source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Poribacteria | Poribacteria are a candidate phylum of bacteria originally discovered in the microbiome of marine sponges (Porifera). Poribacteria are Gram-negative primarily aerobic mixotrophs with the ability for oxidative phosphorylation, glycolysis, and autotrophic carbon fixation via the Wood – Ljungdahl pathway. Poribacterial heterotrophy is characterised by an enriched set of glycoside hydrolases, uronic acid degradation, as well as several specific sulfatases. This heterotrophic repertoire of poribacteria was suggested to be involved in the degradation of the extracellular sponge host matrix.
Genome
Single-cell genomics and metagenomic shotgun sequencing approaches reveal a poribacterial genome size range between about 4.2 and 6.5 megabases encoding 4,254 protein-coding genes, of which an unusually high 24% have no homology to known genes. Among the genes of identifiable homology, reconstructed pathways suggest that the poribacterial central metabolism is capable of glycolysis, tricarboxylic acid cycle, pentose phosphate pathways, oxidative phosphorylation, the Entner-Doudoroff pathway, and autotrophic carbon fixation via Wood–Ljungdahl pathway. Further, Poribacteria seem to engage in assimilatory denitrification and ammonia scavenging with potential relevance in nitrogen re-cycling within the sponge holobiont. The poribacterial genome is also reported to contain an unusually high number of phage defence systems including CRISPR-CAS and restriction modification systems.
Cell compartmentalization
Cell compartmentalization into distinct membrane-bound organelles is a universal and defining property of eukaryotes, but had not been observed in prokaryotes other than the Planctomycetota. Poribacteria were previously thought to be distinguished from other microorganisms associated with marine sponges by such a distinctive morphology featuring a large membrane-bound cellular compartment that was suggested to contain DNA. The distinctive poribacterial compartments were originally |
https://en.wikipedia.org/wiki/External%20render | An external render is, in its most basic form, a coating applied to the walls of a building, to provide a protective coating which would prevent rain penetration. It also acts as a decorative finish to enhance the appearance of a building.
History
Rendering is a traditional craft that has evolved over many centuries. Basic rendering began as a method of excluding draughts and rain by using clay to fill in cracks and crevices, referred to as wattle-and-daub. Other renders, based on lime binders were also used over the years. These materials had one significant disadvantage in that they were not very resistant to water.
The introduction of Portland cement meant that durable mortars could be produced and weather resistant renders resulted. Through the years technological advances have aided the development of cutting edge render systems that aim to improve the longevity of a buildings structural capacity.
Manufacture and production
Traditionally, a render would be manufactured on site by a plasterer mixing sand, cement and sometimes lime material together with water to produce his render. This would then be applied to the walls, usually in either two or three coats.
When painting, there is usually a primer, an undercoat and a topcoat. Similarly in renders there may be a stipple coat, then an undercoat (sometimes called a base coat) and finally a final coat (sometimes called a topcoat). The difference is that in renders, the final thickness is 15 mm.
Development of a site mixed render is the factory made render. All the render ingredients are dry blended together in a modern factory, creating a powdered product which can be supplied in bags. When the product is delivered to site the plasterer just needs to mix the product with water and apply it to the wall.
The factory made render has an advantage over the site mixed render in that the composition of the render and all the raw materials are closely controlled and accurately measured. Supplying a render in th |
https://en.wikipedia.org/wiki/Infill%20wall | The infill wall is the supported wall that closes the perimeter of a building constructed with a three-dimensional framework structure (generally made of steel or reinforced concrete). Therefore, the structural frame ensures the bearing function, whereas the infill wall serves to separate inner and outer space, filling up the boxes of the outer frames. The infill wall has the unique static function to bear its own weight. The infill wall is an external vertical opaque type of closure. With respect to other categories of wall, the infill wall differs from the partition that serves to separate two interior spaces, yet also non-load bearing, and from the load bearing wall. The latter performs the same functions of the infill wall, hygro-thermically and acoustically, but performs static functions too.
The use of masonry infill walls, and to some extent veneer walls, especially in reinforced concrete frame structures, is common in many countries. In fact, the use of masonry infill walls offers an economical and durable solution. They are easy to build, attractive for architecture and have a very efficient cost-performance.
Today, masonry enclosures and partition walls are mainly made of clay units, but also aggregate concrete units (dense and lightweight aggregate) and autoclaved aerated concrete units are used. More recently, industry is also trying to introduce wood concrete blocks. Partition walls, made with both vertically and horizontally perforated clay blocks, represent two-thirds of the corresponding market.
Requirements for enclosure systems
Masonry enclosure walls systems, must meet some structural and non-structural requirements.
Structural
The requirements relating structural stability are currently defined and regulated by Eurocode 6 for load bearing masonry structures and by Eurocode 8 for seismic safety. These codes impose requirements for masonry walls, particularly non-collapse (in-plane/out of plane) and damage limitation, providing methods of cal |
https://en.wikipedia.org/wiki/Processor%20consistency | Processor Consistency is one of the consistency models used in the domain of concurrent computing (e.g. in distributed shared memory, distributed transactions, etc.).
A system exhibits Processor Consistency if the order in which other processors see the writes from any individual processor is the same as the order they were issued. Because of this, Processor Consistency is only applicable to systems with multiple processors. It is weaker than the Causal Consistency model because it does not require writes from all processors to be seen in the same order, but stronger than the PRAM Consistency model because it requires Cache Coherence. Another difference between Causal Consistency and Processor Consistency is that Processor Consistency removes the requirements for loads to wait for stores to complete, and for Write Atomicity. Processor Consistency is also stronger than Cache Consistency because Processor Consistency requires all writes by a processor to be seen in order, not just writes to the same memory location.
Examples of Processor Consistency
In Example 1 to the right, the simple system follows Processor Consistency, as all the writes by each processor are seen in the order they occurred in by the other processors, and the transactions are coherent.
Example 2 is not Processor Consistent, as the writes by P1 and P3 are seen out of order by P2 and P4 respectively.
Example 3 is Processor Consistent and not Causally Consistent because in P3: for Causal Consistency it should be since W(x)2 in P1 causally precedes W(y)3 in P2.
Example 4 is not Processor Consistent because in P2: for Processor Consistency it should be because W(x)2 is the latest write to x preceding W(y)3 in P1.
This example Cache Consistent because P2 sees writes to individual memory locations in the order they were issued in P1.
Processor Consistency vs. Sequential Consistency
Processor Consistency (PC) relaxes the ordering between older stores and younger loads that is enforced in Seq |
https://en.wikipedia.org/wiki/Bliss%20point%20%28food%29 | The bliss point is the amount of an ingredient such as salt, sugar or fat which optimizes deliciousness (in the formulation of food products).
Description
Pioneering work on the bliss point was carried out by American market researcher and psychophysicist Howard Moskowitz, known for his successful work in product creation and optimization for foods ranging from spaghetti sauce to soft drinks. Moskowitz used the term, bliss point, to describe "that sensory profile where you like food the most."
The bliss point for salt, sugar, or fat is a range within which perception is that there is neither too much nor too little, but the "just right" amount of saltiness, sweetness, or richness. The human body has evolved to favor foods delivering these tastes: the brain responds with a "reward" in the form of a jolt of endorphins, remembers what we did to get that reward, and makes us want to do it again, an effect run by dopamine, a neurotransmitter. Combinations of sugar, fat, and salt act synergistically, and are more rewarding than any one alone. In food product optimization, the goal is to include two or three of these nutrients at their bliss point.
Applications of the bliss point in the food industry have been criticized for encouraging addiction-like behaviors around eating which may contribute to obesity and other health issues.
See also
Beverage industry
Food industry
Hyperreality
References
Gustation |
https://en.wikipedia.org/wiki/StartupBus | StartupBus is an annual technological startup competition and entrepreneurship boot camp, described as a Hackathon, created by Elias Bizannes in February 2010. The competition is held across a 3-day bus ride where contestants or "buspreneurs" compete to conceive the best technology startup. The competition seeks to attract young top talents to compete, to search for the most innovative startup conceived by the groups, where the winners are determined by a panel of judges. Starting from February 2011, it has gone through many iterations in various continents from 2011 to the present day, with the first in Austin, Texas and subsequently in North America, Europe and Africa.
StartupBus receives an extensive online media coverage through platforms such as BBC News, CNN and technology blogs and news sites such as The Next Web, VentureBeat, WIRED and TechCrunch. Live coverage of the competition was also broadcast through StartupBus.TV via Livestream.
StartupBus held its 9th annual North American competition in New Orleans, Louisiana on April 27, 2018.
History
StartupBus started off as a joke by Elias Bizannes and Bart Jellema on 1 July 2009 to start a hackathon on bus trip from San Francisco to Austin for the SXSW Conference. Eventually, the first bus launched on 1 February 2010, which consisted of 25 strangers on the way to Austin for the SXSW Conference, during which a total of 6 startups were conceived from the time in the bus. Soon after, starting from February 2011, StartupBus was officially an annual technological startup competition.
Concept
Prior to competition
StartupBus' start off location is determined through voting via Facebook and Twitter since 2012, after its evident success.
Buspreneurs are selected based on an invite-only basis after indicating their interest through submission of an application and proposal with an interview there after, if shortlisted. Application are only open to those who specializes in the field of coding, designing and business |
https://en.wikipedia.org/wiki/Multi-fractional%20order%20estimator | The multi-fractional order estimator (MFOE) is a straightforward, practical, and flexible alternative to the Kalman filter (KF) for tracking targets. The MFOE is focused strictly on simple and pragmatic fundamentals along with the integrity of mathematical modeling. Like the KF, the MFOE is based on the least squares method (LSM) invented by Gauss and the orthogonality principle at the center of Kalman's derivation. Optimized, the MFOE yields better accuracy than the KF and subsequent algorithms such as the extended KF and the interacting multiple model (IMM).
The MFOE is an expanded form of the LSM, which effectively includes the KF and ordinary least squares (OLS) as subsets (special cases). OLS is revolutionized in for application in econometrics. The MFOE also intersects with signal processing, estimation theory, economics, finance, statistics, and the method of moments. The MFOE offers two major advances: (1) minimizing the mean squared error (MSE) with fractions of estimated coefficients (useful in target tracking) and (2) describing the effect of deterministic OLS processing of statistical inputs (of value in econometrics)
Description
Consider equally time spaced noisy measurement samples of a target trajectory described by
where n represents both the time samples and the index; the polynomial describing the trajectory is of degree J-1; and is zero mean, stationary, white noise (not necessarily Gaussian) with variance .
Estimating x(t) at time with the MFOE is described by
where the hat (^) denotes an estimate, N is the number of samples in the data window, is the time of the desired estimate, and the data weights are
The are orthogonal polynomial coefficient estimators. (a function detailed in) projects the estimate of the polynomial coefficient to the desired estimation time . The MFOE parameter 0≤≤1 can apply a fraction of the projected coefficient estimate.
The combined terms effectively constitute a novel set of expansion functions with coef |
https://en.wikipedia.org/wiki/Lentisphaera%20araneosa | Lentisphera araneosa is a marine bacteria strain in the bacterial phylum Lentisphaerota. They are able to produce viscous transparent exopolymers and grow attached to each other by the polymer in a three-dimensional configuration. They are part of the natural surface bacterial population in the Atlantic and Pacific oceans. They are less than 1% of the total bacterial community. This species is gram negative, non-motile, non-pigmented, aerobic, chemoheterotrophic, and facultatively oligotrophic sphere-shaped. Its genome has been sequenced.
References
Further reading
External links
Type strain of Lentisphaera araneosa at BacDive - the Bacterial Diversity Metadatabase
Lentisphaerota
Marine biology
Bacteria described in 2004 |
https://en.wikipedia.org/wiki/Hipcamp | Hipcamp is an online marketplace company that offers outdoor stays and camping experiences via a website and mobile app. Private landowners primarily list campsites, glampsites, RV spaces, cabins for users to discover and book based on listing type, location, landscape, activities offered, and amenities. In addition to offering overnight stays on private land, Hipcamp also displays real-time availability, details, user reviews, and user photos of public campgrounds in national parks. Hipcamp was founded in San Francisco, California, United States, in 2013, by CEO Alyssa Ravasio.
History
CEO and founder Ravasio was born in Northern California, and grew up camping and adventuring. In 2012, Ravasio was concerned when it was announced that a number of California state parks were in danger of closing due to lack of funding. She believed that if discovering and booking campsites were easier, the California State Park system would benefit from an increase in traffic and funding. This idea came to a head when Ravasio was attempting to find a nearby campsite on the beach for New Year's Eve in 2013. In her search, she found the online research process tedious and scattered. She eventually found a campground on the coast, but had neglected to bring her surfboard because none of the online data mentioned this particular beach was a popular surfing spot.
Ravasio then enrolled in Dev Bootcamp, a 12-week coding crash course in order to launch her web company idea. In spring 2013, she took a Lean Product Development course through Femgineer and was awarded their GitHub scholarship in June 2013 to fund Hipcamp's launch. After learning to code, Ravasio created the beta version of Hipcamp that went live in June 2013.
Eric Bach, an avid and high-profile backpacker and world traveler, joined Ravasio in July 2013, and was later promoted to co-founder. The two bonded over the outdoors and a desire to solve the "camping problem."
Hipcamp's development continued when, in December 2013 |
https://en.wikipedia.org/wiki/Sublimotion | Sublimotion is a restaurant located in Sant Josep de sa Talaia, Ibiza, Spain run by chef Paco Roncero who utilizes molecular gastronomy in cooking. The restaurant is known for being among the most expensive in the world. As of 2015, the restaurant overtook Urasawa and Per Se to be considered the most expensive with an average price of slightly over €1900 (USD$2,000) per person
Restaurant
The restaurant opened in 2014 at Ibiza’s Hard Rock Hotel and focuses on haute cuisine. The food course consists of 20 food tasting entrees and can seat a maximum of 12 patrons. In 2014, Sublimotion was awarded the prize Best Innovation Food & Beverage.
Controversy
Sublimotion was criticized by Paul Pairet for suspected copying of his restaurant Ultraviolet with similar conception, opened in 2012, especially objecting to Sublimotion being marketed as "the first gastronomic show in the world".
References
External links
Restaurants established in 2014
Molecular gastronomy
2014 establishments in the Balearic Islands |
https://en.wikipedia.org/wiki/Paco%20Roncero | Paco Roncero (born 28 November 1969) is a Spanish chef. He won La Real Academia de Gastronomía's National Gastronomy Award in 2006, and he was a judge on the reality television show MasterChef Colombia. He is the head chef of Sublimotion, known for its high cost yet unique dining experience.
Biography
Paco Roncero began his cooking career vocationally. He trained at the School of Hospitality and Tourism of Madrid, and he spent time working at Zalacaín (three Michelin stars) and Hotel Ritz until 1991, when he joined the staff of the Casino de Madrid and worked for some years with Ferran Adrià. In 1996, he became head chef of the banquets department there, and in 2000 he ascended to the rank of head of kitchen, still under the direction of NH Hoteles, including among his responsibilities running La Terraza del Casino, which earned its first Michelin star two years later, in 2002. Roncero has won prestigious culinary awards, including the Chef L'Avenir Award 2005, awarded by the International Academy of Gastronomy.
Roncero is the creator of the kitchen management software Gestor de Cocina (Kitchen Manager) and is the author of several books on cooking and culinary culture. He has led various workshops on culinary research and additionally has worked as a congressman and teacher in a number of schools. Since October 2013, Roncero has been a member of the technical division of the Comité de Honor (Honor Committee) for Spain's Selección de Cocina Profesional, a select group of renown Spanish chefs who participate in World Association of Chefs' Societies and Bocuse d'Or competitions.
Awards and recognition
La Terraza del Casino has two Michelin stars and three Suns in the Repsol Guide.
2006 National Gastronomy Award
2005 Best Cook of the Future, awarded by the International Academy of Gastronomy.
2005 Award for the best restaurant menu design, granted by the National Academy of Gastronomy
2nd place in the Championship of Young Chefs of the Community of Madrid
|
https://en.wikipedia.org/wiki/Sedanolide | Sedanolide is a tetrahydrophthalide compound with the molecular formula C12H18O2.
It is reported that sedanolide is one of flavor constituents of celery oil from fresh celery.
Isomers
There are 4 stereo isomers.
(3R,3aR)-sedanolide
(3R,3aS)-sedanolide
(3S,3aR)-sedanolide - Also called neocnidilide or trans-sedanolide.
(3S,3aS)-sedanolide
Similar compounds
cnidilide
3-butylhexahydrophthalide
External links
The Sedanolides, John C. Leffingwell, Ph.D., Chirality & Odour Perception
References
Phthalides
Flavors
Celery |
https://en.wikipedia.org/wiki/Signal%20overspill | Signal overspill is the receiving of a broadcast signal outside of its geographical target area. Radio frequencies have no way of obeying geographical borders and licensing arrangements, and the extent of overspill depends on where broadcast transmitters are sited and their power. In addition to traditional transmitters, overspill occurs when the footprint of a satellite is greater than that needed to serve its target audience.
Transmitters located near to international borders may overspill into a large part of a neighbouring country, for example the signal from Republic of Ireland broadcaster 2RN's Clermont Carn site can be picked up in a large swathe of Northern Ireland, and vice versa BBC broadcasts can be picked up in the Republic.
Overspill is usually welcomed by listeners and viewers as it gives them additional choices, when for example the Republic of Ireland began to migrate to a digital platform measures were put in place so that viewers in Northern Ireland could continue to receive the channels they had become used to. However, legally and often politically overspill can be unwelcome. Broadcast rights are sold on a per territory basis, and overspill can be seen as harmful to the commercial and intellectual property rights of creators.
Politically some governments may be wary of their own populace becoming too familiar with the culture of a neighbouring country or territory and feel threatened by it. For example, in China prior to its reforms, television dramas from Hong Kong could be easily picked up in neighbouring Guangdong, and helped spread the desire for greater liberty and material goods in Guangdong. Cross border radio and television reception was an important influence on political developments in Germany during the cold war.
Overspill may have an accidental soft power effect, for example for many years listeners in the Netherlands were able to pick up BBC radio signals, listeners wanting to learn English would tune into the BBC leading to |
https://en.wikipedia.org/wiki/Materials%20oscilloscope | A materials oscilloscope is a time-resolved synchrotron high-energy X-ray technique to study rapid phase composition and microstructural related changes in a polycrystalline sample. Such device has been developed for in-situ studies of specimens undergoing physical thermo-mechanical simulation.
Principle
Two-dimensional diffraction images of a fine synchrotron beam interacting with the specimen are recorded in time frames, such that reflections stemming from individual crystallites of the polycrystalline material can be distinguished. Data treatment is undertaken in a way that diffraction rings are straightened and presented line by line streaked in time. The traces, so-called timelines in azimuthal-angle/time plots resemble to traces of an oscilloscope, giving insight on the processes happening in the material, while undergoing plastic deformation, or heating, or both, These timelines allow to distinguish grain growth or refinement, subgrain formation, slip deformation systems, crystallographic twinning, dynamic recovery, dynamic recrystallization, simultaneously in multiple phases.
History
The development has been undertaken from a project on modern diffraction methods for the investigation of thermo-mechanical processeses, and started with cold deformation of a copper specimen at the ESRF in 2007, followed by hot deformation of zirconium alloy at APS in 2008. Soon afterwards, a series of other materials has been tested and experience with the timeline traces gained. While ESRF and APS played the major role in experimental facilities, the Japanese high-energy synchrotron in the round, SPring-8 followed in 2013 by performing feasibility studies of this kind. Meanwhile, the new PETRA-III synchrotron at DESY built a dedicated beamline for this purpose, opening the Materials Oscilloscope investigations to a larger public. The name materials oscilloscope was introduced in 2013 and used onward upon conferences such as MRS and TMS.
Implementation
Besides setups in m |
https://en.wikipedia.org/wiki/Windows%20Server%202016 | Windows Server 2016 is the eighth release of the Windows Server operating system developed by Microsoft as part of the Windows NT family of operating systems. It was developed alongside Windows 10 and is the successor to the Windows 8.1-based Windows Server 2012 R2. The first early preview version (Technical Preview) became available on October 1, 2014 together with the first technical preview of System Center. Windows Server 2016 was released on September 26, 2016 at Microsoft's Ignite conference and broadly released for retail sale on October 12, 2016. It was succeeded by Windows Server 2019 and the Windows Server Semi-Annual Channel.
Features
Windows Server 2016 has a variety of new features, including
Active Directory Federation Services: It is possible to configure AD FS to authenticate users stored in non-AD directories, such as X.500 compliant Lightweight Directory Access Protocol (LDAP) directories and SQL databases.
Windows Defender: Windows Server Antimalware is installed and enabled by default without the GUI, which is an installable Windows feature.
Remote Desktop Services: Support for OpenGL 4.4 and OpenCL 1.1, performance and stability improvements; MultiPoint Services role (see Windows MultiPoint Server)
Storage Services: Central Storage QoS Policies; Storage Replicas (storage-agnostic, block-level, volume-based, synchronous and asynchronous replication using SMB3 between servers for disaster recovery). Storage Replica replicates blocks instead of files; files can be in use. It's not multi-master, not one-to-many and not transitive. It periodically replicates snapshots, and the replication direction can be changed.
Failover Clustering: Cluster operating system rolling upgrade, Storage Replicas
Web Application Proxy: Preauthentication for HTTP Basic application publishing, wildcard domain publishing of applications, HTTP to HTTPS redirection, Propagation of client IP address to backend applications
IIS 10: Support for HTTP/2
Windows PowerShe |
https://en.wikipedia.org/wiki/Conda%20%28package%20manager%29 | Conda is an open-source, cross-platform, language-agnostic package manager and environment management system. It was originally developed to solve difficult package management challenges faced by Python data scientists, and today is a popular package manager for Python and R.
At first part of Anaconda Python distribution developed by Anaconda Inc., it ended up being useful on its own and for things other than Python, so it was spun out as a separate package, released under the BSD license. The Conda package and environment manager is included in all versions of Anaconda, Miniconda, and Anaconda Repository. Conda is a NumFOCUS affiliated project.
Features
Conda allows users to easily install different versions of binary software packages and any required libraries appropriate for their computing platform. Also, it allows users to switch between package versions and download and install updates from a software repository. Conda is written in the Python programming language, but can manage projects containing code written in any language (e.g., R), including multi-language projects. Conda can install Python,
while similar Python-based cross-platform package managers (such as wheel or pip) cannot.
A popular Conda channel for bioinformatics software is Bioconda, which provides multiple software distributions for computational biology.
Comparison to pip
The big difference between Conda and the pip package manager is in how package dependencies are managed, which is a significant challenge for Python data science and the reason Conda was created. In versions of Pip released prior to version 20.3, Pip installs all Python package dependencies required, whether or not those conflict with other packages previously installed. So a working installation of, for example, Google TensorFlow will suddenly stop working when a user pip-installs a new package that needs a different version of the NumPy library. Everything might still appear to work but the user could get differen |
https://en.wikipedia.org/wiki/Intracellular%20transport | Intracellular transport is the movement of vesicles and substances within a cell. Intracellular transport is required for maintaining homeostasis within the cell by responding to physiological signals. Proteins synthesized in the cytosol are distributed to their respective organelles, according to their specific amino acid’s sorting sequence. Eukaryotic cells transport packets of components to particular intracellular locations by attaching them to molecular motors that haul them along microtubules and actin filaments. Since intracellular transport heavily relies on microtubules for movement, the components of the cytoskeleton play a vital role in trafficking vesicles between organelles and the plasma membrane by providing mechanical support. Through this pathway, it is possible to facilitate the movement of essential molecules such as membrane‐bounded vesicles and organelles, mRNA, and chromosomes.
Intracellular transport is unique to eukaryotic cells because they possess organelles enclosed in membranes that need to be mediated for exchange of cargo to take place. Conversely, in prokaryotic cells, there is no need for this specialized transport mechanism because there are no membranous organelles and compartments to traffic between. Prokaryotes are able to subsist by allowing materials to enter the cell via simple diffusion. Intracellular transport is more specialized than diffusion; it is a multifaceted process which utilizes transport vesicles. Transport vesicles are small structures within the cell consisting of a fluid enclosed by a lipid bilayer that hold cargo. These vesicles will typically execute cargo loading and vesicle budding, vesicle transport, the binding of the vesicle to a target membrane and the fusion of the vesicle membranes to target membrane. To ensure that these vesicles embark in the right direction and to further organize the cell, special motor proteins attach to cargo-filled vesicles and carry them along the cytoskeleton. For example, th |
https://en.wikipedia.org/wiki/Register%20%28air%20and%20heating%29 | A register is a grille with moving parts, capable of being opened and closed and the air flow directed, which is part of a building's heating, ventilation, and air conditioning (HVAC) system. The placement and size of registers is critical to HVAC efficiency. Register dampers are also important, and can serve a safety function.
Register vs. grille
A grille is a perforated cover for an air duct (used for heating, cooling, or ventilation, or a combination thereof). Grilles sometimes have louvers which allow the flow of air to be directed. A register differs from a grille in that a damper is included. However, in practice, the terms "grille", "register", and "return" are often used interchangeably, and care must be taken to determine the meaning of the term used.
Register size and placement
Placement of registers is key in creating an efficient HVAC system. Usually, a register is placed near a window or door, which is where the greatest heat/cooling loss occurs. In contrast, returns (grilled ducts which suck air back into the HVAC system for heating or cooling) are usually placed in the wall or ceiling nearest the center of the building. Generally, in rooms where it is critical to maintain a constant temperature two registers (one placed near the ceiling to deliver cold air, and one placed in the floor to deliver hot air) and two returns (one high, one low) will be used. HVAC systems generally have one register and one return per room.
Registers vary in size with the heating and cooling requirements of the room. If a register is too small, the HVAC system will need to push air through the ducts at a faster rate in order to achieve the desired heating or cooling. This can create rushing sounds which can disturb occupants or interfere with conversation or work (such as sound recording). The velocity of air through a register is usually kept low enough so that it is masked by background noise. (Higher ambient levels of background noise, such as those in restaurants, |
https://en.wikipedia.org/wiki/Exosporium | The exosporium is the outer surface layer of mature spores. In plant spores it is also referred to as the exine. Some bacteria also produce endospores with an exosporium, of which the most commonly studied are Bacillus species, particularly Bacillus cereus and the anthrax-causing bacterium Bacillus anthracis. The exosporium is the portion of the spore that interacts with the environment or host organism, and may contain spore antigens. Exosporium proteins, such as Cot protein, are also discovered related to strains of B. anthracis and B.cereus. This Cot protein share similar sequences with other spore coat proteins, and their putative determinants are believed to include bxpC, lunA, exsA, etc.
In Bacillus anthracis, salt and detergent washing of exosporium fragments can identify proteins that are likely to represent structural or integral exosporium proteins. Seven proteins have been identified in washed exosporium: alanine racemase, inosine hydrolase, ExsF, CotY, ExsY, CotB, and a novel protein, ExsK. CotY, ExsY and CotB are homologues of Bacillus subtilis outer spore coat proteins, but ExsF and ExsK are specific to B. anthracis and other members of the Bacillus cereus group.
The protein ywdL has been identified in B. cereus as important for exosporium formation. In the absence of the ywdL gene, a fragile and easily damaged exosporium is formed, which can be damaged by mechanical disruption such as freeze-thaw cycles. However, ywdL is not required to maintain the internal organization of the exosporium. ΔywdL spores have abnormal germination properties, such as the inability to respond to standard chemical means of inducing germination by treatment with calcium dipicolinate.
References
Microbiology |
https://en.wikipedia.org/wiki/European%20Internet%20Exchange%20Association | The European Internet Exchange Association, or Euro-IX, is an association of European Internet exchange points. It is a community-driven association serving European Internet exchange points and Internet service providers and the general IP community, including politicians, regulators, vendors, and other industry related sectors. Euro-IX is part of the global IX-F Internet eXchange Federation.
Euro-IX forums
See also
List of Internet exchange points
References
External links
Official website
IXP Directory
ASN Database
Recent ASN entries
Most common ASNs
Information technology organizations based in Europe
Internet exchange points in Europe
Internet exchange points in Middleeast
Internet exchange points in Asia
Internet exchange points
Internet-related organizations |
https://en.wikipedia.org/wiki/Latin%20American%20and%20Caribbean%20Internet%20Exchange%20Association | LAC-IX is an association of Internet exchange points in Latin American and Caribbean. LAC-IX is also part of the global IX-F Internet eXchange Federation.
See also
List of Internet exchange points
References
External links
Official website
Internet exchange points in Latin America
Internet exchange points in the Caribbean
Internet-related organizations
Latin America and the Caribbean |
https://en.wikipedia.org/wiki/Interleukin-1%20receptor%20associated%20kinase | The interleukin-1 receptor (IL-1R) associated kinase (IRAK) family plays a crucial role in the protective response to pathogens introduced into the human body by inducing acute inflammation followed by additional adaptive immune responses. IRAKs are essential components of the Interleukin-1 receptor signaling pathway and some Toll-like receptor signaling pathways. Toll-like receptors (TLRs) detect microorganisms by recognizing specific pathogen-associated molecular patterns (PAMPs) and IL-1R family members respond the interleukin-1 (IL-1) family cytokines. These receptors initiate an intracellular signaling cascade through adaptor proteins, primarily, MyD88. This is followed by the activation of IRAKs. TLRs and IL-1R members have a highly conserved amino acid sequence in their cytoplasmic domain called the Toll/Interleukin-1 (TIR) domain. The elicitation of different TLRs/IL-1Rs results in similar signaling cascades due to their homologous TIR motif leading to the activation of mitogen-activated protein kinases (MAPKs) and the IκB kinase (IKK) complex, which initiates a nuclear factor-κB (NF-κB) and AP-1-dependent transcriptional response of pro-inflammatory genes. Understanding the key players and their roles in the TLR/IL-1R pathway is important because the presence of mutations causing the abnormal regulation of Toll/IL-1R signaling leading to a variety of acute inflammatory and autoimmune diseases.
IRAKs are membrane proximal putative serine-threonine kinases. Four IRAK family members have been described in humans: IRAK1, IRAK2, IRAKM, and IRAK4. Two are active kinases, IRAK-1 and IRAK-4, and two are inactive, IRAK-2 and IRAK-M, but all regulate the nuclear factor-κB (NF-κB) and mitogen-activated protein kinase (MAPK) pathways.
Some special/significant features of each IRAK family member:
There is some evidence that IRAK-1 functions in regulating other signaling cascades leading to NF-κB activation. One signaling pathway in particular nerve growth factor (NGF |
https://en.wikipedia.org/wiki/KickStart%20International | KickStart International is a nonprofit social enterprise headquartered in Nairobi, Kenya. KickStart designs and mass-markets climate-smart irrigation technology to smallholder farmers in sub-Saharan Africa, in order to enable a transition from subsistence agriculture to commercial irrigated agriculture. Donor funds are used to design the irrigation pumps, establish supply chains, demonstrate and promote the pumps, and educate farmers on the benefits and methods of small-scale irrigation.
Background
Food supply across sub-Saharan Africa is highly unstable due to its unpredictable climate and water reserves. Only 6% of Africa's cultivated land is irrigated, limiting the volume of crops that can be grown out of season, but increased access to irrigation systems stands to increase food productivity by up to 50%.
History
KickStart was founded in 1991 by Dr. Martin Fisher and Nick Moon. Fisher first went to Kenya on a Fulbright Fellowship to study the Appropriate Technology Movement, where he met Moon, who was in Kenya with the Voluntary Service Overseas (VSO). The two worked closely together on a variety of development interventions, including building rural water systems, constructing schools, and creating job training programs. Out of frustration with traditional development models, Fisher and Moon developed an alternative model for poverty alleviation. Their model was based on a five-step process to develop, launch and promote simple money-making tools that poor entrepreneurs could use to create their own profitable businesses. Together, they founded ApproTEC, which later became KickStart International in 2005.
Starting in 1998, KickStart began developing a line of manually operated irrigation pumps, designed to enable farmers to easily pull water from a river, pond, or shallow well, and pressurize it through a hose pipe to reach their crops. Through this small-scale technological intervention, farmer can harvest their crops year-round, facilitating a transition fr |
https://en.wikipedia.org/wiki/Acetylpropionyl | Acetylpropionyl, also known as acetyl propionyl or 2,3-pentanedione, is an organic compound, specifically a diketone.
Uses for acetylpropionyl include as a:
Solvent for cellulose acetate, paints, inks, and lacquers
Starting material for dyes, pesticides, and drugs
Flavor, with an odor described as "buttery, cheesy, sweet, nutty, fruity, creamy, caramel"
Food production facilities use acetylpropionyl in foods such as cookies, coffee, cereal, and chocolate. It is also found in nicotine containing liquids for vaping, and in flavored cigarettes. It is often used as a flavoring substitute for diacetyl, but may share similar human pulmonary toxicity.
Safety
As a flavoring agent, it is an ingredient in some e-liquid products for use with electronic cigarettes to give a buttery or caramel flavor. There is substantial evidence of the pulmonary toxicity of acetylpropionyl in animals. Rats exposed to acetylpropionyl develop both fibrosis and necrosis of the respiratory tract. Mice exposed to acetylpropionyl demonstrate more bronchial constriction in response to methacholine challenge. It is also known to cause genetic changes in animal brains.
Acetylpropionyl has been used as a substitute for the toxic flavoring chemical diacetyl. However, in one flavoring manufacturing facility that substituted diacetyl for acetylpropionyl, abnormal lung function values were associated with total time spent in production areas. An investigation by NIOSH in 2009 at a facility that used buttermilk flavoring containing acetylpropionyl demonstrated that workers had higher than average reports of shortness of breath, asthma, and restrictive type spirometry defects. Another investigation by NIOSH in 2013 at a flavoring manufacturer that used acetylpropionyl revealed that those workers who spent the most time working with flavoring chemicals, including acetylpropionyl, were more likely to have abnormal lung function as detected by pulmonary function tests.
See also
Diacetyl, a similar dike |
https://en.wikipedia.org/wiki/Hox%20genes%20in%20amphibians%20and%20reptiles | Hox genes play a massive role in some amphibians and reptiles in their ability to regenerate lost limbs, especially HoxA and HoxD genes.
If the processes involved in forming new tissue can be reverse-engineered into humans, it may be possible to heal injuries of the spinal cord or brain, repair damaged organs and reduce scarring and fibrosis after surgery. Despite the large conservation of the Hox genes through evolution, mammals and humans specifically cannot regenerate any of their limbs. This raises a question as to why humans which also possess an analog to these genes cannot regrow and regenerate limbs. Beside the lack of specific growth factor, studies have shown that something as small as base pair differences between amphibian and human Hox analogs play a crucial role in human inability to reproduce limbs. Undifferentiated stem cells and the ability to have polarity in tissues is vital to this process.
Overview
Some amphibians and reptiles have the ability to regenerate limbs, eyes, spinal cords, hearts, intestines, and upper and lower jaws. The Japanese fire belly newt can regenerate its eye lens 18 times over a period of 16 years and retain its structural and functional properties. The cells at the site of the injury have the ability to undifferentiate, reproduce rapidly, and differentiate again to create a new limb or organ.
Hox genes are a group of related genes that control the body plan of an embryo along the head-tail axis. They are responsible for body segment differentiation and express the arrangement of numerous body components during initial embryonic development. Primarily, these sets of genes are utilized during the development of body plans by coding for the transcription factors that trigger production of body segment specific structures. Additionally in most animals, these genes are laid out along the chromosome similar to the order in which they are expressed along the anterior–posterior axis.
Variants of the Hox genes are found almos |
https://en.wikipedia.org/wiki/OpenSimplex%20noise | OpenSimplex noise is an n-dimensional (up to 4D) gradient noise function that was developed in order to overcome the patent-related issues surrounding simplex noise, while likewise avoiding the visually-significant directional artifacts characteristic of Perlin noise.
The algorithm shares numerous similarities with simplex noise, but has two primary differences:
Whereas simplex noise starts with a hypercubic honeycomb and squashes it down the main diagonal in order to form its grid structure, OpenSimplex noise instead swaps the skew and inverse-skew factors and uses a stretched hypercubic honeycomb. The stretched hypercubic honeycomb becomes a simplectic honeycomb after subdivision. This means that 2D Simplex and 2D OpenSimplex both use different orientations of the triangular tiling, but whereas 3D Simplex uses the tetragonal disphenoid honeycomb, 3D OpenSimplex uses the tetrahedral-octahedral honeycomb.
OpenSimplex noise uses a larger kernel size than simplex noise. The result is a smoother appearance at the cost of performance, as additional vertices need to be determined and factored into each evaluation.
OpenSimplex has a variant called "SuperSimplex" (or OpenSimplex2S), which is visually smoother. "OpenSimplex2F" is identical to the original SuperSimplex.
See also
Value noise
Worley noise
References
External links
Blog post introducing OpenSimplex noise
Author's current implementation (OpenSimplex2)
Android library
C implementation
GPU implementation in OpenCL
Heavily-optimized implementation in C#
Noise library for the Rust programming language providing OpenSimplex noise – does not hard code gradient initial values
Python implementation
Noise (graphics) |
https://en.wikipedia.org/wiki/Precambrian%20body%20plans | Until the late 1950s, the Precambrian was not believed to have hosted multicellular organisms. However, with radiometric dating techniques, it has been found that fossils initially found in the Ediacara Hills in Southern Australia date back to the late Precambrian. These fossils are body impressions of organisms shaped like disks, fronds and some with ribbon patterns that were most likely tentacles.
These are the earliest multicellular organisms in Earth's history, despite the fact that unicellularity had been around for a long time before that. The requirements for multicellularity were embedded in the genes of some of these cells, specifically choanoflagellates. These are thought to be the precursors for all animals. They are highly related to sponges (Porifera), which are the simplest multicellular animals.
In order to understand the transition to multicellularity during the Precambrian, it is important to look at the requirements for multicellularity—both biological and environmental.
Precambrian
The Precambrian dates from the beginning of Earth's formation (4.6 billion years ago) to the beginning of the Cambrian Period, 539 million years ago. The Precambrian consists of the Hadean, Archaean and Proterozoic eons. Specifically, this article examines the Ediacaran, when the first multicellular bodies are believed to have arisen, as well as what caused the rise of multicellularity. This time period arose after the Snowball Earth of the mid Neoproterozoic. The "Snowball Earth" was a period of worldwide glaciation, which is believed to have served as a population bottleneck for the subsequent evolution of multicellular organisms.
Precambrian bodies
The Earth formed around 4.6 billion years ago, with unicellular life emerging somewhat later after the cessation of the Late Heavy Bombardment, a period of intense asteroid impacts possibly caused by migration of the gas giant planets to their current orbits, however multicellularity and bodies are a relatively rece |
https://en.wikipedia.org/wiki/Uniregistry | Uniregistry is a large retail domain name registrar and web services provider; as well as a domain name registry that administers generic top-level domains. In February 2013, the related company Uniregistrar Corporation became an ICANN-accredited registrar and launched under the licensed Uniregistry brand name in 2014. Uniregistry's acquisition by GoDaddy was announced in February 2020.
History
Uniregistry Corporation was officially founded in 2012 by Frank Schilling, one of the largest private domain name portfolio owners in the world, and was registered in the Cayman Islands. However, the domain Uniregistry.com was registered six years earlier and the company filed an intent to use the name in the Cayman Islands in 2010. Trademark applications for the "Uniregistry" mark and its stylized "U" logo were filed in 2012. That year, Schilling invested $60 million and applied for 54 new top-level domains. Uniregistrar Corporation became an ICANN-accredited registrar in February 2013. In January 2014, Uniregistry Inc. became a subsidiary in Newport Beach, California to house a West Coast service and support team. The registrar began operating under the licensed Uniregistry brand name in 2014. Uniregistry's registry infrastructure was designed by Internet Systems Consortium (ISC) and Uniregistry subsequently purchased its infrastructure in 2013.
In February 2014, the company launched its first two top-level domains, .sexy and .tattoo. That same month, Uniregistry reached a private agreement with Donuts whereby Uniregistry would own the extensions .audio and .juegos ("games", in Spanish) and Donuts would own .auction, .furniture, and .gratis. The two companies remain at odds over control of the top-level domain .shopping. Uniregistry won .click, .hosting, and .property in April 2014. The company launched the top-level domains .audio, .hiphop, and .juegos in September 2014. It acquired .flowers for an undisclosed amount that same month, beating out Donuts, Minds + Machines, |
https://en.wikipedia.org/wiki/Command%20CICS | Command CICS or Command-CICS is a software product that allows organizations to migrate from "Macro level" CICS to "Command level" CICS without any re-programming so that companies could migrate to later versions of CICS that did not support macro level application programs. The later versions of CICS offered many advantages over previous versions yet tens of thousands of application programs were effectively locked out of the new version unless they were prepared to operate two completely different versions of CICS on the same Operating Systems, creating both operational and maintenance problems. Two different, simultaneous, CICS Licenses were also required.
History
When CICS was first released by IBM in the late 1960s, it used IBM Assembler macros to generate the API system calls to the CICS teleprocessing monitor kernel. This was also true even if programs were written in COBOL or PL/1. Ken Dakin an independent programmer and CEO of APT Ltd. in the U.K., realized that by creating a middleware product, the problem could be solved for almost all situations. Ken Dakin approached IBM to market his product but received no interest at the time, despite the fact that tens of thousands of their clients application programs would need to be converted or rewritten for the new versions of CICS, costing many millions of dollars.
Macro level emulation
Command-CICS intercepted macro level applications via a Link-edited (static) "stub" positioned ahead of the Load module (MVS) or Phase (DOS/VSE). On gaining control from the CICS Program Control Program (PCP), a "pseudo macro level" environment was established consisting of a pointer to a (unique) pseudo "Common System Area" (CSA), a pointer to a Transaction Control Area plus Transaction Work Area (TCA+TWA) and a pseudo Terminal Control Terminal Entry (TCTTE) and other artifacts of a macro level environment. Before passing control directly to the original program entry point, Command-CICS set up the actual general purpose regi |
https://en.wikipedia.org/wiki/ASTM%20smoke%20pump | An ASTM Smoke Pump, or 'spot pump', is an instrument for evaluating the dark particle concentration of a smoke. It is very widely used (2014) by heating engineers to assess emissions, most commonly from fuel-burning appliances such as a wood stoves or oil boilers. It consists of a cylinder of precise size down which a close-fitting piston is pulled, sucking a sample of the smoke through a small nozzle against a filter paper (equivalent to Whatman No2 paper) so that a 'spot' is formed on the paper, the darkness of which can be compared with a standard chart to indicate the concentration of smoke.
Measurements made using the ASTM Smoke Pump form part of statutory requirements in the USA and Germany. Unlike other smoke measurement methods, the ASTM Pump provides a permanent record and sample of the smoke. Because its use takes only a few seconds, it can provide a series of smoke samples over time, allowing boilers etc. to be evaluated over a complete burning cycle and graphic data to be collected.
Because the system depends on comparison rather than an evaluation of the spot colour density, and because many successive samples can be taken, it is considered highly reliable. The ASTM Standard reports that, "The difference between test results obtained by the same operator with the same apparatus under constant operating conditions on identical test material would, in the long run, in the normal and correct operation of the test method, exceed one-half of a smoke spot number for only one case in twenty."
Standard
The device is defined by the American Society for Testing and Materials (ASTM) in their Standard D2156 "Standard Test Method for Smoke Density in Flue Gases", first published in 1965, revised several times, most recently in 2018.
Calibration
The instrument provides the technician with a dark spot on a filter paper strip which is then compared with a standard darkness chart, commonly numbered 0 to 10, 0 being entirely white and 10 being entirely black. The dar |
https://en.wikipedia.org/wiki/Bogdanov%20map | In dynamical systems theory, the Bogdanov map is a chaotic 2D map related to the Bogdanov–Takens bifurcation. It is given by the transformation:
The Bogdanov map is named after Rifkat Bogdanov.
See also
List of chaotic maps
References
DK Arrowsmith, CM Place, An introduction to dynamical systems, Cambridge University Press, 1990.
Arrowsmith, D. K.; Cartwright, J. H. E.; Lansbury, A. N.; and Place, C. M. "The Bogdanov Map: Bifurcations, Mode Locking, and Chaos in a Dissipative System." Int. J. Bifurcation Chaos 3, 803–842, 1993.
Bogdanov, R. "Bifurcations of a Limit Cycle for a Family of Vector Fields on the Plane." Selecta Math. Soviet 1, 373–388, 1981.
External links
Bogdanov map at MathWorld
Chaotic maps
Exactly solvable models
Dynamical systems |
https://en.wikipedia.org/wiki/Robb%20Topolski | Robb Topolski is an American software tester known for his discovery of ISP-led slowdowns in Internet service for certain online activities. His findings and subsequent political activities have contributed to the movement for net neutrality.
In 2007, Topolski, a singer, was seeding his music using peer-to-peer content-sharing programs such as BitComet and BitTorrent. He discovered that the seeding speeds were being slowed and blocked by Comcast. After sharing his findings to the Associated Press, the network management policies of Comcast were later tested and deemed illegal by the FCC, which asked for full disclosure into the network policies of Comcast.
A 2010 documentary, Barbershop Punk, details the experience of Topolski following his discovery and legal actions against Comcast. Topolski is currently an honorary board member of the New America Foundation, a left-wing think tank where he advises on political issues related to the Internet.
References
External links
Net neutrality
Living people
Internet access
American people of Polish descent
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Parrot%20OS | Parrot OS is a Linux distribution based on Debian with a focus on security, privacy, and development.
Core
Parrot is based on Debian's "testing" branch, with a Linux 6.1 kernel. It follows a rolling release development model.
The desktop environment is MATE, and the default display manager is LightDM.
The system is certified to run on devices which have a minimum of 256MB of RAM, and it is suitable for both 32-bit (i386) and 64-bit (amd64) processor architectures. Moreover, the project is available for ARMv7 (armhf) architectures.
In June 2017, the Parrot Team announced they were considering to change from Debian to Devuan, mainly because of problems with systemd.
As of January 21st, 2019, the Parrot team has begun to phase out the development of their 32-bit (i386) ISO.
In August 2020, the Parrot OS officially supports Lightweight Xfce Desktop.
Editions
Parrot has multiple editions that are based upon Debian, with various desktop environments available.
Home Edition
Parrot OS Home Edition is the base edition of Parrot designed for daily use, and it targets regular users who need a "lightweight" system on their laptops or workstations.
The distribution is useful for daily work. Parrot Home also includes programs to chat privately with people, encrypt documents, or browse the internet anonymously. The system can also be used as a starting point to build a system with a custom set of security tools.
Security Edition
Parrot OS Security Edition is designed for penetration testing, vulnerability assessment and mitigation, computer forensics, and anonymous web browsing.
Parrot ARM
Parrot ARM is a lightweight Parrot release for embedded systems. It is currently available for Raspberry Pi devices.
Parrot Architect & IoT
ParrotOS with nothing pre-installed. Install any software and DE with this edition.
Parrot OS tools
There are multiple tools in Parrot OS which are specially designed for Security Researchers and are related to penetration testing. A few |
https://en.wikipedia.org/wiki/Nanophotonic%20coherent%20imager | Nanophotonic coherent imagers (NCI) are image sensors that determine both the appearance and distance of an imaged scene at each pixel. It uses an array of LIDARs (scanning laser beams) to gather this information about size and distance, using an optical concept called coherence (wherein waves of the same frequency align perfectly.)
NCIs can capture 3D images of objects with sufficient accuracy to permit the creation of high resolution replicas using 3D printing technology.
The detection of both intensity and relative delay enables applications such as high-resolution 3D reflective and transmissive imaging as well as index contrast imaging.
Prototype
An NCI using a 4×4 pixel grid of 16 grating couplers operates based on a modified time-domain Frequency Modulated Continuous Wave (FMCW) ranging scheme, where concurrent time-domain measurements of both period and the zero-crossing time of each electrical output of the nanophotonic chip allows the NCI to overcome the resolution limits of frequency domain detection. Each pixel on the chip is an independent interferometer that detects the phase and frequency of the signal in addition to the intensity. Each LIDAR pixel spanned only a few hundred microns such that the area fit in area of 300 microns square.
The prototype achieved 15μm depth resolution and 50μm lateral resolution (limited by the pixel spacing) at up to 0.5-meter range. It was capable of detecting a 1% equivalent refractive index contrast at 1mm thickness.
References
External links
Digital imaging
3D printing
Lidar
Image sensors |
https://en.wikipedia.org/wiki/SCIMP%20protein | SLP65/SLP76, Csk-interacting membrane protein, termed SCIMP, belongs to family of transmembrane adaptor proteins (TRAP) which do not directly associate with a receptor, such as LAT, NTAL, LIME or LAX. SCIMP is expressed in antigen-presenting cells (APC), namely B cells, bone marrow-derived dendritic cells and macrophages.
Structure and interactions
Like other TRAPs, SCIMP has negligible extracellular domain and transmembrane domain followed by intracellular domain, containing several tyrosines and one proline-rich region (PRR). Upon phosphorylation, these tyrosines serve as docking domains for SH2 domains containing proteins. In a contrast to phospho-tyrosines, proline rich regions are generally less susceptible to post-translation modifications and they are rather targets of constitutive interactions with SH3 domains containing proteins. It has been shown that SCIMP interact via SH2 domains with Csk kinase, negative regulator of Src family kinases, but also with Slp65/76 and Grb2 adaptors, which are key pro-signalling soluble adaptor proteins in lymphocyte signalling network. SCIMP is constitutively associated with Lyn kinase via SH3 domain.
Membrane localization
Some of TRAPs are palmitoylated in a border region between transmembrane and intracellular domain. The aliphatic chain of Palmitic acid is anchored to the membrane bilayer and thus influence protein targeting to membrane microdomains. SCIMP is also palmitoylated and is associated with tetraspanin-enriched mircrodomains (TEMs). TEMs, unlike lipid rafts, are based more on protein-protein interactions than lipid-lipid/lipid-protein interactions. One of the resident proteins in TEMs is MHC class II molecule. SCIMP is present in the immunological synapse during antigen presentation between a T cell and an antigen-presenting cell (APC).
In vitro studies and putative function
SCIMP becomes strongly phosphorylated after MHC II stimulation. Studies performed with fusion protein CD25-SCIMP showed its abilit |
https://en.wikipedia.org/wiki/P4%20%28programming%20language%29 | P4 is a programming language for controlling packet forwarding planes in networking devices, such as routers and switches. In contrast to a general purpose language such as C or Python, P4 is a domain-specific language with a number of constructs optimized for network data forwarding. P4 is distributed as open-source, permissively licensed code, and is maintained by the P4 Project (formerly the P4 Language Consortium), a not-for-profit organization hosted by the Open Networking Foundation.
History
P4 was originally described in a 2014 SIGCOMM CCR paper titled “Programming Protocol-Independent Packet Processors”—the alliterative name shortens to "P4". The first P4 workshop took place in June 2015 at Stanford University. An updated specification of P4, called P4-16, was released between 2016 and 2017, replacing P4-14, the original specification of P4.
Design
As the language is specifically targeted at packet forwarding applications, the list of requirements or design choices is somewhat specific to those use cases. The language is designed to meet several goals:
Target independence
P4 programs are designed to be implementation-independent: they can be compiled against many different types of execution machines such as general-purpose CPUs, FPGAs, system(s)-on-chip, network processors, and ASICs. These different types of machines are known as P4 targets, and each target must be provided along with a compiler that maps the P4 source code into a target switch model. The compiler may be embedded in the target device, an externally running software, or even a cloud service. As many of the initial targets for P4 programs were used for simple packet switching it is very common to hear the term "P4 switch" used, even though "P4 target" is more formally correct.
Protocol independence
P4 is designed to be protocol-independent: the language has no native support for even common protocols such as IP, Ethernet, TCP, VxLAN, or MPLS. Instead, the P4 programmer describes the |
https://en.wikipedia.org/wiki/United%20Envirotech | United Envirotech, Ltd. (UE; UEL) is a company focused on environmental engineering and consulting. Founded in 2003 by Lin Yucheng and Goh Ching Wah, the company went public in 2004 and has been listed on the Singapore stock exchange (UENV) and traded in the United States and Germany.
In 2014 and 2015, news reports indicated that investment firms CITIC Group and Kohlberg Kravis Roberts were jointly seeking to acquire a controlling interest in the company through a newly created joint venture company, tentatively named "CKM".
Ownership
, investment company Kohlberg Kravis Roberts owned about 30% of the company based on stock holdings.
, its website stated that its major shareholders were CITIC Environment Investment Co Ltd, and China Reform Fund Envirotech Co., Ltd.
Corporate governance
As of 2015, the chairman and chief executive officer of the company was co-founder Lin Yucheng.
According to its website in 2023, its executive chairman was Sun Lei.
Facilities
In 2015, UEL was reported to be constructing a 100,000 litre/day capacity industrial wastewater treatment facility to serve (and with investment from) a petrochemical industrial park situated at the start of the West–East Gas Pipeline in Luntai County, Xinjiang, China.
References
External links
UnitedEnvirotech.com – official website
Companies established in 2003
2003 establishments in Singapore
Engineering consulting firms
Engineering companies of Singapore
Companies listed on the Singapore Exchange |
https://en.wikipedia.org/wiki/Siege%20%28software%29 | Siege is a Hypertext Transfer Protocol (HTTP) and HTTPS load testing and web server benchmarking utility developed by Jeffrey Fulmer. It was designed to let web developers measure the performance of their code under stress, to see how it will stand up to load on the internet.
It is licensed under the GNU General Public License (GNU GPL) open-source software license, which means it is free to use, modify, and distribute.
Siege can stress a single URL or it can read many URLs into memory and stress them simultaneously. It supports basic authentication, cookies, HTTP, HTTPS and FTP protocols.
Performance measures
Performance measures include elapsed time of the test, the amount of data transferred (including headers), the response time of the server, its transaction rate, its throughput, its concurrency and the number of times it returned OK. These measures are quantified and reported at the end of each run.
This is a sample of siege output:
Ben: $ siege -u shemp.whoohoo.com/Admin.jsp -d1 -r10 -c25
..Siege 2.65 2006/05/11 23:42:16
..Preparing 25 concurrent users for battle.
The server is now under siege...done
Transactions: 250 hits
Elapsed time: 14.67 secs
Data transferred: 448,000 bytes
Response time: 0.43 secs
Transaction rate: 17.04 trans/sec
Throughput: 30538.51 bytes/sec
Concurrency: 7.38
Status code 200: 250
Successful transactions: 250
Failed transactions: 0
Siege has essentially three modes of operation: regression, internet simulation and brute force. It can read a large number of URLs from a configuration file and run through them incrementally (regression) or randomly (internet simulation). Or the user may simply pound a single URL with a runtime configuration at the command line (brute force).
Platform support
Siege was written on Linux and has been successfully ported to AIX, BSD, HP-UX, and Solaris. It compiles on most UNIX System V variants and on most newer BSD systems.
References
External links
Load testing tools
Software test |
https://en.wikipedia.org/wiki/SARL%20%28programming%20language%29 | The SARL programming language is a modular agent-oriented programming language. It aims at providing the fundamental abstractions for dealing with concurrency, distribution, interaction, decentralization, reactivity, autonomy and dynamic reconfiguration.
SARL is platform-independent and agent’s architecture-agnostic. It provides a set of agent-oriented first-class abstractions directly at the language level (see the section on the concepts). Nevertheless, it supports the integration and the mapping of concepts provided by other agent-oriented metamodels. SARL itself exploits this extension mechanism for defining its own extensions (organizational, event-driven, etc.).
An important feature of the SARL programming language is its native support for "holonic multiagent systems," and "recursive agents"
(also called "holons").
Overview
The metamodel of SARL is based on four main concepts: Agent, Capacity, Space and Skill.
The core metamodel of SARL is presented in Figure 1, and the main concepts are colored in light blue.
Each of them are detailed in the following sections, as well as the corresponding piece of SARL code to illustrate their practical use.
In SARL, a Multiagent System (MAS) is a collection of Agents interacting together in shared distributed Spaces.
Each agent has a collection of Capacities describing what it is able to perform, its personal competences.
Each Capacity may then be realized/implemented by various Skills.
For understanding the relationship between the concepts of Capacity and Skill, a parallel can be drawn with concepts of Interface and their implementation classes in object-oriented languages.
To implement specific architectures (like BDI, reasoning, reactive, hybrid, etc.) developers should develop their own capacities and skills providing the agents with new exploitable features.
Despite its open nature, SARL imposes some fundamental principles to be respected by the various Virtual Machines (VM) that wants to support it. First of |
https://en.wikipedia.org/wiki/Local%20criterion%20for%20flatness | In algebra, the local criterion for flatness gives conditions one can check to show flatness of a module.
Statement
Given a commutative ring A, an ideal I and an A-module M, suppose either
A is a Noetherian ring and M is idealwise separated for I: for every ideal , (for example, this is the case when A is a Noetherian local ring, I its maximal ideal and M finitely generated),
or
I is nilpotent.
Then the following are equivalent:
The assumption that “A is a Noetherian ring” is used to invoke the Artin–Rees lemma and can be weakened; see
Proof
Following SGA 1, Exposé IV, we first prove a few lemmas, which are interesting themselves. (See also this blog post by Akhil Mathew for a proof of a special case.)
Proof: The equivalence of the first two can be seen by studying the Tor spectral sequence. Here is a direct proof: if 1. is valid and is an injection of -modules with cokernel C, then, as A-modules,
.
Since and the same for , this proves 2. Conversely, considering where F is B-free, we get:
.
Here, the last map is injective by flatness and that gives us 1. To see the "Moreover" part, if 1. is valid, then and so
By descending induction, this implies 3. The converse is trivial.
Proof: The assumption implies that and so, since tensor product commutes with base extension,
.
For the second part, let denote the exact sequence and . Consider the exact sequence of complexes:
Then (it is so for large and then use descending induction). 3. of Lemma 1 then implies that is flat.
Proof of the main statement.
: If is nilpotent, then, by Lemma 1, and is flat over . Thus, assume that the first assumption is valid. Let be an ideal and we shall show is injective. For an integer , consider the exact sequence
Since by Lemma 1 (note kills ), tensoring the above with , we get:
.
Tensoring with , we also have:
We combine the two to get the exact sequence:
Now, if is in the kernel of , then, a fortiori, is in . By the Artin–Rees lemma, given , we can fin |
https://en.wikipedia.org/wiki/Pierce%20Protein%20Assay | The Pierce Protein Assay is a method of protein quantification. It provides quick estimation of the protein amount in a given sample.
Protocol
The assay is separated into three main parts:
preparation of the Diluted Albumin (BSA) Standards,
preparation of the bicinchoninic acid (BCA) working reagent,
and quantification of proteins (using either test tube or microplate procedure).
Advantages and disadvantages
Advantages
This method is able to detect as low as 25 μg/ml and up to 2000 μg/ml of protein in a 65 ul sample, using standard protocol.
This method may be preferred for samples containing detergents or other reducing agents.
This method has a fast detection speed and low protein-to-protein variability in comparison to the BCA or Coomassie (Bradford) Assays.
This method has a stable end point.
Disadvantages
This method has greater protein-to-protein variability than the BCA Assay.
References
Biochemistry methods
Chemical tests |
https://en.wikipedia.org/wiki/Data%20architect | A data architect is a practitioner of data architecture, a data management discipline concerned with designing, creating, deploying and managing an organization's data architecture. Data architects define how the data will be stored, consumed, integrated and managed by different data entities and IT systems, as well as any applications using or processing that data in some way. It is closely allied with business architecture and is considered to be one of the four domains of enterprise architecture.
Role
According to the Data Management Body of Knowledge, the data architect “provides a standard common business vocabulary, expresses strategic data requirements, outlines high level integrated designs to meet these requirements, and aligns with enterprise strategy and related business architecture.”
According to the Open Group Architecture Framework (TOGAF), a data architect is expected to set data architecture principles, create models of data that enable the implementation of the intended business architecture, create diagrams showing key data entities, and create an inventory of the data needed to implement the architecture vision.
Responsibilities
Organizes data at the macro level.
Organizes data at the micro level, data models, for a new application.
Provides a logical data model as a standard for the golden source and for consuming applications to inherit.
Provides a logical data model with elements and business rules needed for the creation of data quality (DQ) rules.
Skills
Bob Lambert describes the necessary skills of a data architect as follows:
Foundation in systems development: the data architect should understand the system development life cycle; software project management approaches; and requirements, design, and test techniques. The data architect is asked to conceptualize and influence application and interface projects, and therefore must understand what advice to give and where to plug in to steer toward desirable outcomes.
Depth in d |
https://en.wikipedia.org/wiki/List%20of%20structural%20engineering%20software | This is list of notable software packages that implement engineering analysis of structure against applied loads using structural engineering and structural engineering theory.
References
Top 5 Structural Design and Analysis Software That Get the Work Done!, February 2016
Structure Magazine, Software Guide, August 2014
Autodesk Completes Acquisition of Robobat, 1/15/2008
Industry Canada, 2014-03-19
Structural engineering
Civil engineering
Lists of software |
https://en.wikipedia.org/wiki/Bring%20your%20own%20encryption | Bring your own encryption (BYOE), also known as bring your own key (BYOK), is a cloud computing security marketing model that aims to help cloud service customers to use their own encryption software and manage their own encryption keys. BYOE allows cloud service customers to use a virtualized example of their own encryption software together with the business applications they are hosting in the cloud, in order to encrypt their data. The business applications hosted is then set up such that all its data will be processed by the encryption software, which then writes the ciphertext version of the data to the cloud service provider's physical data store, and readily decrypts ciphertext data upon retrieval requests. This gives the enterprise the perceived control of its own keys, and producing its own master key by relying on its own internal hardware security modules (HSM) that is then transmitted to the HSM within the cloud. Data owners may believe their data is secured because the master key lies in the enterprise's HSM and not that of the cloud service provider. When the data is no longer needed (i.e. when cloud users choose to abandon the cloud service), the keys can simply be deleted. That practice is called crypto-shredding.
See also
Cloud computing security
Encryption
Zero trust security model
References
Cloud computing
Cloud infrastructure
Cryptography
Data protection |
https://en.wikipedia.org/wiki/Regeneration%20%28ecology%29 | In ecology regeneration is the ability of an ecosystemspecifically, the environment and its living populationto renew and recover from damage. It is a kind of biological regeneration.
Regeneration refers to ecosystems replenishing what is being eaten, disturbed, or harvested. Regeneration's biggest force is photosynthesis which transforms sun energy and nutrients into plant biomass. Resilience to minor disturbances is one characteristic feature of healthy ecosystems. Following major (lethal) disturbances, such as a fire or pest outbreak in a forest, an immediate return to the previous dynamic equilibrium will not be possible. Instead, pioneering species will occupy, compete for space, and establish themselves in the newly opened habitat. The new growth of seedlings and community assembly process is known as regeneration in ecology. As ecological succession sets in, a forest will slowly regenerate towards its former state within the succession (climax or any intermediate stage), provided that all outer parameters (climate, soil fertility availability of nutrients, animal migration paths, air pollution or the absence thereof, etc.) remain unchanged.
In certain regions like Australia, natural wildfire is a necessary condition for a cyclically stable ecosystem with cyclic regeneration.
Artificial disturbances
While natural disturbances are usually fully compensated by the rules of ecological succession, human interference can significantly alter the regenerative homeostatic faculties of an ecosystem up to a degree that self-healing will not be possible. For regeneration to occur, active restoration must be attempted.
See also
Bush regeneration
Biocapacity
Ecological stability
Ecoscaping
Forest ecology
Net Primary Productivity
Pioneer species
Regenerative design
Regenerative agriculture
Soil regeneration
References
Literature
Ecosystems
Biological systems
Superorganisms
Systems ecology |
https://en.wikipedia.org/wiki/Latterly | Latterly was a quarterly independent magazine and website that publishes longform journalism, news, opinion and photo essays focusing on political and social justice issues globally.
History
The magazine was founded in Bangkok in 2014 and is edited by Ben Wolford. It is notable for launching as a website that "doesn't care about page views." It has since developed, and subsequently discontinued, an iOS app. In May 2016, Latterly became a publication on the Medium platform and joined its revenue beta program. In September, Latterly announced the hiring of former New York Times foreign correspondent Laura Kasinof. Latterly earns revenue through subscriptions and donations. The magazine has partnered with other media companies, including Newsweek, The Week, and Ulyces, to produce and translate articles. Latterly published its first print edition in December 2016. On 24 January 2017, Latterly broke news that U.S. President Donald Trump was planning to issue Executive Order 13769 banning immigrants from specific countries and prioritizing the refugee resettlement of religious minorities. The publication ceased operations and published its last print edition in 2018.
References
External links
2014 establishments in Thailand
Monthly magazines
Online magazines
Magazines established in 2014
Advertising-free magazines
Magazines published in Thailand
Mass media in Bangkok |
https://en.wikipedia.org/wiki/Evolution%3A%20The%20Origin%20of%20Species | Evolution: The Origin of Species is a card game created by Dmitriy Knorre and Sergey Machin in 2010. The game is inspired by the evolutionary biology. It was published by SIA Rightgames RBG. English, French and German game editions were published in 2011.
Two or more players create their own animals, make them evolve and hunt in order to survive.
In 2014, North Star Games published game Evolution. The original authors were part of the design crew.
Rules
Place definition in match
The player with the largest number of victory points at the end of the game is the winner.
The rankings of players in match are determined as follows:
Preparation
The deck is shuffled. Then each player gets 6 cards from the top of the deck to their hands. They roll dice to determine the first player.
The game turn structure
Each turn of the game consists of four phases:
During each phase players act in order moving clockwise. The player who can't or doesn't want to act passes. Each phase ends when nobody can or want to act.
Development phase
This phase consists of several rounds. During the phase players can play their cards by putting them from their hands onto the table. Each player may play each card either as an animal or as a trait of an existing animal. If card is played as a trait, it is put underneath the corresponding animal. Some cards have two traits, but only one trait can be used - the chosen one. No animal can have two identical traits except "fat tissue" trait. Pairwise traits (i.e. "communication") are played only onto a pair of animals. Such cards are placed between the two cards onto which they are played. No duplet of animals can have two identical pairwise traits. However an animal can have several different pairwise traits with another animal.
Food bank determination phase
The amount of food available during this turn is determined at this time. Food bank estimated this way:
Using two game sets or one game set with first expansion:
Using two game set |
https://en.wikipedia.org/wiki/Lightweighting | Lightweighting is a concept in the auto industry about building cars and trucks that are less heavy as a way to achieve better fuel efficiency and handling. Carmakers make parts from carbon fibers, windshields from plastic, and bumpers out of aluminum foam, as ways to lessen vehicle load. Replacing car parts with lighter materials does not lessen overall safety for drivers, according to one view, since many plastics have a high strength-to-weight ratio.
The search to replace car parts with lighter ones is not limited to any one type of part; according to a spokesman for Ford Motor Company, engineers strive for lightweighting "anywhere we can." Using lightweight materials such as plastics can mean less strain on the engine and better gas mileage as well as improved handling. One material sometimes used to reduce weight is carbon fiber. The auto industry has used the term for many years, as the effort to keep making cars lighter is ongoing.
Another common material used for lightweighting is aluminum. Incorporating aluminum has grown continuously to not only meet CAFE standards but to also improve automotive performance. A vehicle with a lower weight has better acceleration, braking and handling. In addition, lighter vehicles can tow and haul larger loads because the engine is not carrying unnecessary weight. A light
weighting magazine finds: "Even though aluminum is light, it does not sacrifice strength. Aluminum body structure is equal in strength to steel and can absorb twice as much crash-induced energy." Many other materials are used to meet lightweighting goals.
References
Automotive technologies
Materials science
Environmental engineering |
https://en.wikipedia.org/wiki/ObjectiveFS | ObjectiveFS is a distributed file system developed by Objective Security Corp. It is a POSIX-compliant file system built with an object store backend. It was initially released with AWS S3 backend, and has later implemented support for Google Cloud Storage and object store devices. It was released for beta in early 2013, and the first version was officially released on August 11, 2013.
Design
ObjectiveFS implements a log structured file system on top of object stores (such as Amazon S3, Google Cloud Storage and other object store devices). It is a POSIX compliant file system and supports features such as dynamic file system size, soft and hard links, unix attributes, extended attributes, Unix timestamps, users and permissions, no limit on file size, atomic renames, atomic file creation, directory renames, read and write anywhere in a file, named pipes, sockets, etc.
It implements client-side encryption and uses the NaCl crypto library, with algorithms like Salsa20 and Poly1305. This approach doesn't have data-dependent branches or data-dependency array indices and protects against cache timing attacks. Data is encrypted before leaving the client, and stays encrypted at rest and in motion.
One main difference between ObjectiveFS and GlusterFS/CephFS is that it offloads the storage cluster management to cloud providers (Amazon/Google).
Usage
ObjectiveFS software runs on the server and talks to the object store using S3 API. The software itself handles the metadata. When there are multiple servers sharing the same files, it handles the negotiation with other sharing servers (also running ObjectiveFS).
Some use cases are scaling web servers, mail servers, content management services (CMS), hybrid cloud., hybrid development environment between laptop and cloud
See also
Distributed file system
List of file systems, the distributed fault-tolerant file system section
Ceph
Lustre
GlusterFS
References
External links
ObjectiveFS official website
Distributed |
https://en.wikipedia.org/wiki/Open%20Platform%20for%20NFV | Open Platform for NFV is a collaborative open source platform for network functions virtualization. It was started by the Linux Foundation in 2014. Member companies include
AT&T, Brocade Communications Systems, China Mobile, Cisco, Dell, Ericsson, Hewlett-Packard, Huawei, IBM, Intel, Juniper Networks, NEC, Nokia Networks, NTT DoCoMo, Orange S.A., Red Hat, Telecom Italia and Vodafone.
References
External links
OPNFV Homepage
Virtual Central Office Homepage
Emerging technologies
Linux Foundation projects
Network architecture |
https://en.wikipedia.org/wiki/Library%20of%20the%20Printed%20Web | Library of the Printed Web is a physical archive devoted to web-to-print artists’ books, zines and other printout matter. Founded by Paul Soulellis in 2013, the collection was acquired by The Museum of Modern Art Library in January 2017. The project has been described as "web culture articulated as printed artifact," an "archive of archives," characterized as an "accumulation of accumulations," much of it printed on demand. Techniques for appropriating web content used by artists in the collection include grabbing, hunting, scraping and performing, detailed by Soulellis in "Search, Compile, Publish," and later referenced by Alessandro Ludovico.
Among the 130 artists included in Library of the Printed Web are Olia Lialina, Mishka Henner, Clement Valla, Karolis Kosas, Lauren Thorson, Cory Arcangel, Silvio Lorusso, Angela Genusa, Jean Keller, Aaron Krach, Joachim Schmid, Benjamin Shaykin, Chantal Zakari, Richard Prince, David Horvitz and Penelope Umbrico. Over 240 works are in the collection. Library of the Printed Web continues to grow through curatorial acquisition and artist contributions.
The collection is used primarily for experimental publishing research, as a way to question issues of copyright, privacy and appropriation by artists on the internet, and as the basis for academic workshops in design and new media.
The project is frequently featured at book fairs, independent publishing conferences and schools, appearing at Miss Read Berlin Art Book Fair, Stadtbibliothek Stuttgart, Merz Akademie, Printed Matter's NY Art Book Fair, Offprint London, Theorizing the Web, Interrupt 3 at Brown University, The Internet Yami-Ichi, Printed Matter's LA Art Book Fair, Odds and Ends Art Book Fair at Yale Art Gallery, Rhode Island School of Design School of Visual Arts, International Center of Photography, School of the Museum of Fine Arts Boston and Offprint Paris. In 2013 Library of the Printed Web was featured at Theorizing the Web and The Book Affair at the opening of t |
https://en.wikipedia.org/wiki/Crossover%20interference | Crossover interference is the term used to refer to the non-random placement of crossovers with respect to each other during meiosis. The term is attributed to Hermann Joseph Muller, who observed that one crossover "interferes with the coincident occurrence of another crossing over in the same pair of chromosomes, and I have accordingly termed this phenomenon ‘interference’."
Meiotic crossovers (COs) appear to be regulated to ensure that COs on the same chromosome are distributed far apart (crossover interference). In the nematode worm Caenorhabditis elegans, meiotic double-strand breaks (DSBs) outnumber COs. Thus not all DSBs are repaired by a recombination process(es) leading to COs. The RTEL-1 protein is required to prevent excess meiotic COs. In rtel-1 mutants meiotic CO recombination is significantly increased and crossover interference appears to be absent. RTEL1 likely acts by promoting synthesis-dependent strand annealing which results in non-crossover (NCO) recombinants instead of COs (see diagram). Normally, about half of all DSBs are converted into NCOs. RTEL-1 appears to enforce meiotic crossover interference by directing the repair of some DSBs towards NCOs rather than COs.
In humans, recombination rate increases with maternal age. Furthermore, placement of female recombination events appears to become increasingly deregulated with maternal age, with a larger fraction of events occurring within closer proximity to each other than would be expected under simple models of crossover interference.
High negative interference
Bacteriophage T4
High negative interference (HNI), in contrast to positive interference, refers to the association of recombination events ordinarily measured over short genomic distances, usually within a gene. Over such short distances there is a positive correlation (negative interference) of recombinational events. As studied in bacteriophage T4 this correlation is greater the shorter the interval between the sites us |
https://en.wikipedia.org/wiki/Free%20presentation | In algebra, a free presentation of a module M over a commutative ring R is an exact sequence of R-modules:
Note the image under g of the standard basis generates M. In particular, if J is finite, then M is a finitely generated module. If I and J are finite sets, then the presentation is called a finite presentation; a module is called finitely presented if it admits a finite presentation.
Since f is a module homomorphism between free modules, it can be visualized as an (infinite) matrix with entries in R and M as its cokernel.
A free presentation always exists: any module is a quotient of a free module: , but then the kernel of g is again a quotient of a free module: . The combination of f and g is a free presentation of M. Now, one can obviously keep "resolving" the kernels in this fashion; the result is called a free resolution. Thus, a free presentation is the early part of the free resolution.
A presentation is useful for computation. For example, since tensoring is right-exact, tensoring the above presentation with a module, say N, gives:
This says that is the cokernel of . If N is also a ring (and hence an R-algebra), then this is the presentation of the N-module ; that is, the presentation extends under base extension.
For left-exact functors, there is for example
Proof: Applying F to a finite presentation results in
This can be trivially extended to
The same thing holds for . Now apply the five lemma.
See also
Coherent module
Finitely related module
Fitting ideal
Quasi-coherent sheaf
References
Eisenbud, David, Commutative Algebra with a View Toward Algebraic Geometry, Graduate Texts in Mathematics, 150, Springer-Verlag, 1995, .
Algebra |
https://en.wikipedia.org/wiki/Big%20q-Legendre%20polynomials | In mathematics, the big q-Legendre polynomials are an orthogonal family of polynomials defined in terms of Heine's basic hypergeometric series as
.
They obey the orthogonality relation
and have the limiting behavior
where is the th Legendre polynomial.
References
Q-analogs
Orthogonal polynomials |
https://en.wikipedia.org/wiki/Universal%20Test%20Specification%20Language | Universal Test Specification Language (UTSL) is a programming language used to describe ASIC tests in a format that leads to an automated translation of the test specification into an executable test code. UTSL is platform independent and provided a code generation interface for a specific platform is available, UTSL code can be translated into the programming language of a specific Automatic Test Equipment (ATE).
History
Increased complexity of ASICs leads to requirements of more complex test programs with longer development times. An automated test program generation could simplify and speed up this process. Teradyne Inc. together with Robert Bosch GmbH agreed to develop a concept and a tool chain for an automated test-program generation. To achieve this a tester independent programming language was required. Hence, UTSL, a programming language that enables detailed description of tests that can be translated into the ATE specific programming language was developed. The ATE manufacturers need to provide a Test Program Generator that uses the UTSL test description as inputs and generates the ATE-specific test code with optimal resource mapping and better practice program code.
As long as the ATE manufacturer provides with the test program generator that can use UTSL as an input the cumbersome task of translating a test program from one platform to another can be significantly simplified. In other words, the task of rewriting of the test programs for a specific platform can be replaced by the automatically generating the code from the UTSL based test specification. Prerequisite for this is that the UTSL description of tests is sufficiently detailed with definition of the test technique as well as the description of all the necessary inputs and outputs.
Being a platform independent programming language, UTSL allows the engineers to read, analyse and modify the tests in the test specification regardless of the ATE at which the testing of the ASIC will be done. UTS |
https://en.wikipedia.org/wiki/Downgrade%20attack | A downgrade attack, also called a bidding-down attack or version rollback attack, is a form of cryptographic attack on a computer system or communications protocol that makes it abandon a high-quality mode of operation (e.g. an encrypted connection) in favor of an older, lower-quality mode of operation (e.g. cleartext) that is typically provided for backward compatibility with older systems. An example of such a flaw was found in OpenSSL that allowed the attacker to negotiate the use of a lower version of TLS between the client and server. This is one of the most common types of downgrade attacks. Opportunistic encryption protocols such as STARTTLS are generally vulnerable to downgrade attacks, as they, by design, fall back to unencrypted communication. Websites which rely on redirects from unencrypted HTTP to encrypted HTTPS can also be vulnerable to downgrade attacks (e.g., sslstrip), as the initial redirect is not protected by encryption.
Attack
Downgrade attacks are often implemented as part of a Man-in-the-middle (MITM) attack, and may be used as a way of enabling a cryptographic attack that might not be possible otherwise. Downgrade attacks have been a consistent problem with the SSL/TLS family of protocols; examples of such attacks include the POODLE attack.
Downgrade attacks in the TLS protocol take many forms. Researchers have classified downgrade attacks with respect to four different vectors, which represents a framework to reason about downgrade attacks as follows:
There are some recent proposals that exploit the concept of prior knowledge to enable TLS clients (e.g. web browsers) to protect sensitive domain names against certain types of downgrade attacks that exploit the clients' support for legacy versions or non-recommended ciphersuites (e.g. those that do not support forward secrecy or authenticated encryption) such as the POODLE, ClientHello fragmentation, and a variant of the DROWN (aka "the special drown") downgrade attacks.
Removing bac |
https://en.wikipedia.org/wiki/Pickled%20fruit | Pickled fruit refers to fruit that has been pickled. Pickling is the process of food preservation by either anaerobic fermentation in brine or immersion in vinegar. Many types of fruit are pickled. Some examples include peaches, apples, crabapples, pears, plums, grapes, currants, tomatoes and olives. Vinegar may also be prepared from fruit, such as apple cider vinegar.
For thousands of years in many parts of the world, pickles have been used as the main method to preserve fruits and other foods. There is evidence that thousands of years ago in Mesopotamia, Egypt, Greece, Rome and China people pickled different foods for preservation. Mayan culture in America used tobacco to preserve food, specifically to make pickled peppers. In ancient times the different cultures used salt that was found naturally and water to make the brine, which they used to pickle foods that cannot be eaten naturally, such as olives and some grains.
Peaches
Pickled peaches may be prepared from medium-sized, non-melting clingstone peaches that are small-seeded. In the United States prior to around 1960, some were prepared from small, unripe freestone peaches. Flavour may be added to the pickle using 'sweet spices', such as cinnamon, cloves and allspice, or savoury pickling spices, such as peppercorns and coriander. Pickled peaches may be used to accompany meats and in salads, and also have other uses.
Pears
Pickled pears may be prepared with sugar, cinnamon, cloves and allspice to add flavor, and may be referred to as spiced pears. They may be prepared from underripe pears. Pickled pears may be used to accompany dishes such as roasts and salads, among others.
Grapes
To pickle grapes it is necessary to use white wine vinegar, water, kosher salt, sugar, cloves garlic, rosemary and dried chili flakes. Garlic, chili flakes and some other species make grapes a unique flavor.
Cantaloupe
The cantaloupe is a summer season fruit, which can be pickled and refrigerated to be able to eat it during |
https://en.wikipedia.org/wiki/Core-and-pod | Core-and-pod design is a computer network design that uses individual pods that hang off the core layer as atomic units.
Within the pod, there may be only a single access layer or a “leaf and spine” network in the pod. The routed core layer serves as a fast and simple way to connect many generations of pods to each other. When the “leaf and spine” network is used within the pod, the core layer can be referred to as the “spine of spines,” since it is the thing that connects the “spines” of the pods. This design then resembles some kind of large and wide tree, with many “branches,” or pods, off the main “trunk,” or core.
This new design differs from the original “three-tier” architecture through the fact that pods can be bundled as a unit. The units can be manipulated as however the staff of the network pleases. The new design also requires the staff of the network to understand the many designs and tools that can be used to manage the different pod iterations.
See also
Network planning and design
Data center network architectures
References
External links
Data Center Networks: Topologies, Architectures and Fault-Tolerance Characteristics
Want a more efficient data center? Maybe it's time you tried a core and pod setup
Network architecture
Networks |
https://en.wikipedia.org/wiki/Truly%20International%20Holdings | Truly Semiconductors Ltd () is a company producing LCD panels and modules, established in 1991 with its headquarters in Hong Kong and manufacturing grounds in Shanwei, Guangdong, China.
Overview
Truly Semiconductors Ltd manufactures LCDs, in panel, module, compact camera modules and touch panels for different industries like Automotive, Medical, Industrial, Defense, telecommunication etc...
References
Display technology companies
Manufacturing companies established in 1991
Companies based in Guangdong
1991 establishments in Hong Kong
Companies listed on the Hong Kong Stock Exchange
Hong Kong brands |
https://en.wikipedia.org/wiki/Chaotic%20cryptology | Chaotic cryptology is the application of mathematical chaos theory to the practice of cryptography, the study or techniques used to privately and securely transmit information with the presence of a third-party or adversary. Since first being investigated by Robert Matthews in 1989, the use of chaos in cryptography has attracted much interest. However, long-standing concerns about its security and implementation speed continue to limit its implementation.
Chaotic cryptology consists of two opposite processes: Chaotic cryptography and Chaotic cryptanalysis. Cryptography refers to encrypting information for secure transmission, whereas cryptanalysis refers to decrypting and deciphering encoded encrypted messages.
In order to use chaos theory efficiently in cryptography, the chaotic maps are implemented such that the entropy generated by the map can produce required Confusion and diffusion. Properties in chaotic systems and cryptographic primitives share unique characteristics that allow for the chaotic systems to be applied to cryptography. If chaotic parameters, as well as cryptographic keys, can be mapped symmetrically or mapped to produce acceptable and functional outputs, it will make it next to impossible for an adversary to find the outputs without any knowledge of the initial values. Since chaotic maps in a real life scenario require a set of numbers that are limited, they may, in fact, have no real purpose in a cryptosystem if the chaotic behavior can be predicted.
One of the most important issues for any cryptographic primitive is the security of the system. However, in numerous cases, chaos-based cryptography algorithms are proved insecure. The main issue in many of the cryptanalyzed algorithms is the inadequacy of the chaotic maps implemented in the system.
Types
Chaos-based cryptography has been divided into two major groups:
Symmetric chaos cryptography, where the same secret key is used by sender and receiver.
Asymmetric chaos cryptography, where |
https://en.wikipedia.org/wiki/Demand-based%20switching | Demand-based switching (DBS) is a computer technology term which refers to the process of using software to optimize the use of hardware resources.
Intel uses demand-based switching power management technology to control power voltage consumption at different states of a computer's operations. DBS routines select a minimum clock speed of the microprocessor appropriate to the workload which specific tasks being performed by the computer place on the processor. This results in less electricity being consumed, both by the processor and by fans counteracting excess heat output.
Intel's processor technology takes advantage of DBS techniques. AMD processors uses a similar process, which the company calls "Power Now".
Demand-based switching is also sometimes used in route-caching routines in local area networks to ensure efficient packet switching and traffic flow. Software DBS algorithms are frequently used in Linux servers.
References
Electrical power control |
https://en.wikipedia.org/wiki/Beatmapping | Beatmapping is the detection of a beat or tempo in music using software. Beatmapping visually lays out/displays the tempo (speed) of music throughout the entirety or portion of a song or music piece. This "mapping" is done with software specifically designed for beatmapping.
Beatmapping software is often a component of music editing and mixing software like Apple's Logic Pro 9 or Mix Meister. A benefit of beatmapping when mixing music is that it keeps the project in time with the metronome tempo which is the steady underlying base beat of the music. Beatmapping software is also often used to help develop a beat to use underlying with a live music performance and "objects" are added to the map of beats that set a change in tempo matching changes in music during the live performance.
References
Acoustics
Acoustics software
Interference
Oscillation
Time–frequency analysis |
https://en.wikipedia.org/wiki/Language%20workbench | A language workbench is a tool or set of tools that enables software development in the language-oriented programming software development paradigm. A language workbench will typically include tools to support the definition, reuse and composition of domain-specific languages together with their integrated development environment. Language workbenches were introduced and popularized by Martin Fowler in 2005.
Language workbenches usually support:
Specification of the language concepts or metamodel
Specification of the editing environments for the domain-specific language
Specification of the execution semantics, e.g. through interpretation and code generation
Examples
Racket is a cross-platform language development workbench including compiler, JIT compiler, IDE and command-line tools designed to accommodate creating both domain-specific languages and completely new languages with facilities to add new notation, constrain constructs, and create IDE tools.
JetBrains MPS is a tool for designing domain-specific languages. It uses projectional editing which allows overcoming the limits of language parsers, and building DSL editors, such as ones with tables and diagrams. It implements language-oriented programming. MPS combines an environment for language definition, a language workbench, and an Integrated Development Environment (IDE) for such languages.
Kermeta is an open-source academic language workbench. The Kermeta workbench uses three different meta-languages: one meta-language for the abstract syntax (aligned with Emof); one for the static semantics (aligned with OCL) and one for the behavioral semantics (called the Kermeta Language itself).
Melange is a language workbench that provides a modular approach for customizing, assembling and integrating multiple domain-specific language (DSL) specifications and implementations.
Spoofax. is an open-source language workbench for generating parsers, type checkers, compilers, interpreters, as well as IDE plugin |
https://en.wikipedia.org/wiki/Identity%20Registration%20Protocol | The Internet Assigned Numbers Authority (IANA) officially assigned TCP port 4604 to the Identity Registration Protocol (IRP) created by Sixscape Communications, Pte. Ltd. The assignment was issued by IANA on 17 March 2014, and is listed in the official IANA resource registry.
There are a very limited number of port numbers, which are assigned by IANA for protocols recognized as viable, complying with current protocol design standards, and not already covered by existing Internet standards. For example, port 25 was assigned to the SMTP email protocol many years ago. This establishes a standard and eliminates conflicts with other protocols. The technical review of IRP was performed by Lars Eggert, the distinguished chair of the Internet Research Task Force.
IRP was created by Lawrence E. Hughes, co-founder and CTO of Sixscape Communications, to allow applications to register their name, email address, UserID, their current IPv6 address and other information with the company's Domain Identity Registry server. IRP also supports all functions of a Public Key Infrastructure and an authenticated Address Registry. Sixscape's Domain Identity Registry server issues and manages X.509 client digital certificates for authentication and secure messaging. The Address Registry feature enables a new connectivity paradigm, called End2End Direct, in which user applications can connect directly to each other rather than via intermediary servers as is common with Client/Server architecture applications common on the older IPv4 Internet.
IRP is a streaming network protocol (TCP-based, connection-oriented). It is a Client/Server design with clearly defined server and client roles and implementations. It is secured with TLS v1.2 using the latest, strongest ciphersuites (e.g. Diffie Hellman Ephemeral for key exchange, AES256 for symmetric encryption and SHA2/384 for message digest). It does server to client authentication using an X.509 Server certificate, similar to web or email servers |
https://en.wikipedia.org/wiki/Direct%20End%20to%20End%20Secure%20Chat%20Protocol | The Internet Assigned Numbers Authority (IANA) officially assigned port 4605 to the SixChat End2End Direct secure messaging protocol created by Sixscape Communications, Pte. Ltd. The assignment was issued by IANA on 11 September 2014, and is listed in the official IANA resource registry at https://www.iana.org/assignments/service-names-port-numbers
There are a very limited number of port numbers, which are assigned by IANA for protocols recognized as viable, complying with current protocol design standards, and not already covered by existing Internet standards. For example, port 25 was assigned to the SMTP email protocol many years ago. This provides a standard port and reduces conflicts with other protocols. The technical review of the SixChat protocol was performed by Lars Eggert, the distinguished chair of the Internet Research Task Force.
The SixChat messaging protocol was created by Lawrence E. Hughes, co-founder and CTO of Sixscape Communications, for their SixChat Internet application software. The new protocol allows two SixChat User Agents to connect directly, perform mutual authentication with X.509 client digital certificates and then securely exchange a symmetric session key (for encryption of all content). SixChat uses the company’s Identity Registration Protocol (IANA assigned port 4604) for address registry and retrieval, as well as Public Key Infrastructure functions (to obtain and use client digital certificates).
End2End Direct messaging requires globally routable ("public") IP addresses for all nodes involved. It is incompatible with NAT (Network Address Translation). It can work within a private internet (a subset of the IPv4 Internet that uses a flat address space with no NAT), or between any two nodes on the public IPv6 Internet. NAT prevents incoming connections, so any user to user messaging must use intermediary servers.
End2End Direct Messaging has several advantages over indirect messaging via intermediary servers. End2End Direct traf |
https://en.wikipedia.org/wiki/Nomad%20Digital | Nomad Digital is an Internet Protocol (IP) Connectivity provider to the transport sector. It deploys wireless broadband connections for trains, metros, trams and buses, including passenger Wi-Fi services and remote condition monitoring for on-board rail components. Headquartered in Newcastle upon Tyne in England, it operates globally.
History
Nomad Digital was founded by Graeme Lowdon and Nigel Wallbridge in 2002. The co-founders met during the sale of the telecommunications business Wide Area Markets to the business-to-business Internet trading company J2C. Lowdon and Wallbridge identified an opportunity to increase bandwidth and hence provide high speed data and Internet connectivity to moving vehicles, such as trains, using the wireless WiMax system, which can operate through tunnels and underground. As well as providing Internet connectivity, wireless connectivity enables streaming of CCTV security images and allows onboard train equipment and systems to be checked in real time.
Initially funded by co-founders Lowdon and Wallbridge, in mid-2006 Amadeus Capital Partners with support from T-Mobile's Venture Fund (T-Venture) invested £8 million venture capital into Nomad. Prior to the acquisition by Alstom the company experienced significant mismanagement in the 3 years leading up to the sale. This resulted in significant financial and contractual losses and the resignations and subsequent departures of a high number of key staff. During this time the long term future of Nomad Digital was in serious doubt.
In December 2016, Alstom announced its acquisition of Nomad Digital for a consideration of €16 million from Amadeus Capital Partners, SEB Venture Capital and Deutsche Telekom. The transaction closed in January 2017.
The sale of Nomad Digital saw the removal of the majority of the management team that had caused the downturn in fortunes and safeguarded the future of business.
Technology
Nomad Digital aggregates a number of communication methods (such as 3G/4 |
https://en.wikipedia.org/wiki/Earthquake%20rotational%20loading | Earthquake rotational loading indicates the excitation of structures due to the torsional and rocking components of seismic actions. Nathan M. Newmark was the first researcher who showed that this type of loading may result in unexpected failure of structures, and its influence should be considered in design codes. There are various phenomena that may lead to the earthquake rotational loading of structures, such as propagation of body wave, surface wave, special rotational wave, block rotation, topographic effect, and soil structure interaction.
One of challenges in structural engineering is defining reliable and accurate loading patterns for design of earthquake-resistant structures based on all components of seismic motions, i.e., three translational and three rotational components. From earthquake engineering perspective, it is usually assumed that the rotational components of strong ground motions are induced due to the spatial variation of the seismic waves and, consequently, these components are estimated in terms of corresponding translational components. When the earthquake shaking can be specified at a single point, the rotational loading of structures can be performed by point rotation, which corresponds with gradient of a point on the ground surface. Most investigations on the earthquake rotational loading, by considering the effect of point rotation on the behavior of structures have shown that the rotational components based on their frequency content can severely change dynamic behavior of structures, which are sensitive to high-frequency motions, such as secondary systems, historical monuments, nuclear reactors, tall asymmetric buildings or irregular frames, slender tower shape structures, bridges, vertically irregular structures, and even ordinary multi-story buildings. The contribution of the rotational components to the seismic response of structures supported on the rigid mat foundation can even be amplified if the effects of the kinematic and dy |
https://en.wikipedia.org/wiki/Cheryl%27s%20Birthday | "Cheryl's Birthday" is a logic puzzle, specifically a knowledge puzzle. The objective is to determine the birthday of a girl named Cheryl using a handful of clues given to her friends Albert and Bernard. Written by Dr Joseph Yeo Boon Wooi of Singapore's National Institute of Education, the question was posed as part of the Singapore and Asian Schools Math Olympiad (SASMO) in 2015, and was first posted online by Singapore television presenter Kenneth Kong. It went viral in a matter of days and also hit national television in all major cities globally. Henry Ong, the Founder of SASMO was interviewed by Singapore's Mediacorp program FIVE hosts Chua En Lai and Yasmine Yonkers.
Origin
An early version of Cheryl's Birthday, with different names and dates, appeared in an online forum in 2006.
The SASMO version of the question was posted on Facebook by Singapore television presenter Kenneth Kong on April 10, 2015, and quickly went viral. Kong posted the puzzle following a debate with his wife, and he incorrectly thought it to be part of a mathematics question for a primary school examination, aimed at 10- to 11-year-old students, although it was actually part of the 2015 Singapore and Asian Schools Math Olympiad meant for 14-year-old students, a fact later acknowledged by Kong. The competition was held on 8 April 2015, with 28,000 participants from Singapore, Thailand, Vietnam, China and the UK. According to SASMO's organisers, the quiz was aimed at the top 40 per cent of the contestants and aimed to "sift out the better students". SASMO's executive director told the BBC that "there was a place for some kind of logical and analytical thinking in the workplace and in our daily lives".
The question
The question is number 24 in a list of 25 questions, and reads as follows:
Albert and Bernard just became friends with Cheryl, and they want to know when her birthday is. Cheryl gives them a list of 10 possible dates:
May 15, May 16, May 19
June 17, June 18
July 14, July 16 |
https://en.wikipedia.org/wiki/Leidy%20Award | The Leidy Award is a medal and prize presented by the Academy of Natural Sciences of Drexel University (formerly the Academy of Natural Sciences of Philadelphia), Philadelphia, Pennsylvania, USA. It was named after US palaeontologist Joseph Leidy. The award was established in 1923 to recognize excellence in "publications, explorations, discoveries or research in the natural sciences", and was intended to be presented every three years. The award consists of a rectangular bronze medal (decorated with a bust depiction of Leidy) and an honorarium which was initially $5000.
Laureates
1925 – Herbert Spencer Jennings
1928 – Henry Augustus Pilsbry
1931 – William Morton Wheeler
1934 – Gerrit Smith Miller Jr.
1937 – Edwin Linton
1940 – Merritt Lyndon Fernald
1943 – Chancey Juday
1946 – Ernst Mayr
1949 – Warren Poppino Spencer
1952 – G. Evelyn Hutchinson
1955 – Herbert Friedmann
1958 – Herbert Barker Hungerford
1961 – Robert Evans Snodgrass
1964 – Carl Leavitt Hubbs
1967 – Donn Eric Rosen
1970 – Arthur Cronquist
1975 – James Bond
1979 – Edward Osborne Wilson
1983 – G. Ledyard Stebbins
1985 – Hampton Carson
1989 – Daniel H. Janzen
1994 – Peter and Rosemary Grant
2006 – David B. Wake
2009 – Dan Otte
2010 – Tim Flannery
2012 – Douglas Futuyma
See also
List of general science and technology awards
List of biology awards
List of earth sciences awards
List of paleontology awards
References
American science and technology awards
Biology awards
Earth sciences awards
Paleontology awards
Drexel University |
https://en.wikipedia.org/wiki/Continuous%20q-Legendre%20polynomials | In mathematics, the continuous q-Legendre polynomials are a family of basic hypergeometric orthogonal polynomials in the basic Askey scheme. give a detailed list of their properties.
Definition
The polynomials are given in terms of basic hypergeometric functions by
References
Orthogonal polynomials
Q-analogs
Special hypergeometric functions |
https://en.wikipedia.org/wiki/Enhanced%20Mitigation%20Experience%20Toolkit | Enhanced Mitigation Experience Toolkit (EMET) is a freeware security toolkit for Microsoft Windows, developed by Microsoft. It provides a unified interface to enable and fine-tune Windows security features. It can be used as an extra layer of defense against malware attacks, after the firewall and before antivirus software.
EMET is targeted mostly at system administrators but the newest version is supported for any Windows user running Windows 7 and later, or Windows Server 2008 R2 and later, with .NET Framework 4.5 installed. The final edition of Windows that supported EMET was version 1703 (Creator's Update). Microsoft then changed the coding in the Fall Creator's Update of Windows 10, so it no longer supported EMET. Older versions can be used on Windows XP, but not all features are available. Version 4.1 was the last version to support Windows XP.
Microsoft has announced that EMET will reach end of life on July 31, 2018. The website for microsoft.com/emet now leads to the Bing Search Site. The successors to EMET are the ProcessMitigations Module—aka Process Mitigation Management Tool—and the Windows Defender Exploit Guard only available on Windows 10 and Windows Server 2016.
References
External links
Windows security software
Microsoft software |
https://en.wikipedia.org/wiki/Pristine%20%28company%29 | Pristine is a VC funded startup that develops software for hands-free smartglasses and smart mobile devices, enabling video collaboration and remote support in industrial and manufacturing environments, field service management and healthcare. Pristine is based in Austin, Texas.
History
Pristine was founded by Kyle Samani and Patrick Kolencherry May 2013, shortly after Google announced the Google Glass program. It raised initial funding through angel investors and began piloting in a major academic medical center. In the months following, Pristine raised over $5 million in venture capital investment from S3 Ventures, Capital Factory, Healthfundr, and others.
Pristine took second place at HATCH Pitch 2013, a start up pitch competition that was held at the George R. Brown Convention Center. At the 2013 DEMO conference, Pristine CEO Kyle Samani demonstrated on stage how an emergency room surgeon would use Google Glass to request support from another physician.
University of California, Irvine participated in a smartglasses pilot in October 2013, and announced in February the following year that they would roll out the technology to outpatient programs and wound care.
Pristine launched the first Google Glass pilot in an emergency room at Rhode Island Hospital in April 2014. It resulted in a peer-reviewed study published in JAMA Dermatology on the use of smartglasses in a healthcare environment.
Partners
Pristine is one of the ten official partners of Google’s Glass at Work program. The company also has formal partnerships with Vuzix, as well as Epson.
Products
Pristine develops software for smartglasses to enable hands free video collaboration, and supports mobile-to-mobile capabilities on web browsers, Android and iOS platforms. Built on WebRTC, MongoDB, Redis, AngularJS, the technology supports secure two-way audio and video, messaging, annotations, and high resolution snapshots.
See also
Augmented reality
Hands-free computing
mHealth
Telehealth
References |
https://en.wikipedia.org/wiki/Client-side%20encryption | Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage service. Client-side encryption features an encryption key that is not available to the service provider, making it difficult or impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of applications whose providers cannot access the data its users have stored, thus offering a high level of privacy. Those applications are sometimes marketed under the misleading term "zero-knowledge".
Details
Client-side encryption seeks to eliminate the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client-side of the exchange. By remaining encrypted through each intermediary server, client-side encryption ensures that data retains privacy from the origin to the destination server. This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for its users.
Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.
Examples of cloud storage services that provide client-side encryption are Tresorit, MEGA and SpiderOak. As of February 2016, neither Apple iCloud, or Dropbox provide client-side encryption. Google Drive and Google Docs released client-side encryption in 2021 thereby becoming the first cloud productivity suite ever and the first major cloud storage platform to productionize client-side encryption. Google followed up by releasing client-side encrypted versions of Google Meet, Google Calendar, and Gmail. As of January 2023, Google Workspace Client-side encryption is not yet ava |
https://en.wikipedia.org/wiki/Racal%20suit | A Racal suit (also known as a Racal space suit) is a protective suit with a powered air-purifying respirator (PAPR). It consists of a plastic suit and a battery-operated blower with HEPA filters that supplies filtered air to a positive-pressure hood (also known as a Racal hood). Racal suits were among the protective suits used by the Aeromedical Isolation Team (AIT) of the United States Army Medical Research Institute of Infectious Diseases to evacuate patients with highly infectious diseases for treatment.
Originally, the hood was manufactured by Racal Health & Safety, a subsidiary of Racal Electronics located in Frederick, Maryland, the same city where AIT was based. The division of Racal responsible for the suit's manufacture later became part of 3M, and the respirator product line was branded as 3M/Racal.
Components
The main body of the protective suit consists of a lightweight coverall made of polyvinyl chloride (PVC), rubber gloves, and rubber boots. Originally, the coverall was in a bright orange color, and the Racal suit was known as an orange suit.
The hood is a separate component from the protective suit. The Racal hood is a type of PAPR consisting of a transparent hood connected to a respirator, which is powered by a rechargeable battery. The respirator has three HEPA filters that are certified to remove 99.7% of particles of 0.03 to 3.0 microns in diameter. The filtered air is supplied at the rate of 170 L/min to the top of the hood under positive pressure for breathing and cooling. The air is forced out through an air exhaust valve at the base of the hood. A two-way radio system is installed inside the hood for communication. The AIT later switched from using transparent bubble hoods to butyl rubber hoods.
Procedures
The main purpose of the AIT was to evacuate a patient from the field to a specialized isolation unit. As part of their procedures, AIT members wore Racal suits while transporting the patients. They were trained to take a bathroom break |
https://en.wikipedia.org/wiki/List%20of%20q-analogs | This is a list of q-analogs in mathematics and related fields.
Algebra
Iwahori–Hecke algebra
Quantum affine algebra
Quantum enveloping algebra
Quantum group
Analysis
Jackson integral
q-derivative
q-difference polynomial
Quantum calculus
Combinatorics
LLT polynomial
q-binomial coefficient
q-Pochhammer symbol
q-Vandermonde identity
Orthogonal polynomials
q-Bessel polynomials
q-Charlier polynomials
q-Hahn polynomials
q-Jacobi polynomials:
Big q-Jacobi polynomials
Continuous q-Jacobi polynomials
Little q-Jacobi polynomials
q-Krawtchouk polynomials
q-Laguerre polynomials
q-Meixner polynomials
q-Meixner–Pollaczek polynomials
q-Racah polynomials
Probability and statistics
Gaussian q-distribution
q-exponential distribution
q-Weibull diribution
Tsallis q-Gaussian
Tsallis entropy
Special functions
Basic hypergeometric series
Elliptic gamma function
Hahn–Exton q-Bessel function
Jackson q-Bessel function
q-exponential
q-gamma function
q-theta function
See also
Lists of mathematics topics
Q-analogs |
https://en.wikipedia.org/wiki/Thermally%20stimulated%20depolarization%20current | Thermally stimulated depolarization current (TSDC) is a scientific technique used to measure dielectric properties of materials. It can be used to measure the thermally stimulated depolarization of molecules within a material. One method of doing so is to place the material between two electrodes, cool the material in the presence of an external electric field, remove the field once a desired temperature has been reached, and measure the current between the electrodes as the material warms. The external electric field must be applied at a sufficiently high temperature to allow the molecular dipoles time to align with the field. Because the dielectric relaxation time increases exponentially on cooling, the polarization caused by their alignment with the field gets "frozen-in". So when the field is removed and the material begins to warm the dipoles begin to "thaw" whereby losing their net alignment and thus the material become depolarized. This depolarization can be measured if the material is sandwiched between two ohmic electrodes and the current is measured on warming. As the material depolarizes, charges are pulled to (or pushed away from) the electrodes which causes a current through the measuring device.
References
Materials science
Scientific techniques |
https://en.wikipedia.org/wiki/BionicKangaroo | BionicKangaroo is a robot model developed and made by Festo in the form of a kangaroo. Applying methods from kinematics, bionics, and biomimetics, Festo's researchers and engineers studied the way kangaroos move, and applied that to the design of a robot that moves in a similar way. The robot saves energy from each jump and applies it to its next jump, much as a real kangaroo does.
See also
Outline of robotics#Robots
References
External links
Robots
Bionics |
https://en.wikipedia.org/wiki/Glitch%20removal | Glitch removal is the elimination of glitchesunnecessary signal transitions without functionalityfrom electronic circuits. Power dissipation of a gate occurs in two ways: static power dissipation and dynamic power dissipation. Glitch power comes under dynamic dissipation in the circuit and is directly proportional to switching activity. Glitch power dissipation is 20%–70% of total power dissipation and hence glitching should be eliminated for low power design.
Switching activity occurs due to signal transitions which are of two types: functional transition and a glitch. Switching power dissipation is directly proportional to the switching activity (α), load capacitance (C), Supply voltage (V), and clock frequency (f) as:
P = α·C·V2·f
Switching activity means transition to different levels. Glitches are dependent on signal transitions and more glitches results in higher power dissipation. As per above equation switching power dissipation can be controlled by controlling switching activity (α), voltage scaling etc.
Glitch reduction techniques
Reducing switching activity
As discussed, more transition results in more glitches and hence more power dissipation. To minimize glitch occurrence, switching activity should be minimized. For example, Gray code could be used in counters instead of binary code, since every increment in Gray code only flips one bit.
Gate freezing
Gate freezing minimizes power dissipation by eliminating glitching. It relies on the availability of modified standard library cells such as the so-called F-Gate. This method consists of transforming high glitch gates into modified devices which filter out the glitches when a control signal is applied. When the control signal is high, the F-Gate operates as normal but when the control signal is low, the gate output is disconnected from the ground. As a result it can never be discharged to logic 0 and glitches are prevented.
Hazard filtering and balanced path delay
Hazards in digital circuits |
https://en.wikipedia.org/wiki/CMAQ | CMAQ is an acronym for the Community Multiscale Air Quality Model, a sophisticated three-dimensional Eulerian grid chemical transport model developed by the US EPA for studying air pollution from local to hemispheric scales. EPA and state environmental agencies use CMAQ to develop and assess implementation actions needed to attain National Ambient Air Quality Standards (NAAQS) defined under the Clean Air Act. CMAQ simulates air pollutants of concern—including ozone, particulate matter (PM), and a variety of air toxics — to optimize air quality management. Deposition values from CMAQ are used to assess ecosystem impacts such as eutrophication and acidification from air pollutants. In addition, the National Weather Service uses CMAQ to produce twice-daily forecast guidance for ozone air quality across the U.S. CMAQ unites the modeling of meteorology, emissions, and chemistry to simulate the fate of air pollutants under varying atmospheric conditions. Other kinds of models—including crop management and hydrology models— can be linked with the CMAQ simulations, as needed, to simulate pollution more holistically across environmental media.
CMAQ is developed and maintained by scientists in EPA’s Office of Research and Development, and new versions of the software are made publicly available through regular public releases.
CMAQ may also refer to the Congestion Mitigation and Air Quality Improvement Program, a program of the United States Department of Transportation.
References
Atmospheric dispersion modeling
Air pollution
Environmental engineering
Industrial emissions control |
https://en.wikipedia.org/wiki/Inoculation | Inoculation is the act of implanting a pathogen or other microbe or virus into a person or other organism. It is a method of artificially inducing immunity against various infectious diseases. The term "inoculation" is also used more generally to refer to intentionally depositing microbes into any growth medium, as into a Petri dish used to culture the microbe, or into food ingredients for making cultured foods such as yoghurt and fermented beverages such as beer and wine. This article is primarily about the use of inoculation for producing immunity against infection. Inoculation has been used to eradicate smallpox and to markedly reduce other infectious diseases such as polio. Although the terms "inoculation", "vaccination", and "immunization" are often used interchangeably, there are important differences. Inoculation is the act of implanting a pathogen or microbe into a person or other recipient; vaccination is the act of implanting or giving someone a vaccine specifically; and immunization is the development of disease resistance that results from the immune system's response to a vaccine or natural infection.
Terminology
Until the early 1800s inoculation referred only to variolation (from the Latin word variola = smallpox), the predecessor to the smallpox vaccine. The smallpox vaccine, introduced by Edward Jenner in 1796, was called cowpox inoculation or vaccine inoculation (from Latin vacca = cow). Smallpox inoculation continued to be called variolation, whereas cowpox inoculation was called vaccination (from Jenner's term variolae vaccinae = smallpox of the cow). Louis Pasteur proposed in 1861 to extend the terms vaccine and vaccination to include the new protective procedures being developed. Immunization refers to the use of vaccines as well as the use of antitoxin, which contains pre-formed antibodies such as to diphtheria or tetanus exotoxins. In nontechnical usage inoculation is now more or less synonymous with protective injections and other methods of |
https://en.wikipedia.org/wiki/RethinkDB | RethinkDB is a free and open-source, distributed document-oriented database originally created by the company of the same name. The database stores JSON documents with dynamic schemas, and is designed to facilitate pushing real-time updates for query results to applications. Initially seed funded by Y Combinator in June 2009, the company announced in October 2016 that it had been unable to build a sustainable business and its products would in future be entirely open-sourced without commercial support.
The CNCF (Cloud Native Computing Foundation) then purchased the rights to the RethinkDB source code and contributed it to the Linux Foundation.
History
RethinkDB was founded in 2009, and open-sourced at version 1.2 in 2012. In 2015, RethinkDB released version 2.0, announcing that it was production-ready. On October 5, 2016, the company announced it was shutting down, transitioning members of its engineering team to Stripe, and would no longer offer production support. On February 6, 2017, The Cloud Native Computing Foundation purchased the rights to the source code and relicensed it under the Apache License 2.0.
ReQL
RethinkDB uses the ReQL query language, an internal (embedded) domain-specific language officially available for Ruby, Python, Java and JavaScript (including Node.js).
It has support for table joins, groupings, aggregations and functions.
There are also unofficial, community-supported drivers for other languages, including C#, Clojure, Erlang, Go, Haskell, Lua, and PHP.
Popularity
According to the DB-Engines ranking, as of February 2016, it was the 46th most popular database.
Comparison with other document databases
A distinguishing feature of RethinkDB is the first class support for real-time change feeds. A change query returns a cursor which allows blocking or non-blocking requests to keep track of a potentially infinite stream of real-time changes.
Fork
Due to seeming stagnation, RethinkDB was forked by members of the community on May 17, 2018 |
https://en.wikipedia.org/wiki/Samsung%20Electronics | Samsung Electronics Co., Ltd. (, sometimes shortened to SEC and stylized as SΛMSUNG) is a South Korean multinational major appliance and consumer electronics corporation headquartered in Yeongtong-gu, Suwon, South Korea. It is currently the pinnacle of the Samsung chaebol, accounting for 70% of the group's revenue in 2012. However, Lee Jae-yong has stated his intentions on making sure his children would not inherit significant Samsung Electronics positions, which would significantly change the company's inner workings.
Samsung Electronics has played a key role in the group's corporate governance due to cross ownership. Samsung Electronics has assembly plants and sales networks in 74 countries and employs around 290,000 people. It is majority-owned by foreign investors. Samsung Electronics is the world's second-largest technology company by revenue, and its market capitalization stood at US$520.65 billion, the 12th largest in the world.
Samsung is the world's largest manufacturer of mobile phones and smartphones since 2011, and is best known for its Samsung Galaxy brand. It has developed 5G capable smartphones including the Galaxy S23, and foldable phones including the Galaxy Z Fold 5. The company is a major vendor of tablet computers, particularly its Android-powered Samsung Galaxy Tab collection, and is regarded for developing the phablet market with the Samsung Galaxy Note family of devices. Samsung has also been the world's largest television manufacturer since 2006.
The company is a major manufacturer of electronic components such as lithium-ion batteries, semiconductors, image sensors, camera modules, and displays for clients such as Apple, Sony, HTC, and Nokia. It is also the world's largest Semiconductor memory manufacturer and, from 2017 to 2018, had been the largest semiconductor company in the world, briefly dethroning Intel, the decades-long champion.
In 2012, Kwon Oh-hyun was appointed the company's CEO. He announced in October 2017 that he would re |
https://en.wikipedia.org/wiki/Zen%20of%20Python | The Zen of Python is a collection of 19 "guiding principles" for writing computer programs that influence the design of the Python programming language. Software engineer Tim Peters wrote this set of principles and posted it on the Python mailing list in 1999. Peters's list left open a 20th principle "for Guido to fill in", referring to Guido van Rossum, the original author of the Python language. The vacancy for a 20th principle has not been filled.
Peters's Zen of Python was included as entry number 20 in the language's official Python Enhancement Proposals and was released into the public domain. It is also included as an Easter egg in the Python interpreter, where it can be displayed by entering import this.
In May 2020, Barry Warsaw (developer of GNU Mailman) wrote the lyrics to music.
Principles
The principles are listed as follows:
See also
Convention over configuration
There's more than one way to do it
Notes
References
External links
PEP20 on Python website
2004 essays
Essays about computing
Programming principles
Python (programming language) |
https://en.wikipedia.org/wiki/Circumcenter%20of%20mass | In geometry, the circumcenter of mass is a center associated with a polygon which shares many of the properties of the center of mass. More generally, the circumcenter of mass may be defined for simplicial polytopes and also in the spherical and hyperbolic geometries.
In the special case when the polytope is a quadrilateral or hexagon, the circumcenter of mass has been called the "quasicircumcenter" and has been used to define an Euler line of a quadrilateral. The circumcenter of mass allows us to define an Euler line for simplicial polytopes.
Definition in the plane
Let be an oriented polygon (with vertices counted countercyclically) in the plane with vertices and let be an arbitrary point not lying on the sides (or their extensions). Consider the triangulation of by the oriented triangles (the index is viewed modulo ). Associate with each of these triangles its circumcenter with weight equal to its oriented area (positive if its sequence of vertices is countercyclical; negative otherwise). The circumcenter of mass of is the center of mass of these weighted circumcenters. The result is independent of the choice of point .
Properties
In the special case when the polygon is cyclic, the circumcenter of mass coincides with the circumcenter.
The circumcenter of mass satisfies an analog of Archimedes' Lemma, which states that if a polygon is decomposed into two smaller polygons, then the circumcenter of mass of that polygon is a weighted sum of the circumcenters of mass of the two smaller polygons. As a consequence, any triangulation with nondegenerate triangles may be used to define the circumcenter of mass.
For an equilateral polygon, the circumcenter of mass and center of mass coincide. More generally, the circumcenter of mass and center of mass coincide for a simplicial polytope for which each face has the sum of squares of its edges a constant.
The circumcenter of mass is invariant under the operation of "recutting" of polygons. and the discrete bicyc |
https://en.wikipedia.org/wiki/Procedural%20design | In software design, Procedural Design (SPD) converts and translates structural elements into procedural explanations. SPD starts straight after data design and architectural design. This has now been mostly abandoned mostly due to the rise in preference of Object Oriented Programming and design patterns.
References
Computer programming |
https://en.wikipedia.org/wiki/Gastroileal%20reflex | The gastroileal reflex is one of the three extrinsic reflexes of the gastrointestinal tract, the other two being the gastrocolic reflex and the enterogastric reflex. The gastroileal reflex is stimulated by the presence of food in the stomach and gastric peristalsis. Initiation of the reflex causes peristalsis in the ileum and the opening of the ileocecal valve (which allows the emptying of the ileal contents into the large intestine, or colon). This in turn stimulates colonic peristalsis and an urge to defecate.
References
Reflexes
Physiology
Stomach |
https://en.wikipedia.org/wiki/Namogoo | Namogoo Technologies Ltd. is a Digital Journey Continuity software as a service platform, that autonomously adapts to each customer visit in real-time, that helps improve online customer journeys and business results for global retail brands. Namogoo's Customer Hijacking Prevention identifies and blocks unauthorized ad injections from diverting online shoppers to competitors. Namogoo's Intent-Based Promotions predicts and individualizes the minimum promotion for each visit — synchronizing customer intent with company business goals.
History
Namogoo was founded in August 2014 by entrepreneurs Chemi Katz and Ohad Greenshpan. In December 2014, the company launched its Customer Hijacking Prevention platform, which detects and blocks malicious content and unauthorized ads injected onto visitor sessions.
In September 2014, Namogoo received an initial funding round of $6 million — led by Blumberg Capital and Inimiti Capital.
In April 2017, Namogoo opened its Sales Headquarters in Boston, Mass.
In February 2017, Namogoo raised $8 million in Series A funding, led by GreatPoint Ventures. Blumberg Capital and Inimiti Capital also participated in the round.
In May 2018, Namogoo received a Series B investment round of $15 million led by Hanaco Ventures, as well existing investors GreatPoint Ventures, Blumberg Capital and Inimiti Capital.
In May 2018, Namogoo was received a 2018 MITX Award in the Technology Innovation in Retail & eCommerce category. The annual awards are hosted by The Massachusetts Innovation & Technology Exchange (MITX) and given to technologies that impact the future of customer experience.
In September 2019, Namogoo was ranked as the Best Startup to Work For in Israel by Dun & Bradstreet(D&B). This was the first year that D&B's annual rankings included a category for startups in addition to its list of Top 50 Companies to Work For in Israel.
In October 2019, Namogoo raised a Series C funding round of $40 million led by Oak HC/FT as well as existing inv |
https://en.wikipedia.org/wiki/Averaged%20Lagrangian | In continuum mechanics, Whitham's averaged Lagrangian method – or in short Whitham's method – is used to study the Lagrangian dynamics of slowly-varying wave trains in an inhomogeneous (moving) medium.
The method is applicable to both linear and non-linear systems. As a direct consequence of the averaging used in the method, wave action is a conserved property of the wave motion. In contrast, the wave energy is not necessarily conserved, due to the exchange of energy with the mean motion. However the total energy, the sum of the energies in the wave motion and the mean motion, will be conserved for a time-invariant Lagrangian. Further, the averaged Lagrangian has a strong relation to the dispersion relation of the system.
The method is due to Gerald Whitham, who developed it in the 1960s. It is for instance used in the modelling of surface gravity waves on fluid interfaces, and in plasma physics.
Resulting equations for pure wave motion
In case a Lagrangian formulation of a continuum mechanics system is available, the averaged Lagrangian methodology can be used to find approximations for the average dynamics of wave motion – and (eventually) for the interaction between the wave motion and the mean motion – assuming the envelope dynamics of the carrier waves is slowly varying. Phase averaging of the Lagrangian results in an averaged Lagrangian, which is always independent of the wave phase itself (but depends on slowly varying wave quantities like wave amplitude, frequency and wavenumber). By Noether's theorem, variation of the averaged Lagrangian with respect to the invariant wave phase then gives rise to a conservation law:
This equation states the conservation of wave action – a generalization of the concept of an adiabatic invariant to continuum mechanics – with
being the wave action and wave action flux respectively. Further and denote space and time respectively, while is the gradient operator. The angular frequency and wavenumber are defined |
https://en.wikipedia.org/wiki/Software%20Guard%20Extensions | Intel Software Guard Extensions (SGX) is a set of instruction codes implementing trusted execution environment that are built into some Intel central processing units (CPUs). They allow user-level and operating system code to define protected private regions of memory, called enclaves. SGX is designed to be useful for implementing secure remote computation, secure web browsing, and digital rights management (DRM). Other applications include concealment of proprietary algorithms and of encryption keys.
SGX involves encryption by the CPU of a portion of memory (the enclave). Data and code originating in the enclave are decrypted on the fly within the CPU, protecting them from being examined or read by other code, including code running at higher privilege levels such the operating system and any underlying hypervisors. While this can mitigate many kinds of attacks, it does not protect against side-channel attacks.
A pivot by Intel in 2021 resulted in the deprecation of SGX from the 11th and 12th generation Intel Core Processors, but development continues on Intel Xeon for cloud and enterprise use.
Details
SGX was first introduced in 2015 with the sixth generation Intel Core microprocessors based on the Skylake microarchitecture.
Support for SGX in the CPU is indicated in CPUID "Structured Extended feature Leaf", EBX bit 02, but its availability to applications requires BIOS/UEFI support and opt-in enabling which is not reflected in CPUID bits. This complicates the feature detection logic for applications.
Emulation of SGX was added to an experimental version of the QEMU system emulator in 2014. In 2015, researchers at the Georgia Institute of Technology released an open-source simulator named "OpenSGX".
One example of SGX used in security was a demo application from wolfSSL using it for cryptography algorithms.
Intel Goldmont Plus (Gemini Lake) microarchitecture also contains support for Intel SGX.
Both in the 11th and 12th generations of Intel Core processo |
https://en.wikipedia.org/wiki/Tipalti | Tipalti is an accounting software financial technology business that provides accounts payable, procurement and global payments automation software for businesses.
Tipalti is headquartered in Foster City, CA , with offices in London UK, Vancouver Canada, Toronto Canada, Amsterdam Netherlands, Plano Texas, and R&D in Glil-Yam Israel.
History
Tipalti was founded in 2010 by Chen Amit and Oren Zeev and launched its first payment product in 2011. The company is a licensed money transmitter in every state that requires it in the United States, including California, New York, and Texas. Tipalti also has an FCA-approved electronic money (E-money) license to provide payment services for companies based in the United Kingdom.
In 2014, the company released a supplier portal component to enable Accounts Payable departments to automate payments to suppliers, vendors, and independent contractors.
In October 2014, Tipalti's CEO Chen Amit stated that the company was processing payments to approximately 300,000 payees and between $1 billion to $1.5 billion annually in payments.
In February 2018, the company announced support for multi-subsidiary AP management and purchase order matching as part of its invoice processing functionality.
In August 2018, Tipalti announced that its platform processed $5 billion in payments annually and served over 3,000,000 payees.
In October 2018, the company announced an integration with QuickBooks Online.
In February 2019, Tipalti announced that they now process over $6.5 billion in annual transactions for more than 4 million suppliers, the hiring of 2 additional executives, and that they doubled new business growth between July 1 and December 31, 2018, relative to the same period in 2017.
On February 26, 2019, Tipalti announced the launch of the Tipalti Multi-FX service, to help finance teams manage FX currency conversion across over 30 currencies.
In August 2019, Tipalti announced that they had surpassed $8 billion in annual transactions |
https://en.wikipedia.org/wiki/J%C3%B3n%20Atli%20Benediktsson | Jón Atli Benediktsson (born 19 May 1960) is the rector and president of the University of Iceland and professor in electrical and computer engineering at the university. His research fields are remote sensing, image analysis, pattern recognition, machine learning, data fusion, analysis of biomedical signals and signal processing. He has published over 400 scientific articles in these fields and is one of the most influential scientists in the world according to Publons’ lists in 2018 and 2019.
Education
Jón Atli Benediktsson completed doctoral degree (PhD) in electrical engineering from Purdue University, West Lafayette, Indiana in 1990. The dissertation’s title is “Statistical Methods and Neural Network Approaches for Classification of Data from Multiple Sources”. At Purdue, he received the Stevan J. Kristof Award Outstanding Graduate Student Award in Remote Sensing (1991). He completed the MSEE degree in electrical engineering from Purdue in 1987. The title of the MSEE thesis is “Methods for Multisource Data Analysis in Remote Sensing”. Jón Atli completed his degree in electrical engineering at the University of Iceland in 1984. He graduated from Menntaskólinn í Reykjavík (Junior College in Reykjavik) in 1980. There he was on the school's debate team and the president of Vísindafélag Framtíðarinnar (science society of the school). He had previously attended classes at Vörðuskóli (passing landspróf, the national standard lower secondary school exam), Hlíðaskóli, Æfinga- og tilraunaskóli (of the Iceland´s School of Education), and Ísaksskóli.
At Purdue (1986-1990), Jón Atli was a research assistant at the School of Electrical Engineering and Laboratory for Application of Remote Sensing (LARS). After completing his doctoral degree, Jón Atli was for six months a post-doc at Purdue. Before entering graduate studies, he was on the staff of the University of Iceland's Engineering Research Institute and a part-time teacher at the University of Iceland from 1984 to 1985. |
https://en.wikipedia.org/wiki/Cloudlet | A cloudlet is a mobility-enhanced small-scale cloud datacenter that is located at the edge of the Internet. The main purpose of the cloudlet is supporting resource-intensive and interactive mobile applications by providing powerful computing resources to mobile devices with lower latency. It is a new architectural element that extends today's cloud computing infrastructure. It represents the middle tier of a 3-tier hierarchy: mobile device - cloudlet - cloud. A cloudlet can be viewed as a data center in a box whose goal is to bring the cloud closer. The cloudlet term was first coined by M. Satyanarayanan, Victor Bahl, Ramón Cáceres, and Nigel Davies, and a prototype implementation is developed by Carnegie Mellon University as a research project. The concept of cloudlet is also known as follow me cloud, and mobile micro-cloud.
Motivation
Many mobile services split the application into a front-end client program and a back-end server program following the traditional client-server model. The front-end mobile application offloads its functionality to the back-end servers for various reasons such as speeding up processing. With the advent of cloud computing, the back-end server is typically hosted at the cloud datacenter. Though the use of a cloud datacenter offers various benefits such as scalability and elasticity, its consolidation and centralization lead to a large separation between a mobile device and its associated datacenter. End-to-end communication then involves many network hops and results in high latencies and low bandwidth.
For the reasons of latency, some emerging mobile applications require cloud offload infrastructure to be close to the mobile device to achieve low response time. In the ideal case, it is just one wireless hop away. For example, the offload infrastructure could be located in a cellular base station or it could be LAN-connected to a set of Wi-Fi base stations. The individual elements of this offload infrastructure are referred to as |
https://en.wikipedia.org/wiki/Intertemporal%20budget%20constraint | In economics and finance, an intertemporal budget constraint is a constraint faced by a decision maker who is making choices for both the present and the future. The term intertemporal is used to describe any relationship between past, present and future events or conditions. In its general form, the intertemporal budget constraint says that the present value of current and future cash outflows cannot exceed the present value of currently available funds and future cash inflows. Typically this is expressed as
where is expenditure at time t, is the cash that becomes available at time t, T is the most distant relevant time period, 0 is the current time period, and is the discount factor computed from the interest rate r.
Complications are possible in various circumstances. For example, the interest rate for discounting cash receipts might be greater than the interest rate for discounting expenditures, because future inflows may be borrowed against while currently available funds may be invested temporarily pending use for future expenditures, and borrowing rates may exceed investment returns.
Applications
In most applications, the entire budget would be used up, because any unspent funds would represent unobtained potential utility. In these situations, the intertemporal budget constraint is effectively an equality constraint.
In an intertemporal consumption model, the sum of utilities from expenditures made at various times in the future, these utilities discounted back to the present at the consumer's rate of time preference, would be maximized with respect to the amounts xt consumed in each period, subject to an intertemporal budget constraint.
In a model of intertemporal portfolio choice, the objective would be to maximize the expected value or expected utility of final period wealth. Since investment returns in each period generally would not be known in advance, the constraint effectively imposes a limit on the amount that can be invested in the final |
https://en.wikipedia.org/wiki/Floodway%20%28road%29 | A floodway is a flood plain crossing for a road, built at or close to the natural ground level. It is similar to a causeway, but crosses a shallow depression that is subject to flooding, rather than a waterway or tidal water.
They are designed to be submerged under water, but withstand such conditions. Typically floodways are used when the flood frequency or time span is minimal, traffic volumes are low, and the cost of a bridge is uneconomic – in most cases, in rural areas.
See also
Flood control channel
Glossary of road transport terms
Low water crossing
Notes
External links
Flood control
Transportation engineering
Rivers
Hydraulic engineering |
https://en.wikipedia.org/wiki/TempleOS | TempleOS (formerly J Operating System, LoseThos, and SparrowOS) is a biblical-themed lightweight operating system (OS) designed to be the Third Temple prophesied in the Bible. It was created by American programmer Terry A. Davis, who developed it alone over the course of a decade after a series of manic episodes that he later described as a revelation from God.
The system was characterized as a modern x86-64 Commodore 64, using an interface similar to a mixture of DOS and Turbo C. Davis proclaimed that the system's features, such as its 640x480 resolution, 16-color display, and single-voice audio, were designed according to explicit instructions from God. It was programmed with an original variation of C (named HolyC) in place of BASIC, and included an original flight simulator, compiler, and kernel.
First released in 2005 as J Operating System, TempleOS was renamed in 2013 and was last updated in 2018.
Background
Terry A. Davis (1969–2018) began experiencing regular manic episodes in 1996, leading him to numerous stays at mental hospitals. Initially diagnosed with bipolar disorder, he was later declared schizophrenic and remained unemployed for the rest of his life. He suffered from delusions of space aliens and government agents that left him briefly hospitalized for his mental health issues. After experiencing a self-described "revelation", he proclaimed that he was in direct communication with God, and that God told him the operating system was for God's third temple.
Davis began developing TempleOS circa 2003. One of its early names was the "J Operating System" before renaming it to "LoseThos", a reference to a scene from the 1986 film Platoon. In 2008, Davis wrote that LoseThos was "primarily for making video games. It has no networking or Internet support. As far as I'm concerned, that would be reinventing the wheel". Another name he used was "SparrowOS" before settling on "TempleOS". In mid-2013, his website announced: "God's temple is finished. Now, Go |
https://en.wikipedia.org/wiki/Gross%20National%20Well-being | Gross National Well-being/Wellness (GNW) or Happiness (GNH) a socioeconomic development and measurement framework. The GNW/GNH Index consists of seven dimensions: economic, environmental, physical, mental, work, social, and political. Most wellness areas include both subjective results (via survey) and objective data.
Disambiguation
The GNW Index is also known as the first GNH Index or Gross National Happiness Index, not to be confused with Bhutan's GNH Index. Both econometric frameworks are different in authorship, creation dates, and geographic scope. The GNW / GNH index is a global development measurement framework published in 2005 by the International Institute of Management in the United States.
The term "Gross National Happiness" was first coined by the 4th King of Bhutan, King Jigme Singye Wangchuck, in 1972 when he declared, "Gross National Happiness is more important than Gross Domestic Product." However, no GNH Index existed until 2005.
The GNH philosophy suggested that the ideal purpose of governments is to promote happiness. The philosophy remained difficult to implement due to the subjective nature of happiness, the lack of exact quantitative definition of GNH, and the lack of a practical model to measure the impact of economic policies on the subjective well-being of the citizens.
The GNW Index paper proposed the first GNH Index as a solution to help with the implementation of the GHN philosophy and was designed to transform the first generation abstract subjective political mission statement into a second generation implementation holistic (objective and subjective) concept and by treating happiness as a socioeconomic development metric that would provide an alternative to the traditional GDP indicator, the new metric would integrate subjective and objective socioeconomic development policy framework and measurement indicators.
The GNW Index is a secular econometric model that tracks 7 subjective and objective development areas with no religious |
https://en.wikipedia.org/wiki/2016%20United%20States%20presidential%20debates | The 2016 United States presidential debates were a series of debates held for the presidential election. The Commission on Presidential Debates (CPD), a bipartisan organization formed in 1987, organized three debates among the major presidential candidates. The first of these presidential debates took place on September 26, 2016, and set the record as the most-watched debate in American history, with 84 million viewers. The second debate took place on October 9, and the third took place on October 19. All CPD debates occurred from approximately 9 p.m. to 10:30 p.m. EDT (6 p.m. to 7:30 p.m. PDT). Only the Democratic nominee Hillary Clinton and the Republican nominee Donald Trump met the criteria for inclusion in the debates, and thus were the only two to appear in the debates sponsored by the Commission on Presidential Debates. The CPD-sponsored vice presidential debate took place on October 4, 2016. Only Democratic nominee Tim Kaine and Republican nominee Mike Pence appeared in it.
Commission on Presidential Debates-sponsored debates
The Commission on Presidential Debates stipulates three criteria for eligibility for the presidential debates: constitutional eligibility to serve as president, appearance on enough ballots to potentially reach 270 electoral votes, and an average at least 15% on five selected national polls. For the vice-presidential debate, the running mates of the presidential candidates qualifying for the first presidential debate will be invited. By mid-September Hillary Clinton, Donald Trump, Gary Johnson, and Jill Stein were on enough ballots to reach 270 electoral votes; however, only Clinton and Trump had reached the 15% polling threshold. Johnson and Stein had polled as high as 13% and 7%, respectively, and had an average of 8.3% and 3%, respectively.
On August 15, the CPD announced that it would use the most recent CBS/The New York Times, Fox News, CNN/Opinion Research Corporation, NBC/The Wall Street Journal, and ABC/The Washington Post |
https://en.wikipedia.org/wiki/Call%20signs%20in%20Asia | Call signs in Asia are rarely used to identify broadcast stations. In most Asian countries, broadcast stations use other forms of identification. Japan, South Korea, Indonesia, the Philippines and Taiwan are exceptions to this rule. Amateur radio stations in India, Pakistan, Korea and Japan are allocated call-signs.
Amateur radio
The Wireless and Planning and Coordination Wing (WPC), a division of the Ministry of Communications and Information Technology, regulates amateur radio in India. Amateur radio call-signs of Pakistan are issued by the Pakistan Telecommunication Authority (PTA). The PARS operates a QSL bureau for those amateur radio operators in regular contact with amateur radio operators in other countries, and supports amateur radio operating awards and radio contests. The Pakistan Amateur Radio Society represents the interest of Pakistan amateur radio operators before national and international regulatory authorities. PARS is the national member society representing Pakistan in the International Amateur Radio Union.
In Japan, it is regulated by the Ministry of Internal Affairs and Communications with the Japan Amateur Radio League acting as a national amateur radio organization.
In South Korea call signs are regulated by the Korea Communications Commission in the Ministry of Information and Communication.
China
The International Telecommunication Union has assigned China the call sign prefixes B, VR, XS, XX and 3H-3U. Only prefixes B, VR and XX are currently under active use, with all other prefixes under reserves. Domestic commercial broadcasting stations in no part of China uses alphanumeric call signs. The following call sign allocation applies only to amateur radio.
Mainland China
Mainland China uses call sign prefixes BA-BL, BR-BT, BY and BZ for routine operation, and singular B for temporary event stations. The second character for a routine operation call sign indicates the type of the station. Call signs in mainland China are now lifetime |
https://en.wikipedia.org/wiki/Call%20signs%20in%20Europe | Call signs in Europe are not formally used for broadcast stations.
It is quite common that instead of regular call signs abbreviations of the stations' names are used (e.g. ARD, RTL in Germany, ORF in Austria, BBC and ITV in the United Kingdom, TF1 in France, etc.). In most of Europe, TV and radio stations have unique names.
Amateur radio
The amateur radio call signs of Europe are allocated to ham radio stations in United Kingdom, Ireland, Russia and all other European countries. In Ireland, the Commission for Communications Regulation, known as Comreg, is responsible for providing policy on the allocation of Ireland's radio spectrum. In Russia, call signs are used to identify about 34,000 licensed amateur radio operators and are regulated internationally by the ITU as well as nationally by Ministry of Communications and Mass Media of the Russian Federation.
In the United Kingdom, call signs are used to identify 60,000 ham radio licensed operators and are managed by 'The Office of Communication', known as Ofcom. It regulates amateur radio in the country as an independent regulator and competition authority for the UK communications industries, with responsibilities across television, radio, telecommunications and wireless communications services. However, it is no longer responsible for setting and conducting amateur radio exams, which are now run by the Radio Society of Great Britain on their behalf.
Republic of Ireland
Call signs in the Republic of Ireland are regulated internationally by the International Telecommunication Union and nationally by the ComReg. The latter is responsible for providing policy on the allocation of Ireland's radio spectrum to support efficient, reliable and responsive wireless telecommunications and broadcasting infrastructure.
The International Telecommunication Union has assigned Ireland the EIA–EJZ call sign block for all radio communication, broadcasting or transmission. The Irish Radio Transmitters Society (IRTS) manage ex |
https://en.wikipedia.org/wiki/Data%20organization%20for%20low%20power | Power consumption in relation to physical size of electronic hardware has increased as the components have become smaller and more densely packed. Coupled with high operating frequencies, this has led to unacceptable levels of power dissipation. Memory accounts for a high proportion of the power consumed, and this contribution may be reduced by optimizing data organizationthe way data is stored.
Motivation
Power optimization in high memory density electronic systems has become one of the major challenges for devices such as mobile phones, embedded systems, and wireless devices. As the number of cores on a single chip is growing the power consumption by the devices also increases. Studies on power consumption distribution in smartphones and data-centers have shown that the memory subsystem consumes around 40% of the total power. In server systems, the study reveals that the memory consumes around 1.5 times the core power consumption.
Memory data organization of low energy address bus
System level buses such as off-chip buses or long on-chip buses between IP blocks are often major sources of energy consumption due to their large load capacitance. Experimental results have shown that the bus activity for memory access can be reduced to 50% by organizing the data. Consider the case of compiling the code written in C programming language:
int A[4][4], B[4][4];
for (i = 0; i < 4; i++) {
for (j = 0; j < 4; j++) {
B[i][j] = A[j][i];
}
}
Most existing C compilers place a multidimensional array in row-major form, that is row by row: this is shown in the "unoptimized" column in the adjoining table. As a result, no memory access while running this code has sequential memory access because elements in columns are accessed sequentially. But it is possible to change the way in which they are placed in memory so as to maximize the number of sequential accesses from memory. This can be achieved by ordering the data as shown in the "optimized" column of the table. Such |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.