an online magazine used by the Islamic State (IS) for Islamic radicalisation and recruitment purposes. It was first published in July 2014 in a number of different languages (including English). Dabiq itself states the magazine is for the purposes of unitarianism, truth-seeking, migration, holy war and community (tawhid, manhaj, hijrah, jihad and jama'ah respectively).
DetailsDabiq was published by IS via the deep web, although it was widely available online through other sources. The first issue carried the date "Ramadan 1435" in the Islamic Hijri calendar. According to the magazine, its name was taken from the town of Dabiq in northern Syria, which is mentioned in a hadith about Armageddon. IS believes Dabiq is where Muslim and infidel forces will eventually face each other, and that after the crusaders' forces are defeated, the apocalypse will begin. Every issue of Dabiq contained a quote attributed to Abu Musab al-Zarqawi: "The spark has been lit here in Iraq, and its heat will continue to by Allah's until it burns the crusader armies in Dabiq".
Harleen K. Gambhir of the Institute for the Study of War considered that while al-Qaeda in the Arabian Peninsula's magazine Inspire focuses on encouraging its readers to carry out lone-wolf attacks on the West, Dabiq was more concerned with establishing the religious legitimacy of IS and its self-proclaimed caliphate, and encouraging Muslims to emigrate there. In its October 2014 i |
https://en.wikipedia.org/wiki/Schoenflies%20displacement | Schoenflies (or Schönflies) displacement (or motion) named after Arthur Moritz Schoenflies is a rigid body motion consisting of linear motion in three dimensional space plus one orientation around an axis with fixed direction. In robotic manipulation this is a common motion as many pick and place operations require moving an object from one plane and placing it with a different orientation onto another parallel plane (e.g., placement of components on a circuit board). These robots are commonly called Schoenflies-motion generators.
Because the SCARA manipulator was one of the first manipulators providing similar motion, this is often referred to as SCARA-type motion. Today, many robotic manipulators, including some with parallel kinematic architecture, are used in industry for applications ranging from the manufacture of electronics to food processing and packaging industry.
See also
Articulated robot
Parallel manipulator
SCARA
Delta robot
References
Industrial robots
Robot kinematics
Robotic manipulation |
https://en.wikipedia.org/wiki/Symmetry%20of%20diatomic%20molecules | Molecular symmetry in physics and chemistry describes the symmetry present in molecules and the classification of molecules according to their symmetry. Molecular symmetry is a fundamental concept in the application of Quantum Mechanics in physics and chemistry, for example it can be used to predict or explain many of a molecule's properties, such as its dipole moment and its allowed spectroscopic transitions (based on selection rules), without doing the exact rigorous calculations (which, in some cases, may not even be possible). To do this it is necessary to classify the states of the molecule using the irreducible representations from the character table of the symmetry group of the molecule. Among all the molecular symmetries, diatomic molecules show some distinct features and they are relatively easier to analyze.
Symmetry and group theory
The physical laws governing a system is generally written as a relation (equations, differential equations, integral equations etc.). An operation on the ingredients of this relation, which keeps the form of the relations invariant is called a symmetry transformation or a symmetry of the system.
These symmetry operations can involve external or internal co-ordinates; giving rise to geometrical or internal symmetries.
These symmetry operations can be global or local; giving rise to global or gauge symmetries.
These symmetry operations can be discrete or continuous.
Symmetry is a fundamentally important concept in quantum mechanics. It can predict conserved quantities and provide quantum numbers. It can predict degeneracies of eigenstates and gives insights about the matrix elements of the Hamiltonian without calculating them. Rather than looking into individual symmetries, it is sometimes more convenient to look into the general relations between the symmetries. It turns out that Group theory is the most efficient way of doing this.
Groups
A group is a mathematical structure (usually denoted in the form (G,*)) consist |
https://en.wikipedia.org/wiki/Future%20Soldier%202030%20Initiative | Future Soldier 2030 Initiative was a US Army program that was launched in 2009 with the mission to research and develop future soldiers' equipments, weapons and body armors. The program investigates various futuristic technologies, including mind boosting drugs, powered exoskeletons and artificially intelligent assistants.
Cancellation
In late 2015, the Future soldier initiative was largely cancelled and shelved by its backers.
See also
Future Soldier
Futures studies
Soldier 2025
Supersoldier
References
Military robotics
Body armor
Prosthetics
Future soldier programs |
https://en.wikipedia.org/wiki/SD%20Blu-ray | SD Blu-ray disc is a Blu-ray disc on which the main feature is standard-definition video instead of the high-definition video found on typical Blu-ray discs.
This is often due to the highest quality version of the feature content only being available in standard definition. This can include content that was shot on standard definition video, animation produced digitally in standard definition, or a television program that was shot on film but edited onto SD video with the original film subsequently lost or impractical to re-transfer. Standard definition content uses much less disc space than a pre-rendered upscale would, reducing the number of discs required, and the manufacturing costs in turn, for longer titles. The "SD on BD" release of Samurai Pizza Cats, for example, contains all 52 episodes on a single disc rather than the 8 DVDs used for the previous release.
Despite being the same resolution, SD video presented on Blu-ray has the potential to look better than the DVD equivalent due to the availability of superior video codecs and higher bitrates. The AVC and VC-1 codecs available for Blu-ray both offer superior picture quality at a given bitrate than the older MPEG2 codec used on DVD (or comparable quality at lower bitrates). Content that might have been over-compressed on DVD with noticeable compression artifacts need not exhibit those artifacts on Blu-ray, resulting in a more faithful and detailed reproduction of the original source master. However, the playback quality of an SD encode can vary depending on the upscaling quality of the viewer's own equipment and will generally not be as good as a pre-upscaled encoding.
Blu-ray Disc titles can combine standard definition video with high definition audio tracks. Lossless audio is more practical and flexible on Blu-ray than on DVD, which only supports lossless PCM in 48 kHz stereo and requires a relatively large amount of data, leaving less storage space available for the video. In contrast, Blu-ray suppor |
https://en.wikipedia.org/wiki/Nicotinamide%20cofactor%20analogues | Nicotinamide cofactor analogues (mNADs) are compounds that mimic the natural nicotinamide adenine dinucleotide cofactors in structure, to explore a mechanism or be used in biocatalysis or other applications.
These nicotinamide cofactor mimics generally retain the nicotinamide moiety with varying substituents.
Background
Oxidoreductases are enzymes that catalyze the transfer of a hydride ion between a substrate and a cofactor, in many cases, particularly those in metabolic reactions, that cofator is a form of nicotinamide adenine dinucleotide. Nicotinamide adenine dinucleotide phosphate (NADPH) is used in anabolic reactions while nicotinamide adenine dinucleotide (NAD+) is used in catabolic reactions.
Analogues
Unlike the human body, typical chemical reactions are unable to regenerate the cofactor for further use. Synthetic cofactors have been researched to solve this problem. The analogues have been synthesized from similar compounds such as 1,4-dihydronicotinamide. These synthetic cofactors have since been used to better understand the mechanisms of reactions especially when it comes to stereospecificity, which may be enhanced by metal ions. Analogues serve as an alternative to traditional regeneration techniques.
References
Cofactors
Biochemistry |
https://en.wikipedia.org/wiki/Olusola%20Bandele%20Oyewole | Olusola Bandele Oyewole (born 30 September 1955) is a Nigerian professor of Food science and technology, educational administrator, and former vice chancellor of Federal University of Agriculture, Abeokuta.
Education
Oyewole attended Odo-Otin Grammar School, Osogbo in Osun State, Nigeria.
He obtained a Bachelor of Science (B.sc) degree in 1981 from Obafemi Awolowo University. He later proceeded to the prestigious University of Ibadan, where he obtained a Master of Science (M.sc) degree in 1984 and a Doctorate (P.hD) degree in Food science and technology.
Life and career
He was born in Kaduna State, Nigeria on 30 September 1955 but hails from Abeokuta, in Ogun State, Nigeria. He began his career in 1985 as a lecturer in the department of Food science and technology at University of Agriculture, Abeokuta, where he later became the head of the department. He is one of the Nigerian academicians that has contributed significantly to education in Nigeria. Prior to his appointment as the vice chancellor of Federal University of Agriculture, Abeokuta, he has served at different levels of academic organization. He was the Project Officer of the World Bank project on Quality Assurance for African Higher Education systems at the Association of African Universities for three years ( 2006 – 2009) at the Association of African Universities.
False allegation
On 25 November 2016, he along with the Pro Chancellor, Senator Adeseye Ogunlewe, and the former Bursar, Mr. Moses Ilesanmi, were wrongly arraigned before an Ogun State High Court in Abeokuta over N800 million fraud allegations against them by the EFCC
But in May 2018, he along with the others accused were discharged and acquitted by the Ogun state high court for lacking merits. The Judge ruled that the allegations were without any merit.
See also
List of vice chancellors in Nigeria
References
1955 births
Living people
Academic staff of the Federal University of Agriculture, Abeokuta
Food scientists
Obafemi Awolowo |
https://en.wikipedia.org/wiki/Smartphone%20ad%20hoc%20network | Smartphone ad hoc networks (SPANs; also smart phone ad hoc networks) are wireless ad hoc networks that use smartphones. Once embedded with ad hoc networking technology, a group of smartphones in close proximity can together create an ad hoc network. Smart phone ad hoc networks use the existing hardware (primarily Bluetooth and Wi-Fi) in commercially available smartphones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. Wi-Fi SPANs use the mechanism behind Wi-Fi ad-hoc mode, which allows phones to talk directly among each other, through a transparent neighbor and route discovery mechanism. SPANs differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop routing (ad hoc routing) and relays and there is no notion of a group leader, so peers can join and leave at will without destroying the network.
Spans are useful under circumstances when the regular network is overloaded or unavailable, such as conferences, music festivals, or natural disasters, and have been popular in Australia and Latin America. They are popular with youth in the United States as a way to save money, as data sent directly from device to device is free.
SPANs started being used in Iraq in 2014 to bypass government restrictions on Internet usage, in the 2014 and 2019–20 Hong Kong protests, in 2015 in anti-government protests in Russia. They have also been used by protestors in Taiwan, Iran, and Syria.
Features
Capable of going off-grid and enabling peer-to-peer communications without relying on cellular carrier networks, wireless access points, or traditional network infrastructure.
Optional Internet access through gateway devices, such as mobile hotspots in the mesh.
Optional stationary or portable infrastructures such as routers, mesh extenders, or other non-phone hardware.
Leverage the devices that people carry on their person and use every day.
Primarily |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.