source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Microbial%20cytology | Microbial cytology is the study of microscopic and submicroscopic details of microorganisms. Origin of "Microbial" 1880-85; < Greek mīkro- micro- small + bíos life). "Cytology" 1857; < Cyto-is derived from the Greek "kytos" meaning "hollow, as a cell or container." + -logy meaning "the study of"). Microbial cytology is analyzed under a microscope for cells which were collected from a part of the body. The main purpose of microbial cytology is to see the structure of the cells, and how they form and operate.
References
Microbiology |
https://en.wikipedia.org/wiki/Fecundity%20selection | Fecundity selection, also known as fertility selection, is the fitness advantage resulting from selection on traits that increases the number of offspring (i.e. fecundity). Charles Darwin formulated the theory of fecundity selection between 1871 and 1874 to explain the widespread evolution of female-biased sexual size dimorphism (SSD), where females were larger than males.
Along with the theories of natural selection and sexual selection, fecundity selection is a fundamental component of the modern theory of Darwinian selection. Fecundity selection is distinct in that large female size relates to the ability to accommodate more offspring, and a higher capacity for energy storage to be invested in reproduction. Darwin's theory of fecundity selection predicts the following:
Fecundity depends on variation in female size, which is associated with fitness.
Strong fecundity selection favors large female size, which creates asymmetrical female-biased sexual size dimorphism.
Although sexual selection and fecundity selection are distinct, it still may be difficult to interpret whether sexual dimorphism in nature is due to fecundity selection, or to sexual selection. Examples of fecundity selection in nature include self-incompatibility flowering plants, where pollen of some potential mates are not effective in forming seed, as well as bird, lizard, fly, and butterfly and moth species that are spread across an ecological gradient.
Moreau-Lack's rule
Moreau (1944) suggested that in more seasonal environments or higher latitudes, fecundity depends on high mortality. Lack (1954) suggested differential food availability and management across latitudes play a role in offspring and parental fitness. Lack also highlighted that more opportunities for parents to collect food due to an increase in day-length towards the poles is an advantage. This means that moderately higher altitudes provide more successful conditions to produce more offspring. However, extreme day-lengths ( |
https://en.wikipedia.org/wiki/Asano%20contraction | In complex analysis, a discipline in mathematics, and in statistical physics, the Asano contraction or Asano–Ruelle contraction is a transformation on a separately affine multivariate polynomial. It was first presented in 1970 by Taro Asano to prove the Lee–Yang theorem in the Heisenberg spin model case. This also yielded a simple proof of the Lee–Yang theorem in the Ising model. David Ruelle proved a general theorem relating the location of the roots of a contracted polynomial to that of the original. Asano contractions have also been used to study polynomials in graph theory.
Definition
Let be a polynomial which, when viewed as a function of only one of these variables is an affine function. Such functions are called separately affine. For example, is the general form of a separately affine function in two variables. Any separately affine function can be written in terms of any two of its variables as . The Asano contraction sends to .
Location of zeroes
Asano contractions are often used in the context of theorems about the location of roots. Asano originally used them because they preserve the property of having no roots when all the variables have magnitude greater than 1. Ruelle provided a more general relationship which allowed the contractions to be used in more applications. He showed that if there are closed sets not containing 0 such that cannot vanish unless for some index , then can only vanish if for some index or where . Ruelle and others have used this theorem to relate the zeroes of the partition function to zeroes of the partition function of its subsystems.
Use
Asano contractions can be used in statistical physics to gain information about a system from its subsystems. For example, suppose we have a system with a finite set of particles with magnetic spin either 1 or -1. For each site, we have a complex variable Then we can define a separately affine polynomial where , and is the energy of the state where only the sites in have |
https://en.wikipedia.org/wiki/Jim%20Keller%20%28engineer%29 | James B. Keller (born 1958/1959) is an American microprocessor engineer best known for his work at AMD and Apple. He was the lead architect of the AMD K8 microarchitecture (including the original Athlon 64) and was involved in designing the Athlon (K7) and Apple A4/A5 processors. He was also the coauthor of the specifications for the x86-64 instruction set and HyperTransport interconnect. From 2012 to 2015 he returned to AMD to work on the AMD K12 and Zen microarchitectures.
Education
He holds a B.S. in Electrical Engineering from Pennsylvania State University, which he earned in 1980.
Career
Jim Keller joined DEC in 1982 and worked there until 1998, where he was involved in designing a number of processors, including the VAX 8800, the Alpha 21164 and the Alpha 21264 processors. Prior to DEC, he had worked at Harris Corporation on microprocessor boards. In 1998 he moved to AMD, where he worked to launch the AMD Athlon (K7) processor and was the lead architect of the AMD K8 microarchitecture, which also included designing the x86-64 instruction set and HyperTransport interconnect, mainly used for multiprocessor communications.
In 1999 he left AMD to work at SiByte to design MIPS-based processors for 1 Gbit/s network interfaces and other devices. In November 2000 SiByte was acquired by Broadcom, where he continued as chief architect until 2004.
In 2004 he moved to serve as the Vice President of Engineering at P.A. Semi, a company specializing in low-power mobile processors. In early 2008 Keller moved to Apple. P.A. Semi was acquired by Apple shortly afterwards, reuniting Keller with his prior team from P.A. Semi. The new team worked to design the Apple A4 and A5 system-on-a-chip mobile processors. These processors were used in several Apple products, including iPhone 4, 4S, iPad and iPad 2.
In August 2012 Jim Keller returned to AMD, where his primary task was to lead development of new generation of x86-64 and ARM microarchitectures called Zen and K12. After ye |
https://en.wikipedia.org/wiki/Sigfox | Sigfox is a French global network operator founded in 2010 that built wireless networks to connect low-power objects such as electricity meters and smartwatches, which need to be continuously on and emitting small amounts of data.
Sigfox is based in Labège near Toulouse, France, and had over 375 employees. The firm also has offices in Madrid, San Francisco, Sydney and Paris.
Sigfox had raised more than $300 million from investors that included Salesforce, Intel, Samsung, NTT, SK Telecom, energy groups Total and Air Liquide. In November 2016 Sigfox was valued at around €600 million. In January 2022 it filed for bankruptcy.
In April 2022 Singapore-based IoT network firm Unabiz subsequently acquired Sigfox and its French network operations for a reported €25 million ($27m).
Technology
Sigfox employs the differential binary phase-shift keying (DBPSK) and the Gaussian frequency shift keying (GFSK) that enables communication using the Short-range device band of 868 MHz in Europe, and the Industrial, Scientific and Medical radio band of 902 MHz in the US. It utilizes a wide-reaching signal that passes freely through solid objects, called "Ultra Narrowband" and requires little energy, being termed a "low-power wide-area network" (LPWAN). The network is based on one-hop star topology and requires a mobile operator to carry the generated traffic. The signal can also be used to easily cover large areas and to reach underground objects. As of November 2020, the Sigfox IoT network has covered a total of 5.8 million square kilometers in a total of 72 countries with 1.3 billion of the world population reached.
Sigfox has partnered with a number of firms in the LPWAN industry such as Texas Instruments, Silicon Labs and ON Semiconductor. The ISM radio bands support limited bidirectional communication. The existing standard for Sigfox communications supports up to 140 uplink messages a day, each of which can carry a payload of 12 octets at a data rate of up to 100 bits per se |
https://en.wikipedia.org/wiki/Loewner%20order | In mathematics, Loewner order is the partial order defined by the convex cone of positive semi-definite matrices. This order is usually employed to generalize the definitions of monotone and concave/convex scalar functions to monotone and concave/convex Hermitian valued functions. These functions arise naturally in matrix and operator theory and have applications in many areas of physics and engineering.
Definition
Let A and B be two Hermitian matrices of order n. We say that A ≥ B if A − B is positive semi-definite. Similarly, we say that A > B if A − B is positive definite.
Properties
When A and B are real scalars (i.e. n = 1), the Loewner order reduces to the usual ordering of R. Although some familiar properties of the usual order of R are also valid when n ≥ 2, several properties are no longer valid. For instance, the comparability of two matrices may no longer be valid. In fact, if
and then neither A ≥ B or B ≥ A holds true.
Moreover, since A and B are Hermitian matrices, their eigenvalues are all real numbers.
If λ1(B) is the maximum eigenvalue of B and λn(A) the minimum eigenvalue of A, a sufficient criterion to have A ≥ B is that λn(A) ≥ λ1(B). If A or B is a multiple of the identity matrix, then this criterion is also necessary.
The Loewner order does not have the least-upper-bound property, and therefore does not form a lattice.
See also
Trace inequalities
References
Linear algebra
Matrix theory |
https://en.wikipedia.org/wiki/Cyber-arms%20industry | The cyber-arms industry are the markets and associated events surrounding the sale of software exploits, zero-days, cyberweaponry, surveillance technologies, and related tools for perpetrating cyberattacks. The term may extend to both grey and black markets online and offline.
For many years, the burgeoning dark web market remained niche, available only to those in-the-know or well-funded. Since at least 2005, governments including the United States, United Kingdom, Russia, France, and Israel have been buying exploits from defence contractors and individual hackers. This 'legitimate' market for zero-day exploits exists but is not well advertised or immediately accessible.
Attempts to openly sell zero-day exploits to governments and security vendors to keep them off the black market have so far been unsuccessful.
Companies
Traditional arms producers and military services companies such as BAE Systems, EADS, Leonardo, General Dynamics, Raytheon, and Thales have all expanded into the cybersecurity markets. However, smaller software companies such as Blue Coat and Amesys have also become involved, often drawing attention for providing surveillance and censorship technologies to the regimes of Bashar al-Assad in Syria and Muammar Gaddafi in Libya.
Suppliers of exploits to western governments include the Massachusetts firm Netragard.
The trade show ISS World that runs every few months has been referred to as the 'international cyber arms bazaar' and the 'wiretappers ball' focuses on surveillance software for lawful interception.
Some other cyberarms companies include Endgame, Inc., Gamma Group, NSO Group, Birmingham Cyber Arms LTD and Ability. Circles, a former surveillance business, merged with NSO Group in 2014.
On 26 July 2017 Google researchers announced the discovery of new spyware they named "Lipizzan". According to Google, "Lipizzan's code contains references to a cyber arms company, Equus Technologies.".
On the Internet
The most popular Internet forums a |
https://en.wikipedia.org/wiki/Ultra%20HD%20Blu-ray | Ultra HD Blu-ray (4K Ultra HD, UHD-BD, or 4K Blu-ray) is a digital optical disc data storage format that is an enhanced variant of Blu-ray. Ultra HD Blu-ray discs are incompatible with existing standard Blu-ray players. Ultra HD Blu-ray supports 4K UHD (3840 × 2160 pixel resolution) video at frame rates up to 60 progressive frames per second, encoded using High-Efficiency Video Coding. The discs support both high dynamic range by increasing the color depth to 10-bit per color and a greater color gamut than supported by conventional Blu-ray video by using the Rec. 2020 color space. Ultra HD Blu-Ray discs also support a 12-bit per color container via Dolby Vision. Dolby Vision content on 4K UHD Blu-Ray can also be mastered for 10,000 nits peak brightness, whereas standard HDR10 can only achieve a maximum of 4,000 nits of brightness. Moreover, Dolby Vision makes use of dynamic metadata, which adjusts the brightness and tone mapping per scene. In contrast, standard HDR10 only makes use of static metadata, which sets the same brightness and tone mapping for the entirety of the content.
The format is supported on Microsoft's Xbox One X, One S, Series X, and Sony's PlayStation 5. Software made for the PlayStation 5 can use 100 GB UHD Blu-ray discs.
The first Ultra HD Blu-ray Discs were officially released in the United States on February 14, 2016. To differentiate retail Ultra HD Blu-ray releases, the format usually uses a black opaque or slightly transparent keep case packaging format (as opposed to blue). The case size is the same as that of a normal Blu-ray disc.
The Blu-ray Disc Association also completed the specification for an 8K Blu-ray format supporting 8K UHD (7680 × 4320 pixel resolution) videos for use in Japan.
Specifications
The specification for 4K Blu-ray allows for three disc capacities, each with its own data rate: 50 GB at 72 or 92 Mbit/s, and 66 GB and 100 GB at 92, 123, or 144 Mbit/s. On 66 GB and 100 GB discs, the pits and lands are not narrower |
https://en.wikipedia.org/wiki/List%20of%20combat%20engineering%20corps | In many countries, combat engineers are members of broader military engineering corps or branches. Examples of this include:
Royal Australian Engineers
Canadian Military Engineers
Indian Army Corps of Engineers
Indonesian Army Corps of Engineers
Jihad of Construction (defunct)
Engineer Corps (Ireland)
Combat Engineering Corps
Corps of Royal New Zealand Engineers
Pakistan Army Corps of Engineers
Russian Engineer Troops
Sri Lanka Engineers
Royal Engineers
United States Army Corps of Engineers
United States Navy Seabee
United States Air Force RED HORSE
United States Marine Corps Combat Engineers
South African Engineer Corps
Combat engineering
Military engineering |
https://en.wikipedia.org/wiki/Ortelius%20oval%20projection | The Ortelius oval projection is a map projection used for world maps largely in the late 16th and early 17th century. It is neither conformal nor equal-area but instead offers a compromise presentation. It is similar in structure to a pseudocylindrical projection but does not qualify as one because the meridians are not equally spaced along the parallels. The projection's first known use was by Battista Agnese (flourished 1535–1564) around 1540, although whether the construction method was truly identical to Ortelius's or not is unclear because of crude drafting and printing. The front hemisphere is identical to Petrus Apianus's 1524 globular projection.
The projection reached a wide audience via the surpassingly popular Typus Orbis Terrarum of Abraham Ortelius beginning in 1570. The projection (and indeed Ortelius's maps) were widely copied by other mapmakers such as Giovanni Pietro Maffei, Fernando de Solis, and Matteo Ricci.
Formulas
Given a radius of sphere R, central meridian λ0 and a point with geographical latitude φ and longitude λ, plane coordinates x and y can be computed using the following formulas when λ ≤ :
For the outer hemisphere use the same formula for y, but:
In these formulas, x should take the sign of λ.
See also
List of map projections
References
External links
Description and characteristics at mapthematics.com
Map projections |
https://en.wikipedia.org/wiki/Corinna%20Ulcigrai | Corinna Ulcigrai (born 3 January 1980, Trieste) is an Italian mathematician working on dynamical systems. With Krzysztof Frączek in 2013, Ulcigrai is known for proving that in the Ehrenfest model (a mathematical abstraction of billiards with an infinite array of rectangular obstacles, used to model gas diffusion) most trajectories are not ergodic.
Education and career
Ulcigrai obtained her Ph.D. in 2007 from Princeton University with Yakov Sinai as her thesis advisor. She has worked at the University of Bristol, United Kingdom. and is currently a professor at the University of Zurich, Switzerland.
Recognition
Ulcigrai was awarded the European Mathematical Society Prize in 2012, and the Whitehead Prize in 2013.
In 2020, Ulcigrai was the winner of the Michael Brin Prize in Dynamical Systems, "for her fundamental work on the ergodic theory of locally Hamiltonian flows on surfaces, of translation flows on periodic surfaces and wind-tree models, and her seminal work on higher genus generalizations of Markov and Lagrange spectra".
References
External links
Home page
Italian mathematicians
Women mathematicians
1980 births
Princeton University alumni
Academics of the University of Bristol
Living people
Whitehead Prize winners
Dynamical systems theorists |
https://en.wikipedia.org/wiki/TheRealDeal | TheRealDeal was a darknet website and a part of the cyber-arms industry reported to be selling code and zero-day software exploits.
The creators claimed in an interview with DeepDotWeb that the site was founded in direct response to the number of dark websites which have emerged during the past few years which do not actually have anything of value to sell and are just scams. The site relied on Tor and bitcoin similar to other darknet markets but required multi-signature transactions. There was speculation in the computer security community as to whether the site is a law enforcement sting operation due to apparent listing of exploits at many times below their potential market value.
In July 2015 the website was down for 24 hours at the same time as cyber crime forum Darkode was seized by the FBI and various members arrested in 'Operation Shrouded Horizon'. On 13 August in 2015 the site went offline for unknown reasons. On December 1 it announced its reopening on DeepDotWeb. The Real Deal was shut down in November 2016.
In 2020, cybersecurity author Vinny Troia provided an analysis of the marketplace's MySQL database, which revealed two of the site's three admins to be members of The Dark Overlord hacking group.
See also
WabiSabiLabi
References
External links
Tor onion services
Defunct darknet markets
Cyberwarfare
Cybercrime |
https://en.wikipedia.org/wiki/Octuple-precision%20floating-point%20format | In computing, octuple precision is a binary floating-point-based computer number format that occupies 32 bytes (256 bits) in computer memory. This 256-bit octuple precision is for applications requiring results in higher than quadruple precision. This format is rarely (if ever) used and very few environments support it.
IEEE 754 octuple-precision binary floating-point format: binary256
In its 2008 revision, the IEEE 754 standard specifies a binary256 format among the interchange formats (it is not a basic format), as having:
Sign bit: 1 bit
Exponent width: 19 bits
Significand precision: 237 bits (236 explicitly stored)
The format is written with an implicit lead bit with value 1 unless the exponent is all zeros. Thus only 236 bits of the significand appear in the memory format, but the total precision is 237 bits (approximately 71 decimal digits: ).
The bits are laid out as follows:
Exponent encoding
The octuple-precision binary floating-point exponent is encoded using an offset binary representation, with the zero offset being 262143; also known as exponent bias in the IEEE 754 standard.
Emin = −262142
Emax = 262143
Exponent bias = 3FFFF16 = 262143
Thus, as defined by the offset binary representation, in order to get the true exponent the offset of 262143 has to be subtracted from the stored exponent.
The stored exponents 0000016 and 7FFFF16 are interpreted specially.
The minimum strictly positive (subnormal) value is and has a precision of only one bit.
The minimum positive normal value is 2−262142 ≈ 2.4824 × 10−78913.
The maximum representable value is 2262144 − 2261907 ≈ 1.6113 × 1078913.
Octuple-precision examples
These examples are given in bit representation, in hexadecimal,
of the floating-point value. This includes the sign, (biased) exponent, and significand.
0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 000016 = +0
8000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 000016 = −0
|
https://en.wikipedia.org/wiki/Vaginal%20flora%20in%20pregnancy | The vaginal flora in pregnancy, or vaginal microbiota in pregnancy, is different from the vaginal flora (the population of microorganisms that resides in the vagina) before sexual maturity, during reproductive years, and after menopause. A description of the vaginal flora of pregnant women who are immunocompromised is not covered in this article. The composition of the vaginal flora significantly differs in pregnancy. Bacteria or viruses that are infectious most often have no symptoms.
Normal microbiota
Microbiota in pregnancy
In normal pregnancy, the resident vaginal flora is thought to provide protection against infection. The microbiota during pregnancy are predominantly Lactobacillus species. Microbiota composition can change during the course of the pregnancy. If the microbiota populations become more diverse, indicating that the normal Lactobacillus-dominated population has changed to a bacterial vaginosis population, risks of adverse pregnancy outcomes increase. Vaginal discharge is common during pregnancy but is not an indicator of bacterial vaginosis or abnormal microbiota. The treatment of abnormal vaginal microbiota populations with lactobacilli and estriol during pregnancy was found to restore the microbiota to a normal state.
Bacterial vaginosis and pregnancy
Bacterial vaginosis in pregnancy is an alteration of the normal vaginal microbiota of pregnancy. Intrauterine infections in pregnancy are caused by bacteria that cause inflammation. The women may experience few or no symptoms. This sometimes leads to chorioamnionitis and other negative pregnancy outcomes. Chorioamnionitis is due to the presence of bacteria such as Ureaplasma parvum and Mycoplasma species this generates the release of proinflammatory cytokines and chemokines, IL-8 which causes cervical ripening and can result in premature birth. When there are high bacterial counts in of the vagina during pregnancy is typically due to the presence of the following organisms:
Gardnerella vaginali |
https://en.wikipedia.org/wiki/Cambridge%20Distributed%20Computing%20System | The Cambridge Distributed Computing System is an early discontinued distributed operating system, developed in the 1980s at Cambridge University. It grew out of the Cambridge Ring local area network, which it used to interconnect computers.
The Cambridge system connected terminals to "processor banks". At login, a user would request from the bank a machine with a given architecture and amount of memory. The system then assigned to the user a machine that served, for the duration of the login session, as their "personal" computer. The machines in the processor bank ran the TRIPOS operating system. Additional special-purpose servers provided file and other services. At its height, the Cambridge system consisted of some 90 machines.
References
Distributed operating systems
Discontinued operating systems
History of computing in the United Kingdom
University of Cambridge Computer Laboratory
68k architecture |
https://en.wikipedia.org/wiki/PTC%20tasting | PTC tasting is a classic genetic marker in human population genetics investigations.
History
In 1931 Arthur Fox, a chemist at DuPont, in Wilmington, Delaware, synthesized phenylthiocarbamide (PTC). Some researchers reported a bitter taste when entering his laboratory, while others, including Fox himself, experienced no such sensation. Further study of this phenomenon by L.H. Snyder in 1931 led to the conclusion that the inability to taste PTC is a recessive trait.
In 1932, Albert Blakeslee conducted a large-scale study involving the inheritance of PTC tasting within families that concluded that PTC tasting sensitivity is very likely a complex Mendelian trait whose variance is overwhelmingly dependent on a single gene locus; however, it is likely that a few other genes have a smaller effect as well.
In 1939 Fisher et al. found that the genetic frequency of PTC tasting was the same in chimps and humans. This similarity suggests that whatever gene controls for PTC tasting must have some sort of a selective advantage in order to have either evolved and been maintained for millions of years since before humans and chimps diverged into separate species, or to have evolved in two separate events after species divergence. Since finding out that PTC tasting had an apparent naturally selective advantage, scientists began to hypothesize that this advantage was that the ability to taste natural chemicals similar to PTC helped human ancestors stay away from some toxic plants. Substances that resemble PTC today are in some vegetables from the cabbage family (Brassicaceae), such as broccoli and Brussels sprouts.
In 1950, William Boyd found evidence that the same gene that controls for PTC tasting also controls for the "tasting" of a different compound that acts as an antithyroid drug similar to that found in cabbage plants. Despite all of this compelling evidence for PTC "tasters" to have a selective advantage over "non-tasters," there was no explanation for the consistent prop |
https://en.wikipedia.org/wiki/Huwood%20power%20loader | The Huwood Power Loader was mechanical device of roughly 6 ft by 2 ft by 1 ft dimensions and powered by a 10 hp engine, used to move cut coal from the coal face on to the conveyor. The machine was equipped with winches which used haulage ropes to drag the machine along the coal face and used both horizontal and rotary motions to shift the coal onto the conveyor. Pleasley Colliery, Derbyshire introduced one of the first such loaders in 1950.
See also
Meco-Moore Cutter Loader
Anderton Shearer
References
Mining equipment |
https://en.wikipedia.org/wiki/Classic%20Mac%20OS | Mac OS (originally System Software; retronym: Classic Mac OS) is the series of operating systems developed for the Macintosh family of personal computers by Apple Computer from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The Macintosh operating system is credited with having popularized the graphical user interface concept. It was included with every Macintosh that was sold during the era in which it was developed, and many updates to the system software were done in conjunction with the introduction of new Macintosh systems.
Apple released the original Macintosh on January 24, 1984. The first version of the system software, which had no official name, was partially based on the Lisa OS, which Apple previously released for the Lisa computer in 1983. As part of an agreement allowing Xerox to buy shares in Apple at a favorable price, it also used concepts from the Xerox PARC Alto computer, which former Apple CEO Steve Jobs and other Lisa team members had previewed. This operating system consisted of the Macintosh Toolbox ROM and the "System Folder", a set of files that were loaded from disk. The name Macintosh System Software came into use in 1987 with System 5. Apple rebranded the system as Mac OS in 1996, starting officially with version 7.6, due in part to its Macintosh clone program. That program ended after the release of Mac OS 8 in 1997. The last major release of the system was Mac OS 9 in 1999.
Initial versions of the System Software ran one application at a time. With the Macintosh 512K, a system extension called the Switcher was developed to use this additional memory to allow multiple programs to remain loaded. The software of each loaded program used the memory exclusively; only when activated by the Switcher did the program appear, even the Finder's desktop. With the Switcher, the now familiar Clipboard feature allowed copy and paste between the loaded programs across switches including the desktop.
With the introduction of System 5 |
https://en.wikipedia.org/wiki/Synthwave | Synthwave (also called outrun, retrowave, or futuresynth) is an electronic music microgenre that is based predominantly on the music associated with action, science-fiction, and horror film soundtracks of the 1980s. Other influences are drawn from the decade's art and video games. Synthwave musicians often espouse nostalgia for 1980s culture and attempt to capture the era's atmosphere and celebrate it.
The genre developed in the mid-to late 2000s through French house producers, as well as younger artists who were inspired by the 2002 video game Grand Theft Auto: Vice City. Other reference points included composers John Carpenter, Jean-Michel Jarre, Vangelis (especially his score for the 1982 film Blade Runner), and Tangerine Dream. Synthwave reached wider popularity after being featured in the soundtracks of the 2011 film Drive (which included some of the genre's best-known songs), 2012 videogame Hotline Miami, 2017 film Thor: Ragnarok and the Netflix series Stranger Things.
Characteristics and related terms
Synthwave is a microgenre of electronic music that draws predominantly from 1980s films, video games, and cartoons, as well as composers such as John Carpenter, Jean-Michel Jarre, Vangelis, and Tangerine Dream. Other reference points include electronic dance music genres including house, synth, and nu-disco. It is primarily an instrumental genre, although there are occasional exceptions to the rule. Common tempos are between 80 and 118 BPM, while more upbeat tracks may be between 128 and 140 BPM.
"Outrun" is a synonym of synthwave that was later used to refer more generally to retro 1980s aesthetics such as VHS tracking artifacts, magenta neon, and gridlines. The term comes from the 1986 arcade racing game Out Run, which is known for its soundtrack that could be selected in-game and its 1980s aesthetic. According to musician Perturbator (James Kent), outrun is also its own subgenre, mainly instrumental, and often contains 1980s clichéd elements in the sound |
https://en.wikipedia.org/wiki/Ring%20learning%20with%20errors%20key%20exchange | In cryptography, a public key exchange algorithm is a cryptographic algorithm which allows two parties to create and share a secret key, which they can use to encrypt messages between themselves. The ring learning with errors key exchange (RLWE-KEX) is one of a new class of public key exchange algorithms that are designed to be secure against an adversary that possesses a quantum computer. This is important because some public key algorithms in use today will be easily broken by a quantum computer if such computers are implemented. RLWE-KEX is one of a set of post-quantum cryptographic algorithms which are based on the difficulty of solving certain mathematical problems involving lattices. Unlike older lattice based cryptographic algorithms, the RLWE-KEX is provably reducible to a known hard problem in lattices.
Background
Since the 1980s the security of cryptographic key exchanges and digital signatures over the Internet has been primarily based on a small number of public key algorithms. The security of these algorithms is based on a similarly small number of computationally hard problems in classical computing. These problems are the difficulty of factoring the product of two carefully chosen prime numbers, the difficulty to compute discrete logarithms in a carefully chosen finite field, and the difficulty of computing discrete logarithms in a carefully chosen elliptic curve group. These problems are very difficult to solve on a classical computer (the type of computer the world has known since the 1940s through today) but are rather easily solved by a relatively small quantum computer using only 5 to 10 thousand of bits of memory. There is optimism in the computer industry that larger scale quantum computers will be available around 2030. If a quantum computer of sufficient size were built, all of the public key algorithms based on these three classically hard problems would be insecure. This public key cryptography is used today to secure Internet web |
https://en.wikipedia.org/wiki/Spinach%20aptamer | The need for fluorescently tracking RNA rose as its roles in complex cellular functions has grown to not only include mRNA, rRNA, and tRNA, but also RNAi, siRNA, snoRNA, and lncRNA, among others. Spinach is a synthetically derived RNA aptamer born out of the need for a way of studying the role of RNAs at the cellular level. This aptamer was created using Systematic Evolution for Ligands by EXponential enrichment, or SELEX, which is also known as in vitro evolution. The aptamer was designed to be an RNA mimic of green fluorescent protein (GFP); similar to GFP for proteins, Spinach can be used for the fluorescently labeling RNA and tracking it in vivo. A method for inserting the Spinach sequence after an RNA sequence of interest is readily available.
GFP’s fluorophore is made up of three cyclized amino acids within the beta-barrel structure: Serine65-Tyrosine66-Glycine67. This structure, 4-hydroxybenzylidene imidazolinone (HBI) was the basis for the synthetic analogue used in the SELEX studies. Many derivatives of this structure were screened using SELEX, but the chosen fluorophore, 3,5-difluoro-4-hydroxybenzylidene imidazolinone (DFHBI), showed the best selective fluorescence with high quantum yield (0.72) when bound to the RNA sequence 24-2, deemed Spinach.
It was determined that DFHBI only binds Spinach in the phenolate form. At pH < 6.0, both the phenolic and phenolate forms are detected. At pH = 6.0, only the phenolate peak is detected. DFHBI is also incredibly robust and resists photobleaching over a long period of time as compared to HBI and EGFP. It is believed that the free exchange of bound and unbound ligand allows for this persistence. As the fluorophore of GFP and its derivatives are covalently bound to/a part of the protein, free exchange cannot happen and thus photobleaching results.
Spinach is an 84-nucleotide-long structure with two helical strands and an internal bulge with a G-quadruplex motif. It is at this G-quadruplex that the fluorophore bin |
https://en.wikipedia.org/wiki/Poincar%C3%A9%E2%80%93Miranda%20theorem | In mathematics, the Poincaré–Miranda theorem is a generalization of intermediate value theorem, from a single function in a single dimension, to functions in dimensions. It says as follows:
Consider continuous functions of variables, . Assume that for each variable , the function is nonpositive when and nonnegative when . Then there is a point in the -dimensional cube in which all functions are simultaneously equal to .
The theorem is named after Henri Poincaré - who conjectured it in 1883, and Carlo Miranda - who in 1940 showed that it is equivalent to the Brouwer fixed-point theorem. It is sometimes called the Miranda theorem or the Bolzano-Poincare-Miranda theorem.
Intuitive description
The picture on the right shows an illustration of the Poincaré–Miranda theorem for functions. Consider a couple of functions whose domain of definition is (i.e., the unit square). The function is negative on the left boundary and positive on the right boundary (green sides of the square), while the function is negative on the lower boundary and positive on the upper boundary (red sides of the square). When we go from left to right along any path, we must go through a point in which is . Therefore, there must be a "wall" separating the left from the right, along which is (green curve inside the square). Similarly, there must be a "wall" separating the top from the bottom, along which is (red curve inside the square). These walls must intersect in a point in which both functions are (blue point inside the square).
Generalizations
The simplest generalization, as a matter of fact a corollary, of this theorem is the following one. For every variable , let be any value in the range .
Then there is a point in the unit cube in which for all :
.
This statement can be reduced to the original one by a simple translation of axes,
where
are the coordinates in the domain of the function
are the coordinates in the codomain of the function.
By using topological deg |
https://en.wikipedia.org/wiki/%C3%96sterreichische%20Mediathek | The Österreichische Mediathek ("Austrian Mediathek") is the Austrian archive for sound recordings and videos on cultural and contemporary history. It was founded in 1960 as Österreichische Phonothek (Austrian Phonothek) by the Ministry of Education and has been a branch of the Technisches Museum Wien (Vienna Technical Museum) since 2001. As video and sound archive, the Österreichische Mediathek is responsible for the preservation of the Austrian audio-visual cultural heritage (with the exception of film on photographic carrier material and photography).
Duties and responsibilities
The Österreichische Mediathek collects audio-visual media published or produced in Austria, as well as international recordings relating to Austria. Further responsibilities include the selective recording of TV and radio programmes received in Austria. In order to preserve its collections, the Österreichische Mediathek specializes in digitisation and digital long-term archiving of audio and video material. Scientific projects review the archival stock with regards to content.
Collections
The collections of the Österreichische Mediathek mainly cover the subject areas music, literature, history, politics and science. The documents span the period from the 19th century to the present and include sound carriers such as instantaneous discs, shellac records, vinyl records, audio tapes, DAT cassettes, compact cassettes, CDs, DVDs, different video formats as well as various file formats.
The collections include (among others):
the collection of the Austrian Institute for Scientific Film (ÖWF; Österreichisches Bundesinstitut für den wissenschaftlichen Film);
live recordings of the National Assembly sessions of the Austrian Parliament;
live audio recordings of Burgtheater premiers from 1955 on;
the collection Rot-Weiß-Rot (Red-White-Red) with radio recordings from the post-war period;
the collection Günther Schifter with shellacs from the inter-war period;
recordings of selected radio |
https://en.wikipedia.org/wiki/Ximera | Ximera is a massive open online course by Ohio State University on Coursera and YouTube. The system was originally known as MOOCulus and Calculus One.
The course features over 25 hours of video and exercises. The instructor is Jim Fowler, an associate professor of mathematics at the Ohio State University. The course was available for the first time on Coursera during the Spring Semester of 2012–13. More than 47,000 students enrolled in the course, and several thousand successfully completed the 15-week course, which has been favorably reviewed.
Course Overview
The course begins with an introduction to functions and limits, and goes on to explain derivatives. By the end of this course, the student will have learnt the fundamental theorem of calculus, chain rule, derivatives of transcendental functions, integration, and applications of all these in the real world. This course is followed by Calculus Two.
Development
Ximera course was initially released on Coursera in the Spring Semester of 2012–13 under the name Calculus One. MOOCulus, an online platform that lets you practice Calculus was developed at the Ohio State University to provide students a place to practice Calculus problems. The platform, which was built using Ruby on Rails was built because Coursera didn't offer an engaging way to practice problems. The whole course, which consists of 200+ videos, was typeset as a textbook on April 10, 2014. The textbook, which is licensed under Creative Commons Attribution Non-commercial Share Alike License, incorporated some of its example and exercise problems from Elementary calculus: An approach using Infinitesimals.
References
External links
Ximera Official Website
Mathematics education
Calculus
American educational websites
Ohio State University
2012 establishments in Ohio |
https://en.wikipedia.org/wiki/Peak%20bone%20mass | Peak bone mass is the maximum amount of bone a person has during their life. It typically occurs in the early 20s in females and late 20s in males. Peak bone mass is typically lower in females than males, and is also lower in White people and Asians compared to black populations. A way to determine bone mass is to look at the size and density of the mineralized tissue in the periosteal envelope and using the bone mineral density (BMD) of a person can determine the strength of that bone. Research has shown that puberty affects bone size much more because during this time males typically undergo a longer bone maturation period than women which is why women are more prone to osteoporosis than men.
References
Physiology |
https://en.wikipedia.org/wiki/Cherokee%20ethnobotany | This is a list of plants documented to have been traditionally used by the Cherokee, and how they are used.
Adoxaceae (moschatel family)
Viburnum nudum var. cassinoides (commonly known as withe-rod, witherod viburnum, possumhaw, and wild raisin) – an infusion of the plant taken to prevent recurrent spasms, root bark used as a diaphoretic and a tonic, and compound infusion of it taken for fever, smallpox and ague. An infusion of the bark used as a wash for a sore tongue.
Viburnum prunifolium (commonly known as black haw) – an infusion of the plant taken to prevent recurrent spasms, root bark used as a diaphoretic and a tonic, and compound infusion of it taken for fever, smallpox and ague. An infusion of the bark used as a wash for a sore tongue.
Amaryllidaceae (amaryllis family)
Allium tricoccum (commonly known as ramp, ramps, spring onion, ramson, wild leek, wood leek, and wild garlic), eaten as food. The Cherokee also eat the plant as a spring tonic, for colds and for croup. They also use the warm juice for earaches.
Asteraceae (aster, daisy, sunflower, or composite family)
Cichorium intybus (common names are chicory or common chicory – an infusion of the root is used as a tonic for nerves. This plant is not native to the Americas and was introduced by colonists.
Pseudognaphalium obtusifolium ssp. obtusifolium (common names include old field balsam, rabbit tobacco and sweet everlasting), used in a compound for muscle cramps, local pains, and twitching, and apply an infusion of it over scratches made over muscle cramp pain. It is also used internally with Carolina vetch for rheumatism. A decoction is taken for colds, and the plant is also made into cough syrup. It is used in a sweat bath to treat various diseases, made into a warm liquid blown down throat for clogged throat (diphtheria), chewed for a sore mouth, smoked for asthma, and chewed for a sore throat.
Symphyotrichum novae-angliae (common names New England aster or Michaelmas daisy), poultice of |
https://en.wikipedia.org/wiki/Peerio | Peerio was a cross-platform end-to-end encrypted application that provided secure messaging, file sharing, and cloud file storage. Peerio was available as an application for iOS, Android, macOS, Windows, and Linux. Peerio (Legacy) was originally released on 14 January 2015, and was replaced by Peerio 2 on 15 June 2017. The app is discontinued.
Messages and user files stored on the Peerio cloud were protected by end-to-end encryption, meaning the data was encrypted in a way that could not be read by third parties, such as Peerio itself or its service providers. Security was provided by a single permanent key-password, which in Peerio was called an "Account Key".
The company, Peerio Technologies Inc., was founded in 2014 by Vincent Drouin. The intent behind Peerio was to provide a security program that is easier to use than the PGP standard.
Peerio was acquired by WorkJam, a digital workplace solutions provide, on January 13, 2019.
Features
Peerio allowed users to share encrypted messages and files in direct messages or groups that Peerio called "rooms".
Peerio "rooms" were offered as a team-oriented group chat, allowing administrative functionality to add and remove other users from the group chat.
Peerio allowed users to store encrypted files online, offering limited cloud storage for free with optional paid upgrades.
Peerio messages and files persist between logins and hardware, differing from ephemeral encrypted messaging apps which do not retain message or file history between logins or different devices.
Peerio supported application based multi-factor authentication.
Peerio allowed users to share animated GIFs.
Security
End-to-End Encryption
Peerio utilized end-to-end encryption and it was applied by default to all message and file data. End-to-end encryption is intended to encrypt data in a way that only the sender and intended recipients are able to decrypt, and thus read, the data.
Taken from Peerio's privacy policy:
"Peerio utilizes the NaCl ( |
https://en.wikipedia.org/wiki/Array%20Networks | Array Networks is an American networking hardware company. It sells network traffic encryption tools.
Array Networks was founded in 2000 by Lawrence Lu and is based in Milpitas, California. Originally called ClickArray Networks, it was renamed Array Networks in 2001 by then-incoming CEO Don Massaro who said the longer name "sounded too dot-commy". It received funding from the venture capital firm U.S. Venture Partners and the private equity firm H&Q Asia Pacific.
On May 13, 2009, Array Networks became the first non-Taiwan company to be listed on the Taiwan Stock Exchange. The company sold 54 million shares that had a total value of about $79 million. In 2009, 43% of the company's market share was in China, and its main product type sold there consisted of SSL VPN devices. It also had 200 employees in China, which CEO Michael Zhao said made China a "natural choice" for an IPO, In comparison, the company had 70 employees in Silicon Valley. but because China did not allow non-Chinese companies on their exchange, he narrowed the choices down to the NASDAQ and the Taiwan Stock Exchange. He chose the Taiwan Stock Exchange for two reasons: Array Networks had a strong business presence in Asia, and Taiwan Stock Exchange's listing fees were at least one third less than the NASDAQ's.
In 2011, CRN Magazine noted that most of Array Networks' sales is from Asia and that the company is "particularly strong" in China, Japan, and India.
In 2018, Array Networks was named to CIO Review's Top 10 Networking Companies of 2018.
In 2023 Array Networks Partnered with Aircom Group Africa having operations in Tanzania, Uganda, Kenya, Malawi and Zambia.
Products
APV series application delivery controllers
In 2008, Array Networks first released its AppVelocity devices that consisted of application delivery controllers for SSL acceleration, load balancing and traffic managementat layers 2-7 for enterprise data centers and Web sites. Later devices were introduced in 2013, 2014, and 2015. |
https://en.wikipedia.org/wiki/Biomin | Biomin is an animal health and nutrition company headquartered in Inzersdorf-Getzersdorf, Austria that develops and produces feed additives and premixes for livestock animals including swine, poultry, dairy and beef cattle as well as aquaculture.
The firm supplies customers in more than 100 countries throughout the world.
The Biomin Research Center (BRC) at Campus Tulln in Austria, employs 80 researchers engaged in applied basic research to lead the firm’s in-house R&D efforts, supported by a research network of 150 academic and research institutions worldwide.
Company history
1983: Erich Erber opened Biomin in a small warehouse in Pottenbrunn, Austria with a staff of three, starting with a livestock premix product line containing probiotics. Founder Erich Erber named the product and company based on the idea of combining “biological minerals” and so the brand name "Biomin" was born.
1985: Biomin bought Interpremix, a small premix factory, as its first production facility. The acquired firm also made a product called Antitox Plus, the first product available that ‘binds’ mycotoxins through a process known as adsorption.
1988: Biomin signed a research agreement with the University of Veterinary Medicine Vienna, Austria, and Dr. Josef Leibetseder to further improve the efficacy of Antitox Plus to a wider range of mycotoxins. Only several years later the second generation of the mycotoxin deactivation product was launched under the brand name Mycofix.
1994: The Biomin brand name was separated from the Interpremix product line. Erber AG became the holding company of Biomin.
2012: Biomin finalized acquisition of Microplus, a Germany-based feed additive producer, and rolled out Digestarom, a phytogenic feed additive.
2013: Biomin receives EU authorization for its multi-species probiotic, PoultryStar.
2015: Global Product introduction of Mycofix 5.0.
2016: Product introduction of Digestarom DC – TheFeedConverter
2017: Opening of first ERBER Group North American |
https://en.wikipedia.org/wiki/Federal%20Law%20on%20Protection%20of%20Personal%20Data%20Held%20by%20Individuals | The Ley Federal de Protección de Datos Personales en Posesión de los Particulares (Federal Law on Protection of Personal Data Held by Individuals; LFPDPPP), is a law of Mexico, approved by the Mexican Congress on April 27, 2010. The law aims to regulate the right to informational self-determination. The law was published on July 5, 2010, in the Official Gazette and entered into force on July 6, 2010. Its provisions apply to all natural or legal persons who carry out the processing of personal data in the applicable exercise of their activities. Companies such as banks, insurance companies, hospitals, schools, telecommunications companies, religious organizations, and professionals such as lawyers, doctors, and others, are required to comply with the provisions of this law.
Personal data, according to Article 3 Section V of the Act, is any information that could identify a person.
Regulatory background in Mexico
Before issuing the LFPDPPP in Mexico this right was expressly recognized only by the Federal Law of Transparency and Access to Public Government Information (applying to the public sector) and in the Law on Protection of Personal Data in the State of Colima (public and private).
Due to the regulatory landscape needed to meet international commitments, it was considered necessary to issue a law on the matter, so there would be a backup in the information.
Constitutional reforms of personal data
Chapter III, of the rights of the holders of personal data
Law takes the contents of the second paragraph of Article 16 of the Constitution and grant holders called "ARCO rights" whose acronym corresponds to:
Access : holders can know if their data is being processed.
Correction : the right to request that their data be modified.
Cancellation : holders may request that their data be canceled from the database for good cause.
Opposition : the right of individuals to prevent use of their information.
Chapter IV Exercise of the rights of access, rectification, cance |
https://en.wikipedia.org/wiki/Josef%20Sch%C3%A4chter | Josef Schächter (September 16, 1901 in Kundrynce, Galicia – March 27, 1994 Haifa) was an Austrian rabbi, philosopher and member of the Vienna Circle from 1925 to 1936.
Life
Schächter was the son of Shoel Schächter and Sarah, née Distenfield. He trained as a rabbi and was ordained in 1926. He worked as a Talmud teacher from 1922 to 1929 at the Hebraic school in Vienna and from 1935 to 1938 at the Bible Rambam Institute.
At the same time, he studied philosophy, primarily with Moritz Schlick and completed his studies in 1931 with a dissertation under Schlick with the title “Critical Account of N. Hartmann’s ‘Grundzüge einer Metaphysik der Erkenntnis’” („Kritische Darstellung von N. Hartmanns‚ Grundzüge einer Metaphysik der Erkenntnis‘“).
From 1925 to 1936 Schächter attended the meetings of the Vienna Circle. His work Prolegomena zu einer kritischen Grammatik (Prolegomena to a Critical Grammar) was published with a preface by Schlick in the Circle’s book series Schriften zur wissenschaftlichen Weltauffassung (Monographs on the Scientific World-Conception) in 1935. This work was influenced by Schlick, Friedrich Waismann, and Ludwig Wittgenstein. After Schlick’s murder, Schächter intermittently substituted Friedrich Waismann in running philosophical seminars.
In 1938 Schächter emigrated to Palestine. He taught at secondary schools, first in Tel Aviv until 1940 and then in Haifa until 1950. In 1943 he married the teacher Netti Dlugacz. From 1951 to 1952 he was superintendent of schools in the Israeli school system. Later he worked as a lecturer for Bible and Aggadah at the teacher’s seminar in Haifa.
At the beginning of the 1950s a group of his students founded the Kibbuz "Yodefat" in Galilee in order to put Schächter’s ideas into practice.
Schächter published numerous works on classical Judaism, on language, meaning, and belief in the context of science and religion.
Selected works
"Kritische Darstellung von N. Hartmanns 'Grundzüge einer Metaphysik der Erkenntnis |
https://en.wikipedia.org/wiki/Naemon | Naemon is an open-source computer system monitoring, network monitoring and infrastructure monitoring software application. Naemon offers monitoring and alerting services for servers, switches, applications, and services. It alerts the users when things go wrong and alerts them a second time when the problem has been resolved. Naemon was created in 2014 as a fork of Nagios.
It is available for Red Hat, CentOS, SUSE, Debian and Ubuntu Linux distribution.
Overview
Naemon is open source software licensed under the GNU GPL V2. It provides:
Monitoring of network services (SMTP, POP3, HTTP, NNTP, PING, etc.).
Monitoring of host resources (processor load, disk usage, etc.).
A simple plugin design that allows users to easily develop their own service checks.
Parallelized service checks.
Thruk Monitoring Webinterface.
The ability to define network host hierarchies using 'parent' hosts, allowing the detection of and distinction between hosts that are down or unreachable.
Contact notifications when service or host problems occur and get resolved (via e-mail, pager, or any user-defined method through plugin system).
The ability to define event handlers to be run during service or host events for proactive problem resolution
Automatic log file rotation
Support for implementing redundant monitoring hosts
See also
Comparison of network monitoring systems
Nagios
Icinga – Another Nagios fork
Shinken (software) – Another Nagios fork
References
External links
Official Naemon website
Internet Protocol based network software
Free network management software
Multi-agent network management software
Network analyzers |
https://en.wikipedia.org/wiki/Dwight%20Barkley | Dwight Barkley (born 7 January 1959) is a professor of mathematics at the University of Warwick.
Education and career
Barkley obtained his PhD in physics from the University of Texas at Austin in 1988.
He then spent one year at Caltech working with Philip Saffman followed by three years at Princeton University where he worked with Yannís Keverkidis and Steven Orszag. In 1992 he was awarded both NSF and NATO postdoctoral fellowships. In 1994 he joined the faculty at the University of Warwick.
Research
Barkley studies waves in excitable media such as the Belousov–Zhabotinsky reaction, heart tissue, and neurons. He is the author of the Barkley Model of excitable media
and discoverer of the role of Euclidean symmetry in spiral-wave dynamics.
In 1997, Laurette Tuckerman and Dwight Barkley coined the term "bifurcation analysis for time steppers" for techniques involving the modification of time-stepping computer codes to perform the tasks of bifurcation analysis. He has applied this approach in several areas of fluid dynamics, in particular to stability analysis of the cylinder wake and of the backward-facing step.
Barkley also works on the transition to turbulence in shear flows, including the formation of turbulent-laminar bands and the critical point for pipe flow. Exploiting an analogy with the transition between excitable and bistable media, Barkley derived a model for pipe flow which captures most features of transition to turbulence, in particular the behavior of turbulent regions called puffs and slugs.
He is also known for deriving an equation to estimate how long it will be until a child in a car asks the question "are we there yet?"
Awards
In 2005 he was awarded the J. D. Crawford Prize for outstanding research in nonlinear science, "for his development of high quality, robust and efficient numerical algorithms for pattern formation phenomena in spatially extended dynamical systems".
In 2008 he was elected Fellow of the American Physical Society "fo |
https://en.wikipedia.org/wiki/Logjam%20%28computer%20security%29 | Logjam is a security vulnerability in systems that use Diffie–Hellman key exchange with the same prime number. It was discovered by a team of computer scientists and publicly reported on May 20, 2015. The discoverers were able to demonstrate their attack on 512-bit (US export-grade) DH systems. They estimated that a state level attacker could do so for 1024-bit systems, then widely used, thereby allowing decryption of a significant fraction of Internet traffic. They recommended upgrading to at least 2048-bits for shared prime systems.
Details
Diffie–Hellman key exchange depends for its security on the presumed difficulty of solving the discrete logarithm problem. The authors took advantage of the fact that the number field sieve algorithm, which is generally the most effective method for finding discrete logarithms, consists of four large computational steps, of which the first three depend only on the order of the group G, not on the specific number whose finite log is desired. If the results of the first three steps are precomputed and saved, they can be used to solve any discrete log problem for that prime group in relatively short time. This vulnerability was known as early as 1992. It turns out that much Internet traffic only uses one of a handful of groups that are of order 1024 bits or less.
One approach enabled by this vulnerability that the authors demonstrated was using a man-in-the-middle network attacker to downgrade a Transport Layer Security (TLS) connection to use 512-bit DH export-grade cryptography, allowing them to read the exchanged data and inject data into the connection. It affects the HTTPS, SMTPS, and IMAPS protocols, among others. The authors needed several thousand CPU cores for a week to precompute data for a single 512-bit prime. Once that was done, however, individual logarithms could be solved in about a minute using two 18-core Intel Xeon CPUs. Its CVE ID is .
The authors also estimated the feasibility of the attack against 1024-bit |
https://en.wikipedia.org/wiki/Network%20simplex%20algorithm | In mathematical optimization, the network simplex algorithm is a graph theoretic specialization of the simplex algorithm. The algorithm is usually formulated in terms of a minimum-cost flow problem. The network simplex method works very well in practice, typically 200 to 300 times faster than the simplex method applied to general linear program of same dimensions.
History
For a long time, the existence of a provably efficient network simplex algorithm was one of the major open problems in complexity theory, even though efficient-in-practice versions were available. In 1995 Orlin provided the first polynomial algorithm with runtime of where is maximum cost of any edges. Later Tarjan improved this to using dynamic trees in 1997. Strongly polynomial dual network simplex algorithms for the same problem, but with a higher dependence on the numbers of edges and vertices in the graph, have been known for longer.
Overview
The network simplex method is an adaptation of the bounded variable primal simplex algorithm. The basis is represented as a rooted spanning tree of the underlying network, in which variables are represented by arcs, and the simplex multipliers by node potentials. At each iteration, an entering variable is selected by some pricing strategy, based on the dual multipliers (node potentials), and forms a cycle with the arcs of the tree. The leaving variable is the arc of the cycle with the least augmenting flow. The substitution of entering for leaving arc, and the reconstruction of the tree is called a pivot. When no non-basic arc remains eligible to enter, the optimal solution has been reached.
Applications
The network simplex algorithm can be used to solve many practical problems including,
Transshipment problem
Hitchcock transportation problem
Assignment problem
Chains and antichains in partially ordered sets
System of distinct representatives
Covers and matching in bipartite graphs
Caterer problem
References
External links
Solvin |
https://en.wikipedia.org/wiki/OpenMake%20Software | OpenMake Software formerly Catalyst System is a privately held, DevOps company.
OpenMake Software has offices in North America and Europe.
History
Openmake Software was founded as Catalyst Systems in 1995 by Tracy Ragan and Steven Taylor.
OpenMake Software entered into an OEM agreement with CA Technology in 1997 adding automated build functionality to CA Harvest for software configuration management. This relationship continues today.
In September 2012, OpenMake software acquired the assets of Trinem Consulting of Edinburgh, UK. Following a complete refresh and update to the UI, DeployHub (formerly Release Engineer) was made GA in October 2014.
Products
Openmake Meister for Build Automation.
Openmake DeployHub for Multi-Platform Application release automation (ARA).
Awards
OpenMake Software received the 19th Jolt Award in Change and Configuration Management] and was nominated for the 16th Jolt Award.
OpenMake Software has been recognized on the SD Times 100 list, or the top innovators and leaders in the software development including DevOps Leadership.
OpenMake Software was on the SD Times Top 100 list in 2006, 2007, 2008, 2017
OpenMake Software was also recognized by the Code Project Members Choice Award in 2009 and 2010 for Best In ALM, and 2011 for Best In Agile.
2016, 20 Most Promising Configuration Management Solution Providers by CIOReview.
References
Software companies established in 1995
Development software companies |
https://en.wikipedia.org/wiki/Neutral%20build | In software development, a neutral build is a software build that reflects the current state of the source code checked into the source code version control system by the developers, and done in a neutral environment (an environment not used for development).
A nightly build is a neutral build that takes place automatically. These typically take place when no one is likely to be working in the office so that there are no changes to the source code during the build. The results of the build are inspected by the arriving programmers, who generally place a priority on ensuring the recent changes to the source code have not broken the build process or functionality of the software. Nightly builds also ensure that the build tools have not broken due to system updates, and are therefore often run whether any source code has changed or not.
In contrast, continuous integration environments automatically rebuild the project whenever changes are checked in – often several times a day – and provide more immediate feedback; however, they do not necessarily include nightly builds. As a result, compiler and tool updates may break the ability to compile older projects easily without warning. Nonetheless, CI techniques are considered the more modern approach. CI jobs are often run on isolated virtual machines, and typically include automated testing as well.
When someone says a developer "broke the build", they are effectively saying that a developer checked in code which might very well have compiled (and hopefully also run properly) in their account, but does not compile (and therefore, cannot be run) in anyone else's account. This is typically due to additional developer-specific changes that were either not checked in, or (in the case of environment variables, etc.) were modifications to systems not under revision control. One of the most common cases is remembering to check in all modified files, but forgetting to add newly created files to the repository. If the other de |
https://en.wikipedia.org/wiki/Artur%20Oscar%20Lopes | Artur Oscar Lopes (born 17 October 1950 in the city of Rio de Janeiro) is a Brazilian writer and mathematician working on dynamical systems and ergodic theory. He is a professor at UFRGS, Porto Alegre.
He earned his Ph.D. from the IMPA in 1977 under the supervision of Jacob Palis.
He is a recipient of Brazil's National Order of Scientific Merit in mathematics. Since 2007 he has been a member of the Brazilian Academy of Sciences.
He is the author of the textbooks , , , and .
Selected publications
with A. Freire and R. Mañé:
with G. Contreras and Ph. Thieullen:
References
21st-century Brazilian mathematicians
1950 births
Living people
Textbook writers
Members of the Brazilian Academy of Sciences
Instituto Nacional de Matemática Pura e Aplicada alumni
Academic staff of the Federal University of Rio Grande do Sul
Dynamical systems theorists
People from Rio de Janeiro (city)
20th-century Brazilian mathematicians |
https://en.wikipedia.org/wiki/List%20of%20lost%20fossil%20sites | This list of lost fossil sites is a list of localities in which abundant, well-preserved, or scientifically significant fossils were once found but are no longer available due to the destruction, inaccessibility or overcollection of the fossils preserved therein.
The list
See also
List of lost, damaged, or destroyed dinosaur specimens
Paleontological sites
Paleontology lists |
https://en.wikipedia.org/wiki/Over%20Thirty%20Months%20Scheme | The Over Thirty Months Scheme is a scheme to keep older cattle out of the human foodchain. It is based on the "Over Thirty Months Rule" introduced in the UK on 3 April 1996, as one of several measures to manage the risk associated with bovine spongiform encephalopathy (BSE).
By November 1997, about 1,772,000 cows had been slaughtered under the scheme, with compensation of 1 ecu per kg, reduced to .9 ecu in October 1996, and later to .8 ecu, and later still a 560 kg cap per animal.
The Royal Society of Edinburgh reviewed the scheme in 2003, in view of the steps taken to date, and the introduction of EU testing and inspection regime in 2001.
In November 2004 Farmer's Weekly announced that DEFRA intended to scrap the scheme "as early as July 2005". The scheme was finally abolished in November 2005. At the same time it became illegal to send cattle born before August 1996 to an abattoir for human consumption.
See also
Feed Ban
Specified Risk Material Control
Mechanically recovered meat
References
External links
Food Standards Agency
Department for Environment, Food and Rural Affairs (DEFRA)
European Union Food and Feed Safety website
CJD Surveillance Unit Edinburgh
Food safety |
https://en.wikipedia.org/wiki/Tip-enhanced%20Raman%20spectroscopy | Tip-enhanced Raman spectroscopy (TERS) is a variant of surface-enhanced Raman spectroscopy (SERS) that combines scanning probe microscopy with Raman spectroscopy. High spatial resolution chemical imaging is possible via TERS, with routine demonstrations of nanometer spatial resolution under ambient laboratory conditions, or better at ultralow temperatures and high pressure.
The maximum resolution achievable using an optical microscope, including Raman microscopes, is limited by the Abbe limit, which is approximately half the wavelength of the incident light. Furthermore, with SERS spectroscopy the signal obtained is the sum of a relatively large number of molecules. TERS overcomes these limitations as the Raman spectrum obtained originates primarily from the molecules within a few tens of nanometers of the tip.
Although the antennas’ electric near-field distributions are commonly understood to determine the spatial resolution, recent experiments showing subnanometer-resolved optical images put this understanding into question. This is because such images enter a regime in which classical electrodynamical descriptions might no longer be applicable and quantum plasmonic and atomistic effects could become relevant.
History
The earliest reports of tip enhanced Raman spectroscopy typically used a Raman microscope coupled with an atomic force microscope. Tip-enhanced Raman spectroscopy coupled with a scanning tunneling microscope (STM-TERS) has also become a reliable technique, since it utilizes the gap mode plasmon between the metallic probe and the metallic substrate.
Equipment
Tip-enhanced Raman spectroscopy requires a confocal microscope, and a scanning probe microscope. The optical microscope is used to align the laser focal point with the tip coated with a SERS active metal. The three typical experimental configurations are bottom illumination, side illumination, and top illumination, depending on which direction the incident laser propagates towards the samp |
https://en.wikipedia.org/wiki/Hydra%20effect | The hydra effect or hydra paradox owes its name to the Greek legend of the Lernaean Hydra which grew two heads for each one cut off, and is used figuratively for counter-intuitive effects of actions to reduce a problem which result in stimulating its multiplication. Most notably, scientists have proposed that ecological systems can exhibit a hydra effect when "a higher death rate in a particular species ultimately increases the size of its population". The hypothesis is suggested to have implications for the eradication of pests, and resource management. There are also said to be indications that reducing the death rate can shrink a population.
The hydra effect has also been used about negative outcomes when shutting down torrent sites which come back in more incarnations, and is cited by those opposing the war on drugs, COVID-19 lockdowns, and targeted killing as counter-productive effects. In 2016 the site Torrentz shut down its operations without further information for the cause of the shut-down. Within two weeks, there were 3 torrent sites that were built as replacements for Torrentz. Similarly, after the torrent website The Pirate Bay was shut down in December 2014, it reincarnated with hundreds of copies within a week.
See also
Braess's paradox
Paradox of enrichment
Streisand effect
Cobra effect
References
BitTorrent
Internet culture |
https://en.wikipedia.org/wiki/Worldline%20SA | Worldline SA is a French multinational payment and transactional services company founded in 1974.
Services offered by Worldline in the areas of Merchant Services; Terminals, Solutions & Services; Financial Services and Mobility & e-Transactional Services include domestic and cross-border commercial acquiring, both in-store and online, highly-secure payment transaction processing, a broad portfolio of payment terminals as well as e-ticketing and digital services in the industrial environment.
In 2022 Worldline generated a proforma revenue of €4.36 billion.
History
1970–2004: beginnings and diversification
Worldline's first activities in processing payment card transactions date back to the 1970s, first under the name of Sligos - resulting from the merger in 1973 between Sliga, a subsidiary of the Crédit Lyonnais bank, and Cegos - then, from the 1980s, with Segin, specializing in particular in transactions on Minitel. From the 1990s, the company diversified into online payments with Axime, which gave birth - after its merger with Sligos - to the Atos Group.
2004–2014: integration into Atos
In 2004, Atos integrated its payment and online services activities into a division then called Atos Worldline.
In 2006, Atos Worldline included in its scope the Belgian companies Banksys, responsible for securing and guaranteeing electronic payments in Belgium, and Bank Card Company (BCC), specializing in the management of payment systems linked to the country's two largest credit card networks, Visa and MasterCard. The two companies, employing around 1,100 people with a turnover of €309 million, were bought out from their four shareholders: Dexia, Fortis, ING, and KBC.
In 2010, Atos Worldline acquired and integrated the Indian company Venture Infotek for around $100 million. The company, specializing in payment and transaction processing, had merchants, as well as banks and government programs, as clients locally.
In 2011, Atos acquired the IT services activities of S |
https://en.wikipedia.org/wiki/List%20of%20music%20software | This is a list of software for creating, performing, learning, analyzing, researching, broadcasting and editing music. This article only includes software, not services.
For streaming services such as iHeartRadio, Pandora, Prime Music, and Spotify, see Comparison of on-demand streaming music services.
For storage, uploading, downloading and streaming of music via the cloud, see Comparison of online music lockers.
This list does not include discontinued historic or legacy software, with the exception of trackers that are still supported.
For example, the company Ars Nova produces music education software, and its software program Practica Musica has remnants of the historic Palestrina software. Practica will be listed here, but not Palestrina.
If a program fits several categories, such as a comprehensive digital audio workstation or a foundation programming language (e.g. Pure Data), listing is limited to its top three categories.
Types of music software
CD ripping software
Brasero
CDex
Exact Audio Copy
fre:ac
k3b
Choir and learn-to-sing software
This section includes both choir software and learn-to-sing software. For music learning software, see music education software.
Cantor (music software)
SingingCoach
DJ software
Cross/CrossDJ
Deckadance
djay
Final Scratch
Mixxx
Serato
Traktor
Rekordbox
VirtualDJ
Digital audio workstation (DAW) software
Ableton Live
ACID Pro
Ampedstudio
Ardour
Audacity
Audiotool
Bitwig Studio
Cakewalk by BandLab
Cubase
Digital Performer
FL Studio
GarageBand
HighC
LMMS
Logic Pro
Maschine
MetaSynth
Mixcraft
Nuendo
Mixbus
MuLab
Orion Studio
Pro Tools
Qtractor
REAPER
Renoise
Rosegarden
Samplitude
Sonic Pi
Soundtrap
Studio One
Waveform
Zynewave Podium
Zrythm, in C, plugins: Scheme, ECMAScript
Computer music software
* ChucK
Csound
Director Musices
List of Generative music software
JFugue
Kyma (sound design language)
Keykit
Max/MSP
Pure Data
Real-time Cmix
SuperCollider
Internet, RSS, broadcast musi |
https://en.wikipedia.org/wiki/Differential%20graded%20module | In algebra, a differential graded module, or dg-module, is a -graded module together with a differential; i.e., a square-zero graded endomorphism of the module of degree 1 or −1, depending on the convention. In other words, it is a chain complex having a structure of a module, while a differential graded algebra is a chain complex with a structure of an algebra.
In view of the module-variant of Dold–Kan correspondence, the notion of an -graded dg-module is equivalent to that of a simplicial module; "equivalent" in the categorical sense; see below.
The Dold–Kan correspondence
Given a commutative ring R, by definition, the category of simplicial modules are simplicial objects in the category of R-modules; denoted by sModR. Then sModR can be identified with the category of differential graded modules which vanish in negative degrees via the Dold-Kan correspondence.
See also
Differential graded Lie algebra
References
Henri Cartan, Samuel Eilenberg, Homological algebra
Available online.
Algebra |
https://en.wikipedia.org/wiki/Resistance%20paper | Resistance paper, also known as conductive paper and by the trade name Teledeltos paper is paper impregnated or coated with a conductive substance such that the paper exhibits a uniform and known surface resistivity. Resistance paper and conductive ink were commonly used as an analog two-dimensional electromagnetic field solver. Teledeltos paper is a particular type of resistance paper.
References
Analog computers
Electrical resistance and conductance |
https://en.wikipedia.org/wiki/Features%20new%20to%20Windows%2010 | Windows 10 introduced a number of new elements, including the option to use a touch-optimized interface (known as tablet mode) or a traditional desktop interface similar to that of Windows 7 along with live tiles from Windows 8. However, unlike previous versions of Windows, where most, if not all, major features for that release were completed by its RTM, Windows 10 continues to receive major features and changes beyond its initial release to market. Microsoft describes Windows 10 as an "operating system as a service" that will receive ongoing updates to its features and functionality. This is supplemented with the ability for enterprise environments to receive non-critical updates at a slower pace, and to use long-term support milestones that will only receive critical updates, such as security patches, over their ten-year lifespan of support.
Version 1507
Windows 10, codenamed "Threshold 1", is the first release of Windows 10. It carries the build number 10.0.10240. While the build itself doesn't contain the version number, Microsoft retroactively named this version 1507, standing for July 2015 and matching the versioning scheme for later updates. "Threshold 1" was announced on an event on September 30, 2014, with a first preview following the day after. The final release was made available to Windows Insiders on July 15, 2015, followed by a public release on July 29, 2015, as a free upgrade to Windows 7 and Windows 8.1.
The Threshold 1 release of Windows 10 is only supported for users of the Long Term Servicing Branch (LTSB).
New feature indicated for this release are only those added since Windows 8.1 Update 1, released in April 2014.
Bundled apps
The Mail app adds user-configurable swipe gesture controls and POP3 email support. Google Calendar support is added to the Calendar app. The Settings app is expanded to have similar functionality as the Control Panel, albeit with a Metro-style user interface. The Map app can download maps for offline use.
Mic |
https://en.wikipedia.org/wiki/List%20of%20features%20removed%20in%20Windows%2010 | Windows 10 is a version of Windows NT and the successor of Windows 8.1. Some features of the operating system were removed in comparison to Windows 8 and Windows 8.1, and further changes in features offered have occurred within subsequent feature updates to Windows 10. Following is a list of these.
Features removed in version 1507: (RTM)
Windows shell
The charms are removed, and replaced with the Action Center. In Windows Runtime apps, a menu button appears on the title bar that can be used to access the functions that previously required its usage.
Users are no longer able to synchronize Start menu layouts across all devices associated with a Microsoft account. A Microsoft developer justified the change by explaining that a user may have different applications they want to emphasize on each device that they use, rather than use the same configuration across each device. The ability to automatically install a Windows app across all devices associated with an account was also removed.
Dragging and dropping items from or within the start menu and the list of recent files (accessible from right click on a taskbar shortcut) is no longer possible.
System components
User control over Windows Updates is removed (except in enterprise versions). In earlier versions, users could opt for updates to be installed automatically, or to be notified so they could update as and when they wished, or not to be notified; and they could choose which updates to install, using information about the updates. Windows 10 Pro and Enterprise users may be configured by an administrator to defer updates, but only for a limited time. Under the Windows end-user license agreement, users consent to the automatic installation of all updates, features and drivers provided by the service, and implicitly consent "without any additional notice" to the possibility of features being modified or removed. The agreement also states, specifically for users of Windows 10 in Canada, that they may pause upd |
https://en.wikipedia.org/wiki/Yoneda%20product | In algebra, the Yoneda product (named after Nobuo Yoneda) is the pairing between Ext groups of modules:
induced by
Specifically, for an element , thought of as an extension
and similarly
we form the Yoneda (cup) product
Note that the middle map factors through the given maps to .
We extend this definition to include using the usual functoriality of the groups.
Applications
Ext Algebras
Given a commutative ring and a module , the Yoneda product defines a product structure on the groups , where is generally a non-commutative ring. This can be generalized to the case of sheaves of modules over a ringed space, or ringed topos.
Grothendieck duality
In Grothendieck's duality theory of coherent sheaves on a projective scheme of pure dimension over an algebraically closed field , there is a pairing where is the dualizing complex and given by the Yoneda pairing.
Deformation theory
The Yoneda product is useful for understanding the obstructions to a deformation of maps of ringed topoi. For example, given a composition of ringed topoi and an -extension of by an -module , there is an obstruction class which can be described as the yoneda product
where
and corresponds to the cotangent complex.
See also
Ext functor
Derived category
Deformation theory
Kodaira–Spencer map
References
External links
Universality of Ext functor using Yoneda extensions
Abstract algebra |
https://en.wikipedia.org/wiki/Virtual%20Museum%20of%20Soviet%20Repression%20in%20Belarus | The Virtual Museum of Soviet Repression in Belarus () is a non-commercial project of oral history from historians and other scientists from Belarus. Created as a virtual museum, it covers Soviet repression in Belarus.
Background
In 2007, the Belarusian Christian Democracy party launched a campaign called "Repentance". The campaign began meeting with former prisoners of camps, record their memories, and collect materials on the subject of repression.
In 2012, an independent civic initiative was formed, which began to create a Virtual museum of Soviet repression in Belarus. The basis for the museum was materials collected during the campaign "Repentance".
In 2014, a website for the virtual museum was created. The museum is only available online; there is currently as of 2020 no physical exhibition of the material.
Concept of the museum
The museum operates with an approach of oral history by presenting recordings of inhabitants of Belarus who report on their personal experiences with Repression during the Soviet time. The museum covers a part of Belarusian history that is mainly excluded from current Belarusian official historiography.
The content of the exhibition consists of recordings of audio- and video-recollections, photographs, documents, and statistics connected with repression in Belarus. Also, a chronicle of the repression in Belarus and some historical articles are included.
, the museum includes seven showrooms:
Soviet myths
Chronology of repression
Victims of repression
The system of repression
Anti-Soviet resistance
Rehabilitation
Commemorative culture
Among the museum's special features are, besides the narrative interviews, inter alia interactive maps of the NKVD in Belarus, and memorials on repression.
In addition the museum offers a victim-search option with more than 30.000 records.
Partners
Among the partners of this project are Konrad Adenauer Foundation and the Belarusian Oral History Archive project.
See also
Soviet repres |
https://en.wikipedia.org/wiki/Ultrasonic%20pulse%20velocity%20test | An ultrasonic pulse velocity test is an in-situ, nondestructive test to check the quality of concrete and natural rocks. In this test, the strength and quality of concrete or rock is assessed by measuring the velocity of an ultrasonic pulse passing through a concrete structure or natural rock formation.
This test is conducted by passing a pulse of ultrasonic through concrete to be tested and measuring the time taken by pulse to get through the structure. Higher velocities indicate good quality and continuity of the material, while slower velocities may indicate concrete with many cracks or voids.
Ultrasonic testing equipment includes a pulse generation circuit, consisting of electronic circuit for generating pulses and a transducer for transforming electronic pulse into mechanical pulse having an oscillation frequency in range of 40 kHz to 50 kHz, and a pulse reception circuit that receives the signal.
The transducer, clock, oscillation circuit, and power source are assembled for use. After calibration to a standard sample of material with known properties, the transducers are placed on opposite sides of the material. Pulse velocity is measured by a simple formula:
.
Applications
Ultrasonic Pulse Velocity can be used to:
Evaluate the quality and homogeneity of concrete materials
Predict the strength of concrete
Evaluate dynamic modulus of elasticity of concrete,
Estimate the depth of cracks in concrete.
Detect internal flaws, cracks, honeycombing, and poor patches.
The test can also be used to evaluate the effectiveness of crack repair. Ultrasonic testing is an indicative and other tests such as destructive testing must be conducted to find the structural and mechanical properties of the material.
Regulation and standards
A procedure for ultrasonic testing is outlined in ASTM C597 - 09.
In India, till 2018 ultrasonic testing was conducted according to IS 13311-1992.From 2018, procedure and specification for Ultrasonic pulse velocity test is outlined |
https://en.wikipedia.org/wiki/Eodermdrome | An eodermdrome is a form of word play wherein a word (or phrase) is formed from a set of letters (or words) in such a way that it has a non-planar spelling net. Gary S. Bloom, Allan Gewirtz, John W. Kennedy, and Peter J. Wexler first described the eodermdrome in May 1980, and it subsequently became more widely known after publication in Word Ways: The Journal of Recreational Linguistics in August 1980.
It is well illustrated by the word eodermdrome itself. Eodermdrome contains only the letters e, o, d, r and m. When plotted as a graph, the lettered vertices are sequentially connected by edges to spell a word. If the graph is non-planar, the word is an eodermdrome. The graph of eodermdrome is the non-planar graph K5.
Eckler searched for all eodermdromes in Webster's Dictionary. One of his examples is supersaturates. The graph of the complete word contains a subgraph which is a subdivision of the non-planar graph K3,3, and as such is itself non-planar.
By extension, the vertices can be identified with words instead of letters to form eodermdromic phrases or sentences.
The concept has been studied within both mathematics and linguistics.
See also
Graph theory
Kuratowski's theorem
Palindrome
References
Application-specific graphs
Word play
Planar graphs |
https://en.wikipedia.org/wiki/Awwwards | Awwwards (Awwwards Online SL) is a professional web design and development competition body. It aims to recognize and promote the best of innovative web design. It is a website competition that developers can submit to. The best year-round submissions are awarded at the Awwwards conference and prize-giving ceremony, which take place in various cities across the United States and Europe.
Nomination process
In the first phase of the nomination process, web designers submit their work through Awwwards' website for consideration for Site of the Day. The work is then judged by the Awwwards community and an international jury panel composed of designers, developers, and agencies. The best daily sites are also published in Awwward's year-end "The 365 Best Websites Around the World" book.
In the second voting phase, the Site of the Month is chosen. Site of the Month winners proceed to the final judging phase of the competition: Site of the Year. This award is given out at the Awwwards conference and prize-giving ceremony.
Jury
The jury consists of multidisciplinary designers, developers, journalists, and agencies from across the globe. The panel assesses the talent, effort, technicality, and insight that goes into the web projects submitted for consideration.
Awards granted
Members of the Awwwards Jury score nominees on four separate criteria: design, creativity, usability and content. High scoring sites can win several different types of awards.
Daily
Honorable Mention
All websites awarded 6.5 or above receive an Honorable Mention.
Site of the Day
Site of the Day recognizes aesthetic, usability, and technical achievements in web design innovation. Sites remain in competition for Site of the Day for three months from the submission date. Only the highest scoring sites are awarded Site of the Day.
Developer Award
The developer's award was created in partnership with Microsoft, and it awards developers who have achieved significant web development programming |
https://en.wikipedia.org/wiki/BioSentinel | BioSentinel is a lowcost CubeSat spacecraft on a astrobiology mission that will use budding yeast to detect, measure, and compare the impact of deep space radiation on DNA repair over long time beyond low Earth orbit.
Selected in 2013 for a 2022 launch, the spacecraft will operate in the deep space radiation environment throughout its 18-month mission. This will help scientists understand the health threat from cosmic rays and deep space environment on living organisms and reduce the risk associated with long-term human exploration, as NASA plans to send humans farther into space than ever before. The spacecraft has been launched on 16 November 2022 as part of the Artemis 1 mission.
In August 2023, NASA extended BioSentinel's mission into November 2024.
The mission is being developed by NASA Ames Research Center.
Background
BioSentinel is one of ten low-cost CubeSat missions that flew as secondary payloads aboard Artemis 1, the first test flight of NASA's Space Launch System. The spacecraft was deployed in cis-lunar space as NASA's first mission to send living organisms beyond low Earth orbit since Apollo 17 in 1972.
Objective
The primary objective of BioSentinel is to develop a biosensor using a simple model organism (yeast) to detect, measure, and correlate the impact of space radiation to living organisms over long durations beyond low Earth orbit (LEO) and into heliocentric orbit. While progress has been made with simulations, no terrestrial laboratory can duplicate the unique space radiation environment.
Biological science
The BioSentinel biosensor uses the budding yeast Saccharomyces cerevisiae to detect and measure DNA damage response after exposure to the deep space radiation environment. Two yeast strains were selected for this mission: a wild type strain proficient in DNA repair, and a strain defective in the repair of DNA double strand breaks (DSBs), deleterious lesions generated by ionizing radiation. Budding yeast was selected not only because o |
https://en.wikipedia.org/wiki/Mapping%20spectrum | In algebraic topology, the mapping spectrum of spectra X, Y is characterized by
References
Algebraic topology |
https://en.wikipedia.org/wiki/Budapest%20Reference%20Connectome | The Budapest Reference Connectome server computes the frequently appearing anatomical brain connections of 418 healthy subjects. It has been prepared from diffusion MRI datasets of the Human Connectome Project into a reference connectome (or brain graph), which can be downloaded in CSV and GraphML formats and visualized on the site in 3D.
Features
The Budapest Reference Connectome has 1015 nodes, corresponding to anatomically identified gray matter areas. The user can set numerous parameters and the resulting consensus connectome is readily visualized on the webpage. Users can zoom, rotate, and query the anatomical label of the nodes on the graphical component.
Background
Budapest Reference Connectome is a consensus graph of the brain graphs of 96 subjects in Version 2 and 418 subjects in Version 3. Only those edges are returned which are present in a given percentage of the subjects. Each of the selected edges has a certain weight in each of the graphs containing that edge, so these multiple weights are combined into a single weight, by taking either their mean (i.e., average) or median. The user interface allows the customization of these parameters: the user can select the minimum frequency of the edges returned. There is an option for viewing and comparing the female or male reference connectomes. The connectomes of women contain significantly more edges than those of men, and a larger portion of the edges in the connectomes of women run between the two hemispheres.
Discoveries
The Budapest Reference Connectome has led the researchers to the discovery of the Consensus Connectome Dynamics of the human brain graphs. The edges appeared in all of the brain graphs form a connected subgraph around the brainstem. By allowing gradually less frequent edges, this core subgraph grows continuously, as a shrub. The growth dynamics may reflect the individual brain development and provide an opportunity to direct some edges of the human consensus brain graph.
References |
https://en.wikipedia.org/wiki/Moedomo%20Soedigdomarto | Moedomo Soedigdomarto, also spelled Mudomo Sudigdomarto, (29 November 1927, Magetan – 5 November 2005, Bandung) was an Indonesian mathematician, educator and professor at the Bandung Institute of Technology, of which he was rektor.
Soedigdomarto was one of the first Indonesians to obtain a Ph.D. in mathematics, which he earned from the University of Illinois Urbana-Champaign, with a dissertation titled "A Representation Theory for the Laplace Transform of Vector-Valued Functions", in 1959 at the age of 32, under the orientation of Robert Gardner Bartle.
Soedigdomarto was the first Indonesian to have a paper recorded in Mathematical Reviews (Moedomo and J. J. Uhl, Jr. "Radon-Nikodym theorems for the Bochner and Pettis integrals" published in the Pacific Journal of Mathematics in 1971).
References
1927 births
2005 deaths
Indonesian mathematicians
Academic staff of Bandung Institute of Technology
Mathematical analysts
University of Illinois Urbana-Champaign alumni |
https://en.wikipedia.org/wiki/Water%20Science%20and%20Technology | Water Science and Technology is a monthly peer-reviewed scientific journal covering all aspects of the management of water quality. It was established in 1969 and is published by IWA Publishing. The editor-in-chief is Wolfgang Rauch (University of Innsbruck).
Abstracting and indexing
The journal is abstracted and indexed in the Science Citation Index Expanded, Current Contents/Agriculture, Biology & Environmental Sciences, Current Contents/Engineering, Computing & Technology, BIOSIS Previews, Elsevier Biobase, and Scopus.
References
External links
English-language journals
Monthly journals
Academic journals published by learned and professional societies
Academic journals established in 1969
Hydrology journals
Creative Commons Attribution-licensed journals |
https://en.wikipedia.org/wiki/Chirp%20compression | The chirp pulse compression process transforms a long duration frequency-coded pulse into a narrow pulse of greatly increased amplitude. It is a technique used in radar and sonar systems because it is a method whereby a narrow pulse with high peak power can be derived from a long duration pulse with low peak power. Furthermore, the process offers good range resolution because the half-power beam width of the compressed pulse is consistent with the system bandwidth.
The basics of the method for radar applications were developed in the late 1940s and early 1950s, but it was not until 1960, following declassification of the subject matter, that a detailed article on the topic appeared the public domain. Thereafter, the number of published articles grew quickly, as demonstrated by the comprehensive selection of papers to be found in a compilation by Barton.
Briefly, the basic pulse compression properties can be related as follows. For a chirp waveform that sweeps over a frequency range F1 to F2 in a time period T, the nominal bandwidth of the pulse is B, where B = F2 – F1, and the pulse has a time-bandwidth product of T×B. Following pulse compression, a narrow pulse of duration τ is obtained, where τ ≈ 1/B, together with a peak voltage amplification of .
The chirp compression process – outline
In order to compress a chirp pulse of duration T seconds, which sweeps linearly in frequency from F1 Hz to F2 Hz, a device with the characteristics of a dispersive delay line is required. This provides most delay for the frequency F1, the first to be generated, but with a delay which reduces linearly with frequency, to be T second less at the end frequency F2. Such a delay characteristic ensures that all frequency components of the chirp pass through the device, to arrive at the detector at the same time instant and so augment one another, to produce a narrow high amplitude pulse, as shown in the figure:
An expression describing the required delay characteristic is
This has |
https://en.wikipedia.org/wiki/TidalCycles | TidalCycles (also known as "Tidal") is a live coding environment which is designed for musical improvisation and composition. In particular, it is a domain-specific language embedded in Haskell, and is focused on the generation and manipulation of audiovisual patterns. It was originally designed for heavily percussive and polyrhythmic grid-based music, but it now uses a flexible and functional reactive representation for patterns, by using rational time. Therefore, Tidal may be applied to a wide range of musical styles, although its cyclic approach to time means that it affords use in repetitive styles such as Algorave.
Background
TidalCycles was created by Alex McLean who also coined the term Algorave, and is a domain-specific language embedded in Haskell, which focuses on the generation and manipulation of audiovisual patterns. Tidal's representation of rhythm is based on metrical cycles, which is inspired by Indian classical music, supporting polyrhythmic and polymetric structures using a flexible, functional reactive representation for patterns, and rational time. This programme doesn't produce sound itself, but via the SuperCollider sound environment through the SuperDirt framework, via MIDI, or Open Sound Control.
Tidal is also used widely in academic research, including representation in music AI, as a language in network music, and in electronic literature.
Tidal is widely used at Algorave algorithmic dance music events, as well as being used on high profile music releases. It has been featured on BBC Radio 3's New Music Show.
Artists using TidalCycles
Richard Devine
Beatrice Dillon
Lil Data
digital selves
MIRI KAT
Daniel M Karlsson
65daysofstatic
Benjamin Wynn
Hsien-Yu Cheng
References
External links
Digital art
Computer programming
Live coding
Algorave
Functional programming
Music technology
2009 establishments |
https://en.wikipedia.org/wiki/Photosynthetic%20state%20transition | In photosynthesis, state transitions are rearrangements of the photosynthetic apparatus which occur on short time-scales (seconds to minutes). The effect is prominent in cyanobacteria, whereby the phycobilisome light-harvesting antenna complexes alter their preference for transfer of excitation energy between the two reaction centers, PS I and PS II. This shift helps to minimize photodamage caused by reactive oxygen species (ROS) under stressful conditions such as high light, but may also be used to offset imbalances between the rates of generating reductant and ATP.
The phenomenon was first discovered in unicellular green algae, and may also occur in plants. However, in these organisms it occurs by a different mechanism, which is not as well understood. The plant/algal mechanism is considered functionally analogous to the cyanobacterial mechanism but involves completely different components. The foremost difference is the presence of fundamentally different types of light-harvesting antenna complexes: plants and green algae use an intrinsically-bound membrane complex of chlorophyll a/b binding proteins for their antenna, instead of the soluble phycobilisome complexes used by cyanobacteria (and certain algae).
References
Biochemistry |
https://en.wikipedia.org/wiki/Emojipedia | Emojipedia is an emoji reference website which documents the meaning and common usage of emoji characters in the Unicode Standard. Most commonly described as an emoji encyclopedia or emoji dictionary, Emojipedia also publishes articles and provides tools for tracking new emoji characters, design changes and usage trends. It has been owned by Zedge since 2021.
Emojipedia is a non-voting associate member of The Unicode Consortium.
History
Jeremy Burge created Emojipedia in 2013, and told the Hackney Gazette "the idea came about when Apple added emojis to iOS 6, but failed to mention which ones were new".
Emojipedia rose to prominence with the release of Unicode 7 in 2014, when The Register reported the "online encyclopedia of emojis has been chucked offline after vast numbers of people visited the site" in relation to the downtime experienced by the site at the time.
In 2015, Emojipedia entered its first partnership with Quartz to release an app that allowed users access previously-hidden country flag emojis on iOS.
Emojipedia told Business Insider in early 2016 that it served "over 140 million page views" per year, and was profitable. In mid-2016, Emojipedia "urged Apple to rethink its plan to convert the handgun emoji symbol into a water pistol icon" citing cross-platform confusion.
In 2017, The Library of Congress launched the Web Cultures Web Archive which featured a history of memes, gifs, and emojis from references including Emojipedia, Boing Boing and GIPHY.
The Sydney Morning Herald reported that the site served 23 million page views in October 2017. Total page views for 2013–2019 were said to have reached one billion by February 2019. The New Yorker reported Emojipedia served 50 million page views in April 2020.
In August 2021, Emojipedia was acquired by Zedge for an undisclosed amount.
In February 2022, Keith Broni became Emojipedia's editor-in-chief, taking over from founder and chief emoji officer Jeremy Burge.
In July 2022, Emojipedia added mul |
https://en.wikipedia.org/wiki/Ganjam%20Kewda%20Rooh | Ganjam Kewda Rooh (Screw pine, IPA://, Pandanus fascicularis) is a plant native to the Indian state of Odisha primarily in the Ganjam district. Kewda has been identified as a Geographical Indications in India.
They are found between the rivers Rushikulya on the north and Bahuda on the south. It is an economically important species due to its male inflorescence which are used for the fragrant tender white spathes covering the flowers. The perfumery products including Kewda attar, Kewda water and Kewda oil (rooh Kewda) derived from this plant are. The Ganjam district of Odisha supplies about 85-90% of the India's kewda essence. Kewda grows in the 45 km x 15 km coastal belt along the Bay of Bengal.
Kewda industry in Ganjam
The kewda industry in Ganjam provides income of 4.5-6 million USD (300-400 million INR) to the local farmers. About 140 traditional distillation units operate in the small scale industries in nearly 200 villages and hamlets of the district producing an estimated 35 million flowers (3,500 tons) worth 10 million USD annually.
In Odisha about 200 kilos of Rooh Kewda are prepared each year at a cost of $7000 per kilo as compared to $1500-$1800 for a fine attar. The attar contains, on the average about 3-5% essence of Kewda with the rest being sandalwood oil. When Rooh Kewda is being prepared 5 different stills are charged with 600 flowers each. Three distillations are done on one batch of flowers. It means that three receivers are assigned to each deg. The first distillate(Agari) yields 10-12 kilos of aromatic water, the second distillate(Pichari) yields the same. In the third(Tigari) liquid paraffin is sometimes kept to prepare a cheap quality "attar" or only the distillate is kept for making an inexpensive hydrosol. Only the first two distillates(Agari and Pichari) are kept for making the rooh. These are cooled down and in the evening the aromatic water is poured into one deg. It is immediately sealed and the bamboo pipe is connected to the receive |
https://en.wikipedia.org/wiki/Stephen%20Milne%20%28mathematician%29 | Stephen Carl Milne is an American mathematician who works in the fields of analysis, analytic number theory, and combinatorics.
Milne received a bachelor's degree from San Diego State University in 1972 and a Ph.D. from the University of California, San Diego (UCSD) in 1976. His thesis, Peano curves and smoothness of functions, was written under Adriano M. Garsia. From 1976 to 1978 he was a Gibbs Instructor at Yale University. Milne taught at Texas A&M University, UCSD, the University of Kentucky, and Ohio State University, where he became in 1982 an associate professor and in 1985 a full professor.
Milne works on algebraic combinatorics, classical analysis, special functions, analytic number theory, and Lie algebras (generalizations of the Macdonald identities).
From 1981 to 1983 he was a Sloan Fellow. In 2007 he was the joint recipient with Heiko Harborth of the Euler Medal. In 2012 Milne was elected a Fellow of the American Mathematical Society.
Selected publications
with Glenn Lilly:
References
External links
Homepage at Ohio State University
20th-century American mathematicians
21st-century American mathematicians
Living people
University of California, San Diego alumni
Ohio State University faculty
Combinatorialists
Mathematical analysts
Fellows of the American Mathematical Society
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/List%20of%20questionable%20diagnostic%20tests | This is a list of medical diagnostic tests that are considered questionable, unverified or refuted.
Applied kinesiology, including the Bi-Digital O Ring Test
Barnes Basal Temperature Test
Breast thermography
Electro Physiological Feedback Xrroid (EPFX)
Electrodermal diagnostic devices (e.g. Vega machines, E-meters)
Genetic tests for "reward deficiency syndrome"
Hair analysis
IgG antibody testing for food intolerances and food allergies
Live blood analysis
Myers–Briggs Type Indicator (MBTI)
Pendulum dowsing
Proove Opioid Risk test (POR)
Provoked urine testing for heavy metal toxicity
Radionics
SPECT scans for diagnosing psychological disorders
Unvalidated Lyme disease testing, often used to diagnose so-called chronic Lyme disease
Unvalidated mycotoxin tests
See also
List of topics characterized as pseudoscience
Quackery
List of diagnoses characterized as pseudoscience
References
Alternative medical diagnostic methods
Medical lists |
https://en.wikipedia.org/wiki/Food%20defense | Food defense is the protection of food products from intentional contamination or adulteration by biological, chemical, physical, or radiological agents introduced for the purpose of causing harm. It addresses additional concerns including physical, personnel and operational security.
Food defense is one of the four categories of the food protection risk matrix which include: food safety, which is based on unintentional or environmental contamination that can cause harm; Food fraud, which is based on intentional deception for economic gain; and Food quality, which may also be affected by profit-driven behavior but without intention to cause harm.
Overarching these four categories is food security, which deals with individuals having access to enough food for an active, healthy life. Food protection is the umbrella term encompassing both food defense and food safety. These six terms are often conflated.
Along with protecting the food system, food defense also deals with prevention, protection, mitigation, response and recovery from intentional acts of adulteration.
History in the United States
1906: The Federal Meat Inspection Act places requirements on the slaughter, processing and labeling of meat and meat products, domestic and imported.
1938: The Federal Food, Drug and Cosmetic Act establishes definitions and regulation for the safety of food, drugs, and cosmetics.
1957: The Poultry Products Inspection Act requires the Food Safety and Inspection Service (FSIS) to inspect all domesticated birds meant for human consumption.
November 2002: The Homeland Security Act passed by congress creates the Department of Homeland Security in response to the September 11 attacks.
December 2003: Homeland Security Presidential Directive 7 establishes a policy to identify and prioritize critical infrastructures. Food and Agriculture is identified as one of these infrastructures
January 2004: The Homeland Security Presidential Directive 9 establishes policy to protect agri |
https://en.wikipedia.org/wiki/Google%20Photos | Google Photos is a photo sharing and storage service developed by Google. It was announced in May 2015 and spun off from Google+, the company's former social network.
Google Photos shares the 15 gigabytes of free storage space with other Google services, such as Google Drive and Gmail. Users can upload their photos and videos in either quality setting, original or compressed (photos and videos up to 16 megapixels and 1080p resolution, respectively), that will count towards the free storage tier (compressed items uploaded before June 1, 2021, along with items uploaded via Pixel phones released before that date, are unlimited). Users can expand their storage through paid Google One subscriptions.
The service automatically analyzes photos, identifying various visual features and subjects. Users can search for anything in photos, with the service returning results from three major categories: People, Places, and Things. The computer vision of Google Photos recognizes faces (not only those of humans, but pets as well), grouping similar ones together (this feature is only available in certain countries due to privacy laws); geographic landmarks (such as the Eiffel Tower); and subject matter, including birthdays, buildings, animals, food, and more.
Different forms of machine learning in the Photos service allow recognition of photo contents, automatically generate albums, animate similar photos into quick videos, surface past memories at significant times, and improve the quality of photos and videos. In May 2017, Google announced several updates to Google Photos, including reminders for and suggested sharing of photos, shared photo libraries between two users, and physical albums. Photos automatically suggested collections based on face, location, trip, or other distinction.
Google Photos received critical acclaim after its decoupling from Google+ in 2015. Reviewers praised the updated Photos service for its recognition technology, search, apps, and loading times. Nev |
https://en.wikipedia.org/wiki/G%C3%A1bor%20Korchm%C3%A1ros | Gábor Korchmáros (born 1948) is a Hungarian mathematician, who works on finite geometry.
Biography
Korchmáros received in 1972 from the University of Budapest a Ph.D. in mathematics. In 1973 on a postdoc grant, he studied at the Research Center of the Accademia dei Lincei in Rome. In 1976 he was awarded the Grunwald Prize of the János Bolyai Mathematical Society. In 1980 he received the Candidate of Sciences degree and in 2000 the Doctor of Sciences degree from the János Bolyai Mathematical Society. In 1987 he became a professor at the Università della Basilicata. He was a visiting professor at several universities, including the University of Sussex, the University of Delaware and the University of Szeged (Hungary).
His research involves the theory of ovals and their higher-dimensional generalizations over finite fields. One topic of his research is the collineation groups of ovals and embedding problems for arcs in ovals; these investigations have applications in coding theory and are related to the Hasse-Weil bound for elliptic curves. He also works on algebraic curves over finite fields and their automorphism groups, translation planes, finite Möbius planes, finite Minkowski planes, and elliptic curve cryptography. In the late 1970s he worked with Beniamino Segre.
He was awarded the Euler Medal of ICA in 2008, and in 2014 the Doctor Honoris Casusa degree at the University of Szeged.
Selected works
1979: Questioni relative ad ovali astratte
1998: (as editor with E. Ballico) Recent Progress in Geometry, Circolo Matematico di Palermo
2008: (with J. W. P. Hirschfeld & F. Torres), Algebraic Curves over a Finite Field, Princeton University Press, Google books link
2010: (with M. Giulietti)
2019: (with M. Giulietti)
References
External links
1948 births
20th-century Hungarian mathematicians
21st-century Hungarian mathematicians
Eötvös Loránd University alumni
Combinatorialists
Living people |
https://en.wikipedia.org/wiki/Android%20Things | Android Things is a deprecated Android-based embedded operating system platform by Google, announced at Google I/O 2015, and launched in 2018. Android Things Dashboard shutdown began on January 5, 2021. After January 5, 2022, Android Things Dashboard has been shut down completely and all remaining data has been deleted.
Originally, Android Things was aimed for low-power and memory constrained Internet of Things (IoT) devices, but in 2019 the project dropped support for low-power hardware and refocused on smartphone-class devices.
History
Pre-release
During Google I/O 2015, Google announced an upcoming Android-based embedded operating system platform, codenamed Brillo. At the time, project aimed to support low-memory devices with as little as 32-64 MB of RAM. Brillo platform was not just an OS for IoT devices, but instead a complete software stack with cloud component which included management console for device provisioning and update delivery. Brillo supported Wi-Fi and Bluetooth Low Energy and Weave protocol for communicating with cloud (including update delivery), communication with Android phones, and other compatible devices (including Google Nest products).
In 2016, Google revamped Brillo under the new name Android Things.
Originally, Android Things was aimed for low-power and memory constrained Internet of Things (IoT) devices, which are usually built from different MCU platforms.
Release
In 2018, Android Things was officially released, with version number 1.0. At the same time, multiple OEMs (including JBL, Lenovo, and LG Electronics) released smart home devices powered by Android Things. These devices were based on two Qualcomm "Home Hub" systems-on-chip solutions and Google-provided implementations of Android Things tailored for Google Assistant-powered smart speakers and displays.
In February 2019, Android Things refocused on smart speakers and displays. The project dropped support for resource-constrained IoT devices and changed focus to smartph |
https://en.wikipedia.org/wiki/ParMRC%20system | The ParMRC system is a mechanism for sorting DNA plasmids to opposite ends of a bacterial cell during cell division. It has three components: ParM, an actin-like protein that forms a long filament to push two plasmids apart, ParR, which binds the plasmid to ParM and generates the ParM filament, and parC, which is a DNA sequence on the plasmid that anchors ParR to itself.
Description
There the plasmids are segregated and can replicate without interference from the chromosomal DNA. During cell division many plasmids are plagued with low copy numbers and thus evolved active segregation to avoid plasmid loss during cell division The process of this segregation is carried out by a small number of components, three to be exact, in the DNA, with incredible efficiency. The three components, a parC DNA site, and two proteins parR and parM all combine to create the ParMRC system, a type II plasmid partitioning system.
The process by which the plasmids are segregated from the chromosomal DNA is not an extremely complicated one and contains just three components. The first component ParM is an actin-like protein. The second is a DNA-binding adaptor protein known as ParR. The last component is a centromere-like region called ParC. The process works using all three of these components and has been evolved to work extremely efficiently. In the cell the ParM protein filaments search for plasmids. Next, they find the ParR and ParC that are headed to DNA molecules and push them to opposite poles of the cell in order to segregate them.
This type of process using filament forming actin-like protein (ParM) to move DNA to opposite sides of the cell has been adopted by several Bacteria as their main plasmid segregation systems, due to its efficiency. This discovery as well as improvements in technology, such as higher resolution in light microscopy, will soon allow scientists to track individual molecules in cells to reveal even more about this ParMRC system.
References
Bacteria
Pl |
https://en.wikipedia.org/wiki/Lighthouse%20Labs | Lighthouse Labs is a tech education company that offers 12-week boot camps for web development and data science, as well as part-time up-skilling courses, with locations across Canada. In previous years, they organized an annual free learn-to-code event, The HTML500, in partnership with Telus.
Locations
Vancouver
Opened in 2013, Lighthouse Labs' first immersive boot camp facility started out of Launch Academy, an incubator in the heart of the city's Gastown neighborhood, before moving to new premises in the heart of downtown Vancouver in 2018. Students learn front and back-end development through the boot camp's web development full-time program and learn data science with a 12-week Data Science Bootcamp.
The iOS program, launched in July 2014, was arguably Canada's first immersive iOS immersive program and ran through the summer of 2019.
Toronto
As part of a national partnership with Highline, a seed-stage investment platform, Lighthouse Labs announced the launch of its Toronto operations during The HTML500 in February 2015. Located in Devhub in downtown Toronto, Lighthouse Labs joins existing Toronto-based boot camps such as Bitmaker Labs, BrainStation, and HackerYou, as one of several developer boot camps that offer in-person learning opportunities to individuals in the Greater Toronto Area.
Montreal
Operating out of the beautiful Spaces Mile End, Lighthouse Labs Montreal currently offers a 12-week Data Science Bootcamp, 12-week Web Development Bootcamp, and three part-time courses in web development and data analytics.
Victoria
Located in downtown Victoria at KWENCH, Lighthouse Labs immersed themselves in the local tech community by partnering with various community Tech leaders such as Viatech and Ladies Learning code. The Victoria location currently runs the web development boot camp and data science boot camp twice a year and three 6-week part-time web and data analytics programs.
Calgary
In April 2015, Lighthouse Labs launched a 'pop-up' program in |
https://en.wikipedia.org/wiki/2.5GBASE-T%20and%205GBASE-T | IEEE 802.3bz, NBASE-T and MGBASE-T are standards for Ethernet over twisted pair at speeds of 2.5 and 5 Gbit/s. These use the same cabling as the ubiquitous Gigabit Ethernet, yet offer higher speeds. The resulting standards are named 2.5GBASE-T and 5GBASE-T.
NBASE-T refers to Ethernet equipment that supports speeds of at least 2.5 Gbit/s and sometimes 5 or 10 Gbit/s, and that can automatically use training to operate at the best speed supported by the cable quality. Usually it also supports additional link speeds (10, 100 or 1000 Mbit/s) in connection with autonegotiation, depending on the capabilities of the equipment at the other end of the cable.
Technology
These standards are specified in Clauses 125 and 126 of the IEEE 802.3 standard. The physical (PHY) layer transmission technology of IEEE 802.3bz is based on 10GBASE-T, but operates at a lower signaling rate. By reducing the original signal rate to or , the link speed drops to 2.5 or 5 Gbit/s, respectively. The spectral bandwidth of the signal is reduced accordingly, lowering the requirements on the cabling, so that 2.5GBASE-T and 5GBASE-T can be deployed at a cable length of up to 100 m on Cat 5e or better cables.
The NBASE-T effort also standardized how its switches can implement power over Ethernet according to the IEEE 802.3at and successor standards. This allows a single cable to provide both power and data for high-bandwidth wireless access points such as those that implement the 802.11ac and 802.11ax standards.
Prior to the release of 2.5GBASE-T and 5GBASE-T, manufacturers of wireless access points that wanted to support multi-gigabit uplink speed using standard gigabit Ethernet ports had to include multiple Ethernet ports on their access points. By bonding the connections from multiple Ethernet ports via IEEE 802.3ad link aggregation or similar, manufacturers were able to achieve speeds close to with 2 gigabit ports. This would require the wireless access point to be connected to the rest of th |
https://en.wikipedia.org/wiki/Baikal%20CPU | Baikal CPU was a line of MIPS and ARM-based microprocessors developed by fabless design firm Baikal Electronics, a spin-off of the Russian supercomputer company T-Platforms.
Design
Judging by the information available from online sources Baikal Electronics have selected a different approach compared to other Russian microprocessor initiatives such as the Elbrus-2SM, Elbrus-8S by MCST, and the Multiclet line of chips. The design by Baikal Electronics is based on existing commercial IP Cores from Imagination Technologies and ARM Holdings, compared to the more innovative approach of Multiclet, and the Elbrus CPU which has a history dating back to the Elbrus supercomputers from the Soviet Union.
Company's history
The Baikal Electronics company was established on January 11, 2012, as a daughter entity of T-Platforms and was registered as a public joint-stock company. T-NANO, a future investor in Baikal Electronics, registered on march 3, 2012 as a joint venture of T-Platformi (50.5 %) and the Russian Direct Investment Fund (49.5 %).
In May 2012 Grigoriy Khrenov joined the company as the CTO. He is D.Sc. and formerly had been a Deputy Chief Designer at Micron Technology, then an Engineering Director at Cadence Design Systems.
In August 2021 TSMC was contracted for chip production, but such production was banned by sanctions adopted in the aftermath of Russia's invasion of Ukraine.
In August 2023, Baikal Electronics entered bankruptcy.
US sanctions, MIPS architecture chosen
Since March 8, 2013, the parent company T-Platforms was placed under US sanctions, which suspended the planned licensing agreement with ARM Ltd. Soon, on March 23, the ownership structure was changed: T-Platforms got 37.17 %, Rusnano through the Russian Direct Investment Fund - 62.83 %. For the first processor being developed (Baikal-T1 or BE-T1000) MIPS architecture by Imagination Technologies and 28 nm process were chosen. On December 31, 2013, US sanctions were lifted and a Technology Licen |
https://en.wikipedia.org/wiki/Host%20microbe%20interactions%20in%20Caenorhabditis%20elegans | Caenorhabditis elegans- microbe interactions are defined as any interaction that encompasses the association with microbes that temporarily or permanently live in or on the nematode C. elegans. The microbes can engage in a commensal, mutualistic or pathogenic interaction with the host. These include bacterial, viral, unicellular eukaryotic, and fungal interactions. In nature C. elegans harbours a diverse set of microbes. In contrast, C. elegans strains that are cultivated in laboratories for research purposes have lost the natural associated microbial communities and are commonly maintained on a single bacterial strain, Escherichia coli OP50.
However, E. coli OP50 does not allow for reverse genetic screens because RNAi libraries have only been generated in strain HT115. This limits the ability to study bacterial effects on host phenotypes. The host microbe interactions of C. elegans are closely studied because of their orthologs in humans. Therefore, the better we understand the host interactions of C. elegans the better we can understand the host interactions within the human body.
Natural ecology
C. elegans is a well-established model organism in different research fields, yet its ecology however is only poorly understood. They have a short development cycle only lasting three days with a total life span of about two weeks.C. elegans were previously considered a soil-living nematode, but in the last 10 years it was shown that natural habitats of C. elegans are microbe-rich, such as compost heaps, rotten plant material, and rotten fruits. Most of the studies on C. elegans are based on the N2 strain, which has adapted to laboratory conditions. Only in the last few years the natural ecology of C. elegans has been studied in more detail and one current research focus is its interaction with microbes. As C. elegans feeds on bacteria (microbivory), the intestine of worms isolated from the wild is usually filled with a large number of bacteria. In contrast to the |
https://en.wikipedia.org/wiki/Atomic%20layer%20etching | Atomic layer etching (ALE) is an emerging technique in semiconductor manufacture, in which a sequence alternating between self-limiting chemical modification steps which affect only the top atomic layers of the wafer, and etching steps which remove only the chemically-modified areas, allows the removal of individual atomic layers. The standard example is etching of silicon by alternating reaction with chlorine and etching with argon ions.
This is a better-controlled process than reactive ion etching, though the issue with commercial use of it has been throughput; sophisticated gas handling is required, and removal rates of one atomic layer per second are around the state of the art.
The equivalent process for depositing material is atomic layer deposition (ALD). ALD is substantially more mature, having been used by Intel for high-κ dielectric layers since 2007 and in Finland in the fabrication of thin film electroluminescent devices since 1985.
References
External links
ECS-JSS focus journal on atomic layer etch
Overview of atomic layer etching in the semiconductor industry
Industrial processes
Chemical processes
Semiconductor device fabrication
Etching (microfabrication) |
https://en.wikipedia.org/wiki/Air%20pollution%20measurement | Air pollution measurement is the process of collecting and measuring the components of air pollution, notably gases and particulates. The earliest devices used to measure pollution include rain gauges (in studies of acid rain), Ringelmann charts for measuring smoke, and simple soot and dust collectors known as deposit gauges. Modern air pollution measurement is largely automated and carried out using many different devices and techniques. These range from simple absorbent test tubes known as diffusion tubes through to highly sophisticated chemical and physical sensors that give almost real-time pollution measurements, which are used to generate air quality indexes.
Importance of measurement
Air pollution is caused by many things. In urban environments, it can contain many components, notably solid and liquid particulates (such as soot from engines and fly ash escaping from incinerators), and numerous different gases (most commonly sulphur dioxide, nitrogen oxides, and carbon monoxide, all related to fuel combustion). These different forms of pollution have different effects on people's health, on the natural world (water, soil, crops, trees, and other vegetation), and on the built environment. Measuring air pollution is the first step in identifying its causes and then reducing or regulating them to keep the quality of the air inside legal limits (mandated by regulators such as the Environmental Protection Agency in the United States) or advisory guidelines suggested by bodies such as the World Health Organization (WHO). According to the WHO, over 6000 cities in 117 countries now routinely monitor the quality of their air.
Types of measurement
Air pollution is (broadly) measured in two different ways, passively or actively.
Passive measurement
Passive devices are relatively simple and low-cost. They work by soaking up or otherwise passively collecting a sample of the ambient air, which then has to be analyzed in a laboratory. One of the most common forms of |
https://en.wikipedia.org/wiki/FMRFamide%20in%20Biomphalaria%20glabrata | FMRFamide, a neuropeptide involved in cardiac activity regulation, is found in Biomphalaria glabrata, a species of a freshwater snail best known for its role as the intermediate host for the human-infecting trematode parasite Schistosoma mansoni.
This freshwater snail species is used as a model organism, in other words, a non-human species which is extensively studied to understand a biological phenomenon, with the expectation that discoveries made in the model will provide insight into the workings of other organisms. Model organisms are in vivo models and are widely used to research human disease when human experimentation would be unfeasible or unethical.
Relevance
This snail has been studied in relation to human pathology and the epidemiology of schistosomiasis. S. masoni is known to change its host’s (B. glabrata'''s) behavior via the upregulation/downregulation of neuropeptides such as schistosomin and NPY, and some studies have reported that FMRFamide is aminergic, and may be implicated in the secretion of molecules to respond to infection with parasites.
The ganglionic central nervous system (CNS) of B. glabrata consists of paired cerebral, pedal, pleural, parietal, and buccal ganglia, and one unpaired visceral ganglion. FMRFamide is concentrated in the concentrated in the cerebral and visceral ganglia, although evidence from current research suggests that FMRFamide moves downward of the head-foot region of the snail as embryonic development proceeds.
The exact role of FMRFamide during early development of the embryonic central nervous system is not well studied. Detection of this neuropeptide is important because its expression lays down the foundation of the CNS in the early stages of development in invertebrates. In recent years, neuromodulatory actions of FMRFamide in invertebrates have become more apparent. This is in part due to the extensive studies done on the Planorbidae and Lymnaeidae families of pond snails.
FMRFamide expression in B. glabra |
https://en.wikipedia.org/wiki/ClearVolume | ClearVolume is an open source real-time live 3D visualization library designed for high-end volumetric light sheet microscopes. ClearVolume enables the live visualization of microscope data - allowing the biologists to immediately decide whether a sample is worth imaging. ClearVolume can easily be integrated into existing Java, C/C++, Python, or LabVIEW based microscope software. It has a dedicated interface to MicroManager/OpenSpim/OpenSpin control software. ClearVolume supports multi-channels, live 3D data streaming from remote microscopes, and uses a multi-pass Fibonacci rendering algorithm that can handle large volumes. Moreover, ClearVolume is integrated into the FiJi/ImageJ2/KNIME ecosystem.
See also
FiJi
KNIME
Light sheet fluorescence microscopy
Volume rendering
References
External links
Website of the open source ClearVolume project with links to the wiki, code repositories and issue tracking.
ClearVolume KNIME plugin project page.
ClearVolume FiJi plugin project page.
Computational science
Bioinformatics |
https://en.wikipedia.org/wiki/The%20Hub%20%28forum%29 | The Hub was a discussion forum on Tor hidden services on the dark web focused on darknet market reviews, cryptocurrency and security.
Second in popularity only to reddit's /r/DarkNetMarkets, the site was launched in January 2014 as a more secure, verifiable and discreetly moderated alternative. Vendors must be verified prior to getting a vendor status on the forum. The Hub has hosted Dr. Fernando Caudevilla, 'DoctorX' as an adviser for the site's drug users who has answered more than a thousand questions in the forums of the original Silk Road and Silk Road 2.0 and the site has an ongoing harm reduction and drug awareness program.
In March 2015 the administrator halted all withdrawals from the platform and vanished with $50M.
References
External links
Darknet markets
Internet properties established in 2014
Tor onion services
Internet forums |
https://en.wikipedia.org/wiki/BuggedPlanet | BuggedPlanet.info is a wiki created in 2011 by Andy Müller-Maguhn, former spokesman of the Chaos Computer Club, that tries to list and track down the activities of the surveillance industry in the fields of "Lawful interception", Signals intelligence (SIGINT), Communications intelligence (COMINT) as well as tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology.
The site maintains a list of vendors of cyberweapons and surveillance technologies as well as a "country knowledgebase" that aims to accumulate country-specific news, activities and vendors on the topic. A special focus is placed on vendors that sell such technologies to undemocratic countries and related lobbying efforts.
The Spy Files
In December 2011 Privacy International and WikiLeaks collaborated with BuggedPlanet when they released documents collected from a number of surveillance trade shows and conferences included brochures, catalogues, technical specifications, contracts and pricelists for the products of around 160 companies.
See also
Cyber-arms industry
Mass surveillance industry
WikiLeaks
External links
References
Classified documents
Espionage
MediaWiki websites
Mass surveillance
National security
Online archives
Whistleblowing
News leaks |
https://en.wikipedia.org/wiki/ESign%20%28India%29 | Aadhaar eSign is an online electronic signature service in India to facilitate an Aadhaar holder to digitally sign a document. The signature service is facilitated by authenticating the Aadhaar holder via the Aadhaar-based e-KYC (electronic Know Your Customer) service.
To eSign a document, one has to have an Aadhaar card and a mobile number registered with Aadhaar. With these two things, an Indian citizen can sign a document remotely without being physically present.
Procedure
The notification issued by Government of India in this regard stipulates the following procedure for the e-authentication using Aadhaar e-KYC services.
Authentication of an electronic record by e-authentication technique, which shall be done by
the applicable use of e-authentication, hash function, and asymmetric cryptosystem techniques, leading to issuance of digital signature certificate by Certifying Authority,
a trusted third party service by subscriber's key pair generation, storing of the key pairs on hardware security module and creation of digital signature provided that the trusted third party shall be offered by the certifying authority (the trusted third party shall send application form and certificate signing request to the Certifying Authority for issuing a digital signature certificate to the subscriber),
issuance of digital signature certificate by Certifying Authority shall be based on e-authentication, particulars given in the prescribed format, digitally signed verified information from Aadhaar e-KYC services and electronic consent of digital signature certificate applicant,
the manner and requirements for e-authentication shall be as issued by the Controller from time to time,
the security procedure for creating the subscriber’s key pair shall be in accordance with the e-authentication guidelines issued by the Controller,
the standards referred to in rule 6 of the |
https://en.wikipedia.org/wiki/Japaridze%27s%20polymodal%20logic | Japaridze's polymodal logic (GLP) is a system of provability logic with infinitely many provability modalities. This system has played an important role
in some applications of provability algebras in proof theory, and has been extensively studied since the late 1980s. It is named after Giorgi Japaridze.
Language and axiomatization
The language of GLP extends that of the language of classical propositional logic by including the infinite series of necessity operators. Their dual possibility operators are defined by .
The axioms of GLP are all classical tautologies and all formulas of one of the following forms:
And the rules of inference are:
From and conclude
From conclude
Provability semantics
Consider a sufficiently strong first-order theory such as Peano Arithmetic .
Define the series of theories as follows:
is
is the extension of through the additional axioms for each formula such that proves all of the formulas
For each , let be a natural arithmetization of the predicate
is the Gödel number of a sentence provable in .
A realization is a function that sends each nonlogical atom of
the language of GLP to a sentence of the language of . It extends to all formulas
of the language of GLP by stipulating that commutes with the Boolean connectives, and
that is , where
stands for (the numeral for) the Gödel number of .
An arithmetical completeness theorem for GLP states that a formula is provable in GLP if and only if, for every interpretation , the sentence is provable in .
The above understanding of the series of theories is not the only natural understanding yielding the soundness and completeness of GLP. For instance, each theory can be understood as augmented with all true sentences as additional axioms. George Boolos showed that GLP remains sound and complete with analysis (second-order arithmetic) in the role of the base theory .
Other semantics
GLP has been shown to be incomplete with respect to any class of |
https://en.wikipedia.org/wiki/Depuration | Depuration of seafood is the process by which marine or freshwater animals are placed into a clean water environment for a period of time to allow purging of biological contaminants (such as Escherichia coli) and physical impurities (such as sand and silt). The most common subjects of depuration are bivalves such as oysters, clams, and mussels.
History
Most research and publications focus primarily on the depuration of seafood rather than freshwater animals. The commonly defined depuration process has been practiced since the 1800s originating as a method to prevent typhoid fever (via Salmonella enterica subsp. enterica, serovar Typhi) and other illnesses attributed to polluted shellfish being consumed. As coastal seawater became increasingly contaminated with sewage-borne bacteria, early research investigated the use of disgorging tanks. Today, modern seafood depuration is performed in segregated physical tanks using treated seawater that is sterilised either by way of chlorine, ultraviolet, or ozone.
Seafood depuration is legislated or regulated in many countries, including the United States, EU members such as France, Ireland, and Italy, and Japan. Oversight is managed by internationally recognised agencies, for example, in the United States, the National Shellfish Sanitation Program (NSSP) administered by the Interstate Shellfish Sanitation Conference sets guidelines on depuration and is recognised by the U.S. Food and Drug Administration. In Canada, the Canadian Food Inspection Agency (CFIA), Fisheries and Oceans Canada (DFO) and Environment and Climate Change Canada (ECCC) actively compile the manual for the Canadian Shellfish Sanitation Program (CSSP). The Codex Alimentarius, which is overseen by the World Health Organization (WHO) and Food and Agriculture Organisation of the United Nations (FAO), both recognises and encourages the application of seafood depuration.
According to the FAO in December 2006, France had 1,422 depuration facilities, Italy had |
https://en.wikipedia.org/wiki/Case%20sealer | A case sealer or box sealer is a piece of equipment used for closing or sealing corrugated boxes. It is most commonly used for regular slotted containers (RSC) and can involve adhesive (cold water-borne or hot melt adhesive), box sealing tape, or Gummed (water activated) tape.
By contrast, a case erector is equipment for setting-up flat (knocked-down) corrugated boxes and applying a closure to the bottom flaps.
Semi-automated
With semi automatic equipment, the operator typically fills and loads a box at the entrance to the case sealer; the box may or may not have the bottom flaps previously closed. The operator closes the top flaps and feeds the box in or through a machine which automatically applies the closure. This helps save time and controls the application of the closure materials such as box sealing tape
Fully automated
Fully automatic equipment is available which does not require an operator. All functions, including closing the flaps, can be automated.
Other
Case sealers can also be categorized as either adjustable to fit production runs of a uniform box size or random, capable of handling a mixed variety of box sizes without machine adjustment.
Several machine design options have been developed.
See also
Box-sealing tape
Automation
Notes
References
Yam, K.L., "Encyclopedia of Packaging Technology", John Wiley & Sons, 2009,
External links
Packaging machinery
Industrial equipment |
https://en.wikipedia.org/wiki/Constellation%20%28sculpture%20series%29 | Constellation is a series of outdoor 2000 bronze sculptures by American artist Tad Savinar, installed at Holladay Park in northeast Portland, Oregon, United States. The work's three "distinct elements" include:
Constellation (Vase of Flowers) or Constellation: Flowers from a Neighborhood Garden, a slender vase of daisies, hydrangeas and other flowers;
Constellation (Molecule) or Constellation: Isolated Molecule for a Good Neighborhood, an abstract molecule representing a "good neighborhood"; and
Constellation: Neighborhood Gardiner or simply Constellation, a female figure carrying gardening shears.
According to the Regional Arts & Culture Council, which administers the installation, "This project attempts to illustrate the connection between the personal front yard garden and the civic park/garden." The figure depicts a neighborhood activist (Carolyn Marks Backs or Carolyn Marks-Bax, depending on the source). The decision to visualize backs and the objects depicted in the molecule were chosen by the Sullivan Gulch Neighborhood Association. Objects include a bagel, coffee mug, garden tool, house, milk carton, school, a family, and trees. Constellation was funded by the City of Portland's Percent for Art program. It is part of the City of Portland and Multnomah County Public Art Collection courtesy of the Regional Arts & Culture Council.
See also
2000 in art
References
External links
Constellation (Vase of Flowers) at the Public Art Archive
2000 establishments in Oregon
2000 sculptures
Botanical art
Bronze sculptures in Oregon
Outdoor sculptures in Portland, Oregon
Sculptures of women in Oregon
Statues in Portland, Oregon
Sullivan's Gulch, Portland, Oregon |
https://en.wikipedia.org/wiki/Marine%20microbial%20symbiosis | Microbial symbiosis in marine animals was not discovered until 1981. In the time following, symbiotic relationships between marine invertebrates and chemoautotrophic bacteria have been found in a variety of ecosystems, ranging from shallow coastal waters to deep-sea hydrothermal vents. Symbiosis is a way for marine organisms to find creative ways to survive in a very dynamic environment. They are different in relation to how dependent the organisms are on each other or how they are associated. It is also considered a selective force behind evolution in some scientific aspects. The symbiotic relationships of organisms has the ability to change behavior, morphology and metabolic pathways. With increased recognition and research, new terminology also arises, such as holobiont, which the relationship between a host and its symbionts as one grouping. Many scientists will look at the hologenome, which is the combined genetic information of the host and its symbionts. These terms are more commonly used to describe microbial symbionts.
The type of marine animal vary greatly, for example, sponges, sea squirts, corals, worms, and algae all host a variety of unique symbionts. Each symbiotic relationship displays a unique ecological niche, which in turn can lead to entirely new species of host species and symbiont.
It is particularly interesting that it took so long to discover the marine microbial symbiosis because nearly every surface submerged in the oceans becomes covered with biofilm, including a large number of living organisms. Many marine organisms display symbiotic relationships with microbes. Epibiotic bacteria have been found to live on crustacean larvae and protect them from fungal infections. Other microbes in deep-sea vents have been found to prevent the settlement of barnacles and tunicate larvae.
Mechanisms of symbiosis
Various mechanisms are utilized in order to facilitate symbiotic relationships and to help these associates evolve alongside one anoth |
https://en.wikipedia.org/wiki/List%20of%20electric%20bus%20makers | List of electric bus makers lists makers of battery-powered all-electric buses. Makers of trolleybuses are listed separately at List of trolleybus manufacturers.
Current
ABB TOSA Flash Mobility, Clean City, Smart Bus, Geneva, Switzerland, A mass transport system with electric "flash" partial recharging of the buses at selected bus stops.
Alexander Dennis Enviro500EV three axle double-decker with Proterra drivetrain
APS Systems, Oxnard, CA, shuttle buses in partnership with Enova Systems and Saft
Astonbus, Marina del Rey, CA: E-city midi and full-size models, with a range between 250 and 500 km. Astonbus is the Zonda Electric bus sole distributor in all EU states.
Avass, Full electric city buses and touring coaches, manufactured in Australia.
Belkommunmash, in Minsk, Belarus. Models E420 "Vitovt Electro" and Е433 "Vitovt Max Electro".
Bolloré, in Brittany, France : Bluebus SE available as a standard 12-metre bus or an 18-metre articulated bus, and the 6-metre Bluebus 22.
BredaMenarinibus in Bologna, Italy. Zeus M-200 E model, with Ansaldo Electric Drive motor and 288V – 200 Ah lithium-ion batteries.
BONLUCK electric bus designed and manufactured by Jiangxi Kama Business Bus Co., Ltd.
BYD manufacturers a wide range of electric buses, ranging from the 30-foot K7M to the 60-foot K11M. In addition, they manufacture coaches and double-decker electric buses.
The K9 is their flagship transit bus (with K9 and K10 chassis/powertrain also used by other bus makers e.g. Alexander Dennis as a basis for localised EV transit buses), and the C9 is their flagship coach bus.
Chariot Motors* is a developer of ultracapacitor-based electric buses and battery e-buses for Bulgaria and Israel.
City Smile electric bus designed and manufactured by AMZ-Kutno in Poland.
Complete Coach Works remanufactured electric bus in Riverside, CA USA.
Custom Denning in Sydney, Australia. Design and production of Element fully low-floor battery-electric or fuel cell citybus.
Ebus, in Downey, |
https://en.wikipedia.org/wiki/Sparse%20network | In network science, a sparse network has much fewer links than the possible maximum number of links within that network (the opposite is a dense network). The study of sparse networks is a relatively new area primarily stimulated by the study of real networks, such as social and computer networks.
The notion of much fewer links is, of course, colloquial and informal. While a threshold for a particular network may be invented, there is no universal threshold that defines what much fewer actually means. As a result, there is no formal sense of sparsity for any finite network, despite widespread agreement that most empirical networks are indeed sparse. There is, however, a formal sense of sparsity in the case of infinite network models, determined by the behavior of the number of edges (M) and/or the average degree () as the number of nodes (N) goes to infinity.
Definitions
A simple unweighted network of size is called sparse if the number of links in it is much smaller than the maximum possible number of links :
.
In any given (real) network, the number of nodes N and links M are just two numbers, therefore the meaning of the much smaller sign ( above) is purely colloquial and informal, and so are statements like "many real networks are sparse."
However, if we deal with a synthetic graph sequence , or a network model that is well defined for networks of any size N = 1,2,...,, then the attains its usual formal meaning:
.
In other words, a network sequence or model is called dense or sparse depending on whether the (expected) average degree in scales linearly or sublinearly with N:
is dense if ;
is sparse if .
An important subclass of sparse networks are networks whose average degree is either constant or converges to a constant. Some authors call only such networks sparse, while others reserve special names for them:
is truly sparse or extremely sparse or ultrasparse if .
There also exist alternative, stricter definitions of network spa |
https://en.wikipedia.org/wiki/Rocket%20League | Rocket League is a vehicular soccer video game developed and published by Psyonix. The game was first released for PlayStation 4 and Windows in July 2015, with ports for Xbox One and Nintendo Switch being released later on. In June 2016, 505 Games began distributing a physical retail version for PlayStation 4 and Xbox One, with Warner Bros. Interactive Entertainment taking over those duties by the end of 2017. Versions for macOS and Linux were also released in 2016, but support for their online services were dropped in 2020. The game went free-to-play in September 2020.
Described as "soccer, but with rocket-powered cars", Rocket League has up to eight players assigned to each of the two teams, using rocket-powered vehicles to hit a ball into their opponent's goal and score points over the course of a match. The game includes single-player and multiplayer modes that can be played both locally and online, including cross-platform play between all versions. Later updates for the game enabled the ability to modify core rules and added new game modes, including ones based on ice hockey and basketball.
Rocket League is a sequel to Psyonix's Supersonic Acrobatic Rocket-Powered Battle-Cars, a 2008 video game for the PlayStation 3. Battle-Cars received mixed reviews and was not a success, but gained a loyal fan base. Psyonix continued to support themselves through contract development work for other studios while looking to develop a sequel. Psyonix began formal development of Rocket League around 2013, refining the gameplay from Battle-Cars to address criticism and fan input. Psyonix also recognized their lack of marketing from Battle-Cars and engaged in both social media and promotions to market the game, including offering the game for free for PlayStation Plus members on release.
Rocket League was praised for its gameplay improvements over Supersonic Acrobatic Rocket Powered Battle-Cars, as well as its graphics and overall presentation, although some criticism was dir |
https://en.wikipedia.org/wiki/Hole%20drilling%20method | The hole drilling method is a method for measuring residual stresses, in a material. Residual stress occurs in a material in the absence of external loads. Residual stress interacts with the applied loading on the material to affect the overall strength, fatigue, and corrosion performance of the material. Residual stresses are measured through experiments. The hole drilling method is one of the most used methods for residual stress measurement.
The hole drilling method can measure macroscopic residual stresses near the material surface. The principle is based on drilling of a small hole into the material. When the material containing residual stress is removed the remaining material reaches a new equilibrium state. The new equilibrium state has associated deformations around the drilled hole. The deformations are related to the residual stress in the volume of material that was removed through drilling. The deformations around the hole are measured during the experiment using strain gauges or optical methods. The original residual stress in the material is calculated from the measured deformations. The hole drilling method is popular for its simplicity and it is suitable for a wide range of applications and materials.
Key advantages of the hole drilling method include rapid preparation, versatility of the technique for different materials, and reliability. Conversely, the hole drilling method is limited in depth of analysis and specimen geometry, and is at least semi-destructive.
History and development
The idea of measuring the residual stress by drilling a hole and registering the change of the hole diameter was first proposed by Mathar in 1934. In 1966 Rendler and Vignis introduced a systematic and repeatable procedure of hole drilling to measure the residual stress. In the following period the method was further developed in terms of drilling techniques, measuring the relieved deformations, and the residual stress evaluation itself. A very important milesto |
https://en.wikipedia.org/wiki/IOS%209 | iOS 9 is the ninth major release of the iOS mobile operating system developed by Apple Inc., being the successor to iOS 8. It was announced at the company's Worldwide Developers Conference on June 8, 2015, and was released on September 16, 2015. It was succeeded by iOS 10 on September 13, 2016.
iOS 9 incorporated many feature updates to built-in apps. Most notably, Notes received the ability to draw sketches with different tools, image insertion, prominent visual appearance for website links and map locations, and advanced list formatting; an all-new Apple News app aggregates articles from different sources; and Apple Maps received mass transit support, although in a limited number of locations at launch. Major new system updates include proactivity, where Siri and advanced search are combined to make the operating system more contextually aware of information (such as time and location), and can provide the user with information ahead of time. For searching, the proactive intelligence can display instant results in a widget-like format, including weather, sports, news, and more. iOS 9 also added multiple forms of multitasking to the iPad. In iOS 9.3, Apple added a Night Shift mode that changes the color of the device's display to a warmer, less "blue light" containing shade, to reduce any negative eye health effects on users' circadian rhythms. Additionally, iOS 9 brought new user experience functions, including Quick Actions, and Peek and Pop, based on the touch-sensitive display technology in the iPhone 6S. Quick Actions are shortcuts on home screen app icons. Users can preview ("Peek") at content without moving away from the current screen before they enter ("Pop") the previewed content into full view.
Reception of iOS 9 was positive. Critics praised proactivity and Siri for making the Notification Center a central location for all information, and the potential for future updates to improve the functionality. The new multitasking features for the iPad were co |
https://en.wikipedia.org/wiki/TIS-100 | TIS-100 is a programming/puzzle video game developed by Zachtronics Industries. The game has the player develop mock assembly language code to perform certain tasks on a fictional, virtualized 1970s computer that has been corrupted. The game was released for Microsoft Windows, OS X, and Linux personal computers in July 2015.
Gameplay
Within TIS-100, the player is said to have come across a malfunctioning TIS-100 computer ("Tessellated Intelligence System") and its manual, based on early computers of the 1980s. The computer is presented to the player as twelve separate processing nodes laid out in a four-by-three grid. Each node has a single processor register to store a numerical value as well as a backup register. Nodes also hold their own assembly language program as entered by the user. The assembly language, a simplified version of real-world assembly languages, allows the node to accept external input or a numerical value sent from an adjacent node, perform basic math and logic operations, store and backup the current data value, and then send results to an adjacent node or to the program's output. Later puzzles introduce stack nodes and an output to a simple 5-color graphics display.
The player is presented with a series of puzzles that require them to program the nodes to perform specific actions on a set of numbers from one or more input terminals to produce pre-determined output at other terminals. For example, one task requires the player to double the value of the input at the output terminal. The game presents the list of inputs and the target output values that it is expecting and requires the players to develop the code for each node to match this; if during execution the output nodes receive unexpected outputs, the player will have to rework their solution. Not all nodes are available in certain puzzles, so the player will need to route around these nodes. The game offers the player the ability to step through the execution of the code and insert de |
https://en.wikipedia.org/wiki/Indiscrete%20category | An indiscrete category is a category C in which every hom-set C(X, Y) is a singleton. Every class X gives rise to an indiscrete category whose objects are the elements of X such that for any two objects A and B, there is only one morphism from A to B. Any two nonempty indiscrete categories are equivalent to each other. The functor from Set to Cat that sends a set to the corresponding indiscrete category is right adjoint to the functor that sends a small category to its set of objects.
References
Category theory |
https://en.wikipedia.org/wiki/Chinese%20whispers%20%28clustering%20method%29 | Chinese whispers is a clustering method used in network science named after the famous whispering game. Clustering methods are basically used to identify communities of nodes or links in a given network. This algorithm was designed by Chris Biemann and Sven Teresniak in 2005. The name comes from the fact that the process can be modeled as a separation of communities where the nodes send the same type of information to each other.
Chinese whispers is a hard partitioning, randomized, flat clustering (no hierarchical relations between clusters) method. The random property means that running the process on the same network several times can lead to different results, while because of hard partitioning one node can only belong to one cluster at a given moment. The original algorithm is applicable to undirected, weighted and unweighted graphs. Chinese whispers is time linear which means that it is extremely fast even if the number of nodes and links are very high in the network.
Algorithm
The algorithm works in the following way in an undirected unweighted graph:
All nodes are assigned to a distinct class (The number of initial classes equals the number of nodes).
Then all of the network nodes are selected one by one in a random order. Every node moves to the class which the given node connects with the most links. In the case of equality the cluster is randomly chosen from the equally linked classes.
Step two repeats itself until a predetermined number of iteration or until the process converges. In the end the emerging classes represent the clusters of the network.
The predetermined threshold for the number of the iterations is needed because it is possible that process does not converge. On the other hand in a network with approximately 10000 nodes the clusters does not change significantly after 40-50 iterations even if there is no convergence.
Strengths and weaknesses
The main strength of Chinese whispers lies in its time linear property. Because the process |
https://en.wikipedia.org/wiki/INT%2016H | INT 16h, INT 0x16, INT 16H or INT 22 is shorthand for BIOS interrupt call 16hex, the 23rd interrupt vector in an x86-based computer system.
The BIOS typically sets up a real mode interrupt handler at this vector that provides keyboard services. This interruption is responsible for control of the PC keyboard.
Features
This interruption is responsible for obtaining basic keyboard functionality, i.e. is responsible for collecting the keystrokes, obtain the status of the buffer of keyboard, etc. The standard encoding of the keyboard that offers the INT 16 h is a US keyboard. To adapt the coding of the INT 16h to another type of keyboard (for example, an international keyboard), the code must analyze the scan-code of the key pressed, and then perform suitable interpreting.
For keyboards with 101 letters or more, there are some keys that INT 16h interprets as expanded keys, which have a scan-code that is different from normal keys (e.g., key pause).
List of services of the INT 16 h
INT 16h Detailed Function List
See also
BIOS
PS/2 port
References
External links
explained and complete list of interrupt 16h
BIOS
Interrupts |
https://en.wikipedia.org/wiki/ATAC-seq | ATAC-seq (Assay for Transposase-Accessible Chromatin using sequencing) is a technique used in molecular biology to assess genome-wide chromatin accessibility. In 2013, the technique was first described as an alternative advanced method for MNase-seq, FAIRE-Seq and DNase-Seq. ATAC-seq is a faster analysis of the epigenome than DNase-seq or MNase-seq.
Description
ATAC-seq identifies accessible DNA regions by probing open chromatin with hyperactive mutant Tn5 Transposase that inserts sequencing adapters into open regions of the genome. While naturally occurring transposases have a low level of activity, ATAC-seq employs the mutated hyperactive transposase. In a process called "tagmentation", Tn5 transposase cleaves and tags double-stranded DNA with sequencing adaptors. The tagged DNA fragments are then purified, PCR-amplified, and sequenced using next-generation sequencing. Sequencing reads can then be used to infer regions of increased accessibility as well as to map regions of transcription factor binding sites and nucleosome positions. The number of reads for a region correlate with how open that chromatin is, at single nucleotide resolution. ATAC-seq requires no sonication or phenol-chloroform extraction like FAIRE-seq; no antibodies like ChIP-seq; and no sensitive enzymatic digestion like MNase-seq or DNase-seq. ATAC-seq preparation can be completed in under three hours.
Applications
ATAC-Seq analysis is used to investigate a number of chromatin-accessibility signatures. The most common use is nucleosome mapping experiments, but it can be applied to mapping transcription factor binding sites, adapted to map DNA methylation sites, or combined with sequencing techniques.
The utility of high-resolution enhancer mapping ranges from studying the evolutionary divergence of enhancer usage (e.g. between chimps and humans) during development and uncovering a lineage-specific enhancer map used during blood cell differentiation.
ATAC-Seq has also been applied to defini |
https://en.wikipedia.org/wiki/Ark%3A%20Survival%20Evolved | Ark: Survival Evolved (stylized as ARK) is a 2017 action-adventure survival video game developed by Studio Wildcard. In the game, players must survive being stranded on one of several maps filled with roaming dinosaurs, fictional fantasy monsters, and other prehistoric animals, natural hazards, and potentially hostile human players.
The game is played from either a third-person or first-person perspective and its open world is navigated by foot or by riding a prehistoric animal. Players can use firearms and improvised weapons to defend against hostile humans and creatures, with the ability to build bases as a defense on the ground and on some creatures. The game has both single-player and multiplayer options. Multiplayer allows the option to form tribes of players in a server. The max number of tribe mates varies from each server. In this mode, all tamed dinosaurs and building structures are usually shared between the members. There is a PvE mode where players cannot fight each other unless a specific war event agreed upon by both parties is triggered.
Development began in October 2014, when it was first released on PC as an early access title in the middle of 2015. The development team conducted research into the physical appearance of the animals but took a creative license for gameplay purposes. Instinct Games, Efecto Studios, and Virtual Basement were hired to facilitate the game's development. The game was officially released in August 2017 for Linux, macOS, PlayStation 4, Windows, and Xbox One, with versions for Android, iOS, and Nintendo Switch in 2018, a version for Stadia in 2021, and a second, separate Nintendo Switch version in 2022.
Ark: Survival Evolved received generally mixed reviews, with criticism for its "punishing" difficulty and excruciatingly time consuming activities, reliance on grinding, and performance issues, particularly on the original Nintendo Switch version. Several expansions to the game have been released as downloadable content. T |
https://en.wikipedia.org/wiki/Chaotic%20rotation | Chaotic rotation involves the irregular and unpredictable rotation of an astronomical body. Unlike Earth's rotation, a chaotic rotation may not have a fixed axis or period. Because of the conservation of angular momentum, chaotic rotation is not seen in objects that are spherically symmetric or well isolated from gravitational interaction, but is the result of the interactions within a system of orbiting bodies, similar to those associated with orbital resonance.
Examples of chaotic rotation include Hyperion, a moon of Saturn, which rotates so unpredictably that the Cassini probe could not be reliably scheduled to pass by unexplored regions, and Pluto's Nix, Hydra, and possibly Styx and Kerberos, and also Neptune's Nereid. According to Mark R. Showalter, author of a recent study, "Nix can flip its entire pole. It could actually be possible to spend a day on Nix in which the sun rises in the east and sets in the north. It is almost random-looking in the way it rotates." Another example is that of galaxies; from careful observation by the Keck and Hubble telescopes of hundreds of galaxies, a trend was discovered that suggests galaxies such as our own Milky Way used to have a very chaotic rotation, with planetary bodies and stars rotating randomly. New evidence suggests that our galaxy and other have settled into an orderly, disk-like rotation over the past 8 billion years and that other galaxies are slowly following suit over time.
See also
List of orbits
References
Astrophysics
Rotation in three dimensions
Chaotic maps |
https://en.wikipedia.org/wiki/Potentially%20unwanted%20program | A potentially unwanted program (PUP) or potentially unwanted application (PUA) is software that a user may perceive as unwanted or unnecessary. It is used as a subjective tagging criterion by security and parental control products. Such software may use an implementation that can compromise privacy or weaken the computer's security. Companies often bundle a wanted program download with a wrapper application and may offer to install an unwanted application, and in some cases without providing a clear opt-out method. Antivirus companies define the software bundled as potentially unwanted programs which can include software that displays intrusive advertising (adware), or tracks the user's Internet usage to sell information to advertisers (spyware), injects its own advertising into web pages that a user looks at, or uses premium SMS services to rack up charges for the user. A growing number of open-source software projects have expressed dismay at third-party websites wrapping their downloads with unwanted bundles, without the project's knowledge or consent. Nearly every third-party free download site bundles their downloads with potentially unwanted software. The practice is widely considered unethical because it violates the security interests of users without their informed consent. Some unwanted software bundles install a root certificate on a user's device, which allows hackers to intercept private data such as banking details, without a browser giving security warnings. The United States Department of Homeland Security has advised removing an insecure root certificate, because they make computers vulnerable to serious cyberattacks. Software developers and security experts recommend that people always download the latest version from the official project website, or a trusted package manager or app store.
Origins
Historically, the first big companies working with potentially unwanted programs for creating revenue came up in the US in the mid-2000s, such as Zango |
https://en.wikipedia.org/wiki/Custom%20firmware | Custom firmware, also known as aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles, mobile phones, and various embedded device types to provide new features or to unlock hidden functionality. In the video game console community, the term is often written as custom firmware or simply CFW, referring to an altered version of the original system software (also known as the official firmware or simply OFW) inside a video game console such as the PlayStation Portable, PlayStation 3, PlayStation Vita/PlayStation TV, PlayStation 4, Nintendo 3DS and Nintendo Switch. Installing custom firmware on some devices requires bootloader unlocking.
Video game consoles
Custom firmware often allow homebrew applications or ROM image backups to run directly within the game console, unlike official firmware, which usually only allow signed or retailed copies of software to run. Because custom firmware is often associated with software piracy, console manufacturers such as Nintendo and Sony have put significant effort into blocking custom firmware and other third party devices and content from their game consoles.
PlayStation Portable, PlayStation 3 and PlayStation Vita/PlayStation TV
Custom firmware is commonly seen in the PlayStation Portable handhelds released by Sony. Notable custom firmware include M33 by Dark_AleX as well as those made by others such as the 5.50GEN series, Minimum Edition (ME/LME) and PRO.
Custom firmware is also seen in the PlayStation 3 console. Only early "Fat" and Slim (CECH-20xx until early CECH-25xx) models are able to run custom firmware. Slim (late CECH-25xx and CECH-30xx) and Super Slim models can only run HEN (Homebrew Enabler), which has functionality similar to a custom firmware. There is also ODE (Optical Drive Emulator), HAN (etHANol) and HFW (Hybrid Firmware) for the PS3.
The PlayStation Vita/PlayStation TV has eCFW, meaning custom firmware for PSP running in th |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.